2017-08-28 12:27:45 -04:00
/ * *
* @ description Certificate generator
* @ author Joko Sastriawan / Ylian Saint - Hilaire
2022-01-24 02:21:24 -05:00
* @ copyright Intel Corporation 2018 - 2022
2018-01-04 15:15:21 -05:00
* @ license Apache - 2.0
2017-08-28 12:27:45 -04:00
* @ version v0 . 0.1
* /
2018-01-04 15:15:21 -05:00
2018-08-29 20:40:30 -04:00
/*xjslint node: true */
/*xjslint plusplus: true */
/*xjslint maxlen: 256 */
/*jshint node: true */
/*jshint strict: false */
/*jshint esversion: 6 */
"use strict" ;
2018-08-27 15:24:15 -04:00
2019-02-02 17:54:36 -05:00
module . exports . CertificateOperations = function ( parent ) {
2017-08-28 12:27:45 -04:00
var obj = { } ;
2019-02-02 17:54:36 -05:00
obj . parent = parent ;
2019-12-01 15:52:32 -05:00
obj . fs = require ( 'fs' ) ;
obj . forge = require ( 'node-forge' ) ;
obj . crypto = require ( 'crypto' ) ;
2018-10-31 19:03:09 -04:00
obj . tls = require ( 'tls' ) ;
2017-08-28 12:27:45 -04:00
obj . pki = obj . forge . pki ;
2018-08-29 20:40:30 -04:00
obj . dirExists = function ( filePath ) { try { return obj . fs . statSync ( filePath ) . isDirectory ( ) ; } catch ( err ) { return false ; } } ;
obj . getFilesizeInBytes = function ( filename ) { try { return obj . fs . statSync ( filename ) . size ; } catch ( err ) { return - 1 ; } } ;
2017-08-28 12:27:45 -04:00
2019-06-19 20:16:50 -04:00
const TopLevelDomainExtendedSupport = { 'net' : 2 , 'com' : 2 , 'arpa' : 3 , 'org' : 2 , 'gov' : 2 , 'edu' : 2 , 'de' : 2 , 'fr' : 3 , 'cn' : 3 , 'nl' : 3 , 'br' : 3 , 'mx' : 3 , 'uk' : 3 , 'pl' : 3 , 'tw' : 3 , 'ca' : 3 , 'fi' : 3 , 'be' : 3 , 'ru' : 3 , 'se' : 3 , 'ch' : 2 , 'dk' : 2 , 'ar' : 3 , 'es' : 3 , 'no' : 3 , 'at' : 3 , 'in' : 3 , 'tr' : 3 , 'cz' : 2 , 'ro' : 3 , 'hu' : 3 , 'nz' : 3 , 'pt' : 3 , 'il' : 3 , 'gr' : 3 , 'co' : 3 , 'ie' : 3 , 'za' : 3 , 'th' : 3 , 'sg' : 3 , 'hk' : 3 , 'cl' : 2 , 'lt' : 3 , 'id' : 3 , 'hr' : 3 , 'ee' : 3 , 'bg' : 3 , 'ua' : 2 } ;
2021-07-04 14:58:15 -04:00
// Return true if the trusted FQDN matched the certificate common name
function checkAcmActivationCertName ( commonName , trustedFqdn ) {
commonName = commonName . toLowerCase ( ) ;
trustedFqdn = trustedFqdn . toLowerCase ( ) ;
if ( commonName . startsWith ( '*.' ) && ( commonName . length > 2 ) ) { commonName = commonName . substring ( 2 ) ; }
return ( ( commonName == trustedFqdn ) || ( trustedFqdn . endsWith ( '.' + commonName ) ) ) ;
}
2021-03-04 02:49:53 -05:00
// Sign a Intel AMT TLS ACM activation request
obj . getAcmCertChain = function ( domain , fqdn , hash ) {
if ( ( domain == null ) || ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . certs == null ) || ( fqdn == null ) || ( hash == null ) ) return { action : 'acmactivate' , error : 1 , errorText : 'Invalid arguments' } ;
if ( parent . common . validateString ( fqdn , 4 , 256 ) == false ) return { action : 'acmactivate' , error : 1 , errorText : "Invalid FQDN argument." } ;
if ( parent . common . validateString ( hash , 16 , 256 ) == false ) return { action : 'acmactivate' , error : 1 , errorText : "Invalid hash argument." } ;
// Look for the signing certificate
var signkey = null , certChain = null , hashAlgo = null , certIndex = null ;
for ( var i in domain . amtacmactivation . certs ) {
const certEntry = domain . amtacmactivation . certs [ i ] ;
2021-07-04 14:58:15 -04:00
if ( ( certEntry . sha256 == hash ) && ( ( certEntry . cn == '*' ) || checkAcmActivationCertName ( certEntry . cn , fqdn ) ) ) { hashAlgo = 'sha256' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
if ( ( certEntry . sha1 == hash ) && ( ( certEntry . cn == '*' ) || checkAcmActivationCertName ( certEntry . cn , fqdn ) ) ) { hashAlgo = 'sha1' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
2021-03-04 02:49:53 -05:00
}
2021-07-15 13:15:05 -04:00
if ( signkey == null ) return { action : 'acmactivate' , error : 2 , errorText : "Can't create ACM cert chain, no signing certificate found." } ; // Did not find a match.
2021-03-04 02:49:53 -05:00
// If the matching certificate our wildcard root cert, we can use the root to match any FQDN
if ( domain . amtacmactivation . certs [ certIndex ] . cn == '*' ) {
// Create a leaf certificate that matches the FQDN we want
// TODO: This is an expensive operation, work on ways to pre-generate or cache this leaf certificate.
var rootcert = { cert : domain . amtacmactivation . certs [ certIndex ] . rootcert , key : obj . pki . privateKeyFromPem ( domain . amtacmactivation . certs [ certIndex ] . key ) } ;
var leafcert = obj . IssueWebServerCertificate ( rootcert , false , fqdn , 'mc' , 'Intel(R) Client Setup Certificate' , { serverAuth : true , '2.16.840.1.113741.1.2.3' : true } , false ) ;
// Setup the certificate chain and key
2021-07-31 04:53:07 -04:00
certChain = [ obj . pki . certificateToPem ( leafcert . cert ) , obj . pki . certificateToPem ( domain . amtacmactivation . certs [ certIndex ] . rootcert ) ] ;
2021-03-04 02:49:53 -05:00
signkey = obj . pki . privateKeyToPem ( leafcert . key ) ;
} else {
// Make sure the cert chain is in PEM format
var certChain2 = [ ] ;
for ( var i in certChain ) { certChain2 . push ( "-----BEGIN CERTIFICATE-----\r\n" + certChain [ i ] + "\r\n-----END CERTIFICATE-----\r\n" ) ; }
certChain = certChain2 ;
}
// Hash the leaf certificate and return the certificate chain and signing key
2021-07-31 04:53:07 -04:00
return { action : 'acmactivate' , certs : certChain , signkey : signkey , hash384 : obj . getCertHash ( certChain [ 0 ] ) , hash256 : obj . getCertHashSha256 ( certChain [ 0 ] ) } ;
2021-03-04 02:49:53 -05:00
}
2019-06-19 20:16:50 -04:00
// Sign a Intel AMT ACM activation request
2019-06-20 17:27:57 -04:00
obj . signAcmRequest = function ( domain , request , user , pass , ipport , nodeid , meshid , computerName , agentId ) {
2019-06-21 20:18:48 -04:00
if ( ( domain == null ) || ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . certs == null ) || ( request == null ) || ( request . nonce == null ) || ( request . realm == null ) || ( request . fqdn == null ) || ( request . hash == null ) ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : 'Invalid arguments' } ;
2020-10-22 17:35:12 -04:00
if ( parent . common . validateString ( request . nonce , 16 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid nonce argument." } ;
if ( parent . common . validateString ( request . realm , 16 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid realm argument." } ;
if ( parent . common . validateString ( request . fqdn , 4 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid FQDN argument." } ;
if ( parent . common . validateString ( request . hash , 16 , 256 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid hash argument." } ;
if ( parent . common . validateString ( request . uuid , 36 , 36 ) == false ) return { 'action' : 'acmactivate' , 'error' : 1 , 'errorText' : "Invalid UUID argument." } ;
2019-06-19 20:16:50 -04:00
// Look for the signing certificate
2019-06-19 20:59:03 -04:00
var signkey = null , certChain = null , hashAlgo = null , certIndex = null ;
2019-06-19 20:16:50 -04:00
for ( var i in domain . amtacmactivation . certs ) {
const certEntry = domain . amtacmactivation . certs [ i ] ;
2023-12-18 07:11:52 -05:00
if ( ( certEntry . sha256 == request . hash ) && ( ( certEntry . cn == '*' ) || checkAcmActivationCertName ( certEntry . cn , request . fqdn ) ) ) { hashAlgo = 'sha256' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
if ( ( certEntry . sha1 == request . hash ) && ( ( certEntry . cn == '*' ) || checkAcmActivationCertName ( certEntry . cn , request . fqdn ) ) ) { hashAlgo = 'sha1' ; signkey = certEntry . key ; certChain = certEntry . certs ; certIndex = i ; break ; }
2019-06-19 20:16:50 -04:00
}
2021-07-15 16:08:21 -04:00
if ( signkey == null ) return { 'action' : 'acmactivate' , 'error' : 2 , 'errorText' : "Can't sign ACM request, no signing certificate found." } ; // Did not find a match.
2019-06-19 20:16:50 -04:00
2020-10-27 01:52:52 -04:00
// If the matching certificate our wildcard root cert, we can use the root to match any FQDN
if ( domain . amtacmactivation . certs [ certIndex ] . cn == '*' ) {
// Create a leaf certificate that matches the FQDN we want
// TODO: This is an expensive operation, work on ways to pre-generate or cache this leaf certificate.
var rootcert = { cert : domain . amtacmactivation . certs [ certIndex ] . rootcert , key : obj . pki . privateKeyFromPem ( domain . amtacmactivation . certs [ certIndex ] . key ) } ;
var leafcert = obj . IssueWebServerCertificate ( rootcert , false , request . fqdn , 'mc' , 'Intel(R) Client Setup Certificate' , { serverAuth : true , '2.16.840.1.113741.1.2.3' : true } , false ) ;
// Setup the certificate chain and key
certChain = [ pemToBase64 ( obj . pki . certificateToPem ( leafcert . cert ) ) , pemToBase64 ( obj . pki . certificateToPem ( domain . amtacmactivation . certs [ certIndex ] . rootcert ) ) ] ;
signkey = obj . pki . privateKeyToPem ( leafcert . key ) ;
}
2019-06-19 20:59:03 -04:00
// Setup both nonces, ready to be signed
2019-06-19 21:11:00 -04:00
const mcNonce = Buffer . from ( obj . crypto . randomBytes ( 20 ) , 'binary' ) ;
2019-06-19 20:59:03 -04:00
const fwNonce = Buffer . from ( request . nonce , 'base64' ) ;
2019-06-19 20:16:50 -04:00
// Sign the request
var signature = null ;
try {
var signer = obj . crypto . createSign ( hashAlgo ) ;
2019-06-19 20:59:03 -04:00
signer . update ( Buffer . concat ( [ fwNonce , mcNonce ] ) ) ;
2019-06-19 20:16:50 -04:00
signature = signer . sign ( signkey , 'base64' ) ;
2020-10-27 01:52:52 -04:00
} catch ( ex ) {
return { 'action' : 'acmactivate' , 'error' : 4 , 'errorText' : "Unable to perform signature." } ;
}
2019-06-19 20:16:50 -04:00
2019-06-20 17:27:57 -04:00
// Log the activation request, logging is a required step for activation.
2020-10-22 17:35:12 -04:00
if ( obj . logAmtActivation ( domain , { time : new Date ( ) , action : 'acmactivate' , domain : domain . id , amtUuid : request . uuid , certHash : request . hash , hashType : hashAlgo , amtRealm : request . realm , amtFqdn : request . fqdn , user : user , password : pass , ipport : ipport , nodeid : nodeid , meshid : meshid , computerName : computerName , agentId : agentId , tag : request . tag , name : request . name } ) == false ) return { 'action' : 'acmactivate' , 'error' : 5 , 'errorText' : "Unable to log operation." } ;
2019-06-20 17:27:57 -04:00
2019-06-19 20:16:50 -04:00
// Return the signature with the computed account password hash
2019-06-19 20:59:03 -04:00
return { 'action' : 'acmactivate' , 'signature' : signature , 'password' : obj . crypto . createHash ( 'md5' ) . update ( user + ':' + request . realm + ':' + pass ) . digest ( 'hex' ) , 'nonce' : mcNonce . toString ( 'base64' ) , 'certs' : certChain } ;
2019-06-19 20:16:50 -04:00
}
2020-10-27 01:52:52 -04:00
// Remove the PEM header, footer and carriage returns so we only have the Base64 DER.
function pemToBase64 ( pem ) { return pem . split ( '-----BEGIN CERTIFICATE-----' ) . join ( '' ) . split ( '-----END CERTIFICATE-----' ) . join ( '' ) . split ( '\r\n' ) . join ( '' ) ; }
2021-01-06 06:06:42 -05:00
// Return true if both arrays match
function compareArrays ( a1 , a2 ) {
if ( Array . isArray ( a1 ) == false ) return false ;
if ( Array . isArray ( a2 ) == false ) return false ;
if ( a1 . length !== a2 . length ) return false ;
for ( var i = 0 ; i < a1 . length ; i ++ ) { if ( a1 [ i ] !== a2 [ i ] ) return false ; }
return true ;
}
2020-10-26 15:46:30 -04:00
// Log the Intel AMT activation operation in the domain log
2019-06-20 17:27:57 -04:00
obj . logAmtActivation = function ( domain , x ) {
2020-10-26 15:46:30 -04:00
if ( x == null ) return true ;
2021-04-03 21:29:02 -04:00
// Add the password to the Intel AMT list of UUID to passwords
if ( ( typeof x . amtUuid == 'string' ) && ( typeof x . password == 'string' ) ) {
if ( parent . amtPasswords == null ) { parent . amtPasswords = { } ; }
if ( parent . amtPasswords [ x . amtUuid ] == null ) {
parent . amtPasswords [ x . amtUuid ] = [ x . password ] ; // Add password to array
parent . amtPasswords = parent . common . sortObj ( parent . amtPasswords ) ;
} else {
if ( parent . amtPasswords [ x . amtUuid ] . indexOf ( x . password ) == - 1 ) {
parent . amtPasswords [ x . amtUuid ] . unshift ( x . password ) ; // Add password at the start of the array
while ( parent . amtPasswords [ x . amtUuid ] . length > 3 ) { parent . amtPasswords [ x . amtUuid ] . pop ( ) ; } // Only keep the 3 last passwords for any given device
}
}
}
// Append to the log file
2019-06-20 17:27:57 -04:00
var logpath = null ;
2020-10-26 15:46:30 -04:00
if ( ( domain . amtacmactivation == null ) || ( domain . amtacmactivation . log == null ) || ( typeof domain . amtacmactivation . log != 'string' ) ) {
if ( domain . id == '' ) { logpath = parent . path . join ( obj . parent . datapath , 'amtactivation.log' ) ; } else { logpath = parent . path . join ( obj . parent . datapath , 'amtactivation-' + domain . id + '.log' ) ; }
} else {
2021-07-29 10:38:44 -04:00
logpath = parent . common . joinPath ( obj . parent . datapath , domain . amtacmactivation . log ) ;
2020-10-26 15:46:30 -04:00
}
2019-06-20 17:27:57 -04:00
try { obj . fs . appendFileSync ( logpath , JSON . stringify ( x ) + '\r\n' ) ; } catch ( ex ) { console . log ( ex ) ; return false ; }
return true ;
}
2019-06-19 20:16:50 -04:00
// Load Intel AMT ACM activation certificates
obj . loadIntelAmtAcmCerts = function ( amtacmactivation ) {
if ( amtacmactivation == null ) return ;
var acmCerts = [ ] , acmmatch = [ ] ;
2022-02-24 14:00:40 -05:00
amtacmactivation . acmCertErrors = [ ] ;
2019-06-19 20:16:50 -04:00
if ( amtacmactivation . certs != null ) {
for ( var j in amtacmactivation . certs ) {
2021-01-06 17:23:07 -05:00
if ( j . startsWith ( '_' ) ) continue ; // Skip any certificates that start with underscore as the name.
2019-06-20 21:23:52 -04:00
var acmconfig = amtacmactivation . certs [ j ] , r = null ;
if ( ( typeof acmconfig . certpfx == 'string' ) && ( typeof acmconfig . certpfxpass == 'string' ) ) {
// P12 format, certpfx and certpfxpass
2022-02-24 14:00:40 -05:00
const certFilePath = parent . common . joinPath ( obj . parent . datapath , acmconfig . certpfx ) ;
try { r = obj . loadPfxCertificate ( certFilePath , acmconfig . certpfxpass ) ; } catch ( ex ) { console . log ( ex ) ; }
if ( ( r == null ) || ( r . certs == null ) || ( r . keys == null ) ) { amtacmactivation . acmCertErrors . push ( "Unable to load certificate file: " + certFilePath + "." ) ; continue ; }
if ( r . certs . length < 2 ) { amtacmactivation . acmCertErrors . push ( "Certificate file contains less then 2 certificates: " + certFilePath + "." ) ; continue ; }
if ( r . keys . length != 1 ) { amtacmactivation . acmCertErrors . push ( "Certificate file must contain exactly one private key: " + certFilePath + "." ) ; continue ; }
2019-06-20 21:23:52 -04:00
} else if ( ( typeof acmconfig . certfiles == 'object' ) && ( typeof acmconfig . keyfile == 'string' ) ) {
// PEM format, certfiles and keyfile
r = { certs : [ ] , keys : [ ] } ;
2022-02-24 14:00:40 -05:00
for ( var k in acmconfig . certfiles ) {
const certFilePath = parent . common . joinPath ( obj . parent . datapath , acmconfig . certfiles [ k ] ) ;
try { r . certs . push ( obj . pki . certificateFromPem ( obj . fs . readFileSync ( certFilePath ) ) ) ; } catch ( ex ) { amtacmactivation . acmCertErrors . push ( "Unable to load certificate file: " + certFilePath + "." ) ; }
}
2021-08-08 15:22:29 -04:00
r . keys . push ( obj . pki . privateKeyFromPem ( obj . fs . readFileSync ( parent . common . joinPath ( obj . parent . datapath , acmconfig . keyfile ) ) ) ) ;
2022-02-24 14:00:40 -05:00
if ( r . certs . length < 2 ) { amtacmactivation . acmCertErrors . push ( "Certificate file contains less then 2 certificates: " + certFilePath + "." ) ; continue ; }
if ( r . keys . length != 1 ) { amtacmactivation . acmCertErrors . push ( "Certificate file must contain exactly one private key: " + certFilePath + "." ) ; continue ; }
2019-06-20 21:23:52 -04:00
}
2020-08-19 14:22:19 -04:00
// Reorder the certificates from leaf to root.
var orderedCerts = [ ] , or = [ ] , currenthash = null , orderingError = false ; ;
while ( ( orderingError == false ) && ( orderedCerts . length < r . certs . length ) ) {
orderingError = true ;
for ( var k in r . certs ) {
if ( ( ( currenthash == null ) && ( r . certs [ k ] . subject . hash == r . certs [ k ] . issuer . hash ) ) || ( ( r . certs [ k ] . issuer . hash == currenthash ) && ( r . certs [ k ] . subject . hash != r . certs [ k ] . issuer . hash ) ) ) {
currenthash = r . certs [ k ] . subject . hash ;
orderedCerts . unshift ( Buffer . from ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( r . certs [ k ] ) ) . data , 'binary' ) . toString ( 'base64' ) ) ;
or . unshift ( r . certs [ k ] ) ;
orderingError = false ;
}
}
}
2022-02-24 14:00:40 -05:00
if ( orderingError == true ) { amtacmactivation . acmCertErrors . push ( "Unable to order Intel AMT ACM activation certificates to create a full chain." ) ; continue ; }
2020-08-19 14:22:19 -04:00
r . certs = or ;
2021-01-06 06:06:42 -05:00
// Check that the certificate and private key match
if ( ( compareArrays ( r . certs [ 0 ] . publicKey . n . data , r . keys [ 0 ] . n . data ) == false ) || ( compareArrays ( r . certs [ 0 ] . publicKey . e . data , r . keys [ 0 ] . e . data ) == false ) ) {
2022-02-24 14:00:40 -05:00
amtacmactivation . acmCertErrors . push ( "Intel AMT activation certificate provided with a mismatching private key." ) ;
2021-01-06 06:06:42 -05:00
continue ;
}
2019-06-20 21:23:52 -04:00
/ *
// Debug: Display all certs & key as PEM
for ( var k in r . certs ) {
var cn = r . certs [ k ] . subject . getField ( 'CN' ) ;
if ( cn != null ) { console . log ( cn . value + '\r\n' + obj . pki . certificateToPem ( r . certs [ k ] ) ) ; } else { console . log ( obj . pki . certificateToPem ( r . certs [ k ] ) ) ; }
}
console . log ( obj . pki . privateKeyToPem ( r . keys [ 0 ] ) ) ;
* /
2019-06-19 20:16:50 -04:00
// Check if the right OU or OID is present for Intel AMT activation
var validActivationCert = false ;
for ( var k in r . certs [ 0 ] . extensions ) { if ( r . certs [ 0 ] . extensions [ k ] [ '2.16.840.1.113741.1.2.3' ] == true ) { validActivationCert = true ; } }
var orgName = r . certs [ 0 ] . subject . getField ( 'OU' ) ;
if ( ( orgName != null ) && ( orgName . value == 'Intel(R) Client Setup Certificate' ) ) { validActivationCert = true ; }
2022-02-24 14:00:40 -05:00
if ( validActivationCert == false ) { amtacmactivation . acmCertErrors . push ( "Intel AMT activation certificate must have usage OID \"2.16.840.1.113741.1.2.3\" or organization name \"Intel(R) Client Setup Certificate\"." ) ; continue ; }
2019-06-19 20:16:50 -04:00
// Compute the SHA256 and SHA1 hashes of the root certificate
for ( var k in r . certs ) {
2022-02-24 15:22:01 -05:00
if ( r . certs [ k ] . subject . hash != r . certs [ k ] . issuer . hash ) continue ;
2019-06-19 20:16:50 -04:00
const certdata = obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( r . certs [ k ] ) ) . data ;
var md = obj . forge . md . sha256 . create ( ) ;
md . update ( certdata ) ;
acmconfig . sha256 = Buffer . from ( md . digest ( ) . getBytes ( ) , 'binary' ) . toString ( 'hex' ) ;
md = obj . forge . md . sha1 . create ( ) ;
md . update ( certdata ) ;
acmconfig . sha1 = Buffer . from ( md . digest ( ) . getBytes ( ) , 'binary' ) . toString ( 'hex' ) ;
}
2022-02-24 14:00:40 -05:00
if ( ( acmconfig . sha1 == null ) || ( acmconfig . sha256 == null ) ) { amtacmactivation . acmCertErrors . push ( "Unable to compute Intel AMT activation certificate SHA1 and SHA256 hashes." ) ; continue ; }
2019-06-19 20:16:50 -04:00
// Get the certificate common name
var certCommonName = r . certs [ 0 ] . subject . getField ( 'CN' ) ;
2022-02-24 14:00:40 -05:00
if ( certCommonName == null ) { amtacmactivation . acmCertErrors . push ( "Unable to get Intel AMT activation certificate common name." ) ; continue ; }
2022-08-16 00:49:01 -04:00
if ( amtacmactivation . strictcommonname == true ) {
// Use the certificate common name exactly
2019-06-19 20:16:50 -04:00
acmconfig . cn = certCommonName . value ;
2022-08-16 00:49:01 -04:00
} else {
// Check if Intel AMT will allow some flexibility in the certificate common name
var certCommonNameSplit = certCommonName . value . split ( '.' ) ;
var topLevel = certCommonNameSplit [ certCommonNameSplit . length - 1 ] . toLowerCase ( ) ;
var topLevelNum = TopLevelDomainExtendedSupport [ topLevel ] ;
if ( topLevelNum != null ) {
while ( certCommonNameSplit . length > topLevelNum ) { certCommonNameSplit . shift ( ) ; }
acmconfig . cn = certCommonNameSplit . join ( '.' ) ;
} else {
acmconfig . cn = certCommonName . value ;
}
2019-06-19 20:16:50 -04:00
}
2023-09-18 04:31:43 -04:00
if ( r . certs [ 0 ] . md ) {
2023-08-30 07:29:09 -04:00
acmconfig . hashAlgorithm = r . certs [ 0 ] . md . algorithm ;
}
2023-06-13 19:17:42 -04:00
2019-06-19 20:16:50 -04:00
delete acmconfig . cert ;
delete acmconfig . certpass ;
acmconfig . certs = orderedCerts ;
acmconfig . key = obj . pki . privateKeyToPem ( r . keys [ 0 ] ) ;
acmCerts . push ( acmconfig ) ;
2020-10-26 23:39:04 -04:00
acmmatch . push ( { sha256 : acmconfig . sha256 , sha1 : acmconfig . sha1 , cn : acmconfig . cn } ) ;
2019-06-19 20:16:50 -04:00
}
}
amtacmactivation . acmmatch = acmmatch ;
amtacmactivation . certs = acmCerts ;
// Add the MeshCentral root cert as a possible activation cert
if ( obj . parent . certificates . root ) {
var x1 = obj . parent . certificates . root . cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = obj . parent . certificates . root . cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
var sha256 = obj . crypto . createHash ( 'sha256' ) . update ( Buffer . from ( obj . parent . certificates . root . cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
var sha1 = obj . crypto . createHash ( 'sha1' ) . update ( Buffer . from ( obj . parent . certificates . root . cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
2020-10-27 01:52:52 -04:00
amtacmactivation . certs . push ( { 'sha256' : sha256 , 'sha1' : sha1 , 'cn' : '*' , rootcert : obj . pki . certificateFromPem ( obj . parent . certificates . root . cert ) , key : obj . parent . certificates . root . key } ) ;
2019-06-19 20:16:50 -04:00
amtacmactivation . acmmatch . push ( { 'sha256' : sha256 , 'sha1' : sha1 , 'cn' : '*' } ) ;
}
}
2020-10-26 23:39:04 -04:00
}
2021-01-20 12:54:51 -05:00
// Load a generic certificate and key from PFX/P12 or PEM format. Load both keys and attributes.
obj . loadGenericCertAndKey = function ( config ) {
if ( ( typeof config . certpfx == 'string' ) || ( typeof config . certpfxpass == 'string' ) ) {
// Load a PFX certificate
var r = null ;
try { r = obj . loadPfxCertificate ( parent . getConfigFilePath ( config . certpfx ) , config . certpfxpass ) ; } catch ( ex ) { console . log ( ex ) ; }
if ( ( r != null ) && ( r . keys . length > 0 ) && ( r . certs . length > 0 ) ) {
var attributes = { } ;
for ( var j in r . certs [ 0 ] . subject . attributes ) { attributes [ r . certs [ 0 ] . subject . attributes [ j ] . shortName ] = r . certs [ 0 ] . subject . attributes [ j ] . value ; }
return { cert : obj . pki . certificateToPem ( r . certs [ 0 ] ) , key : obj . pki . privateKeyToPem ( r . keys [ 0 ] ) , attributes : attributes } ;
}
}
if ( ( typeof config . certfile == 'string' ) || ( typeof config . keyfile == 'string' ) ) {
// Load a PEM certificate
var r = { }
r . cert = obj . fs . readFileSync ( parent . getConfigFilePath ( config . certfile ) , 'utf8' ) ;
r . key = obj . fs . readFileSync ( parent . getConfigFilePath ( config . keyfile ) , 'utf8' ) ;
var cert = obj . pki . certificateFromPem ( r . cert ) ;
r . attributes = { } ;
for ( var j in cert . subject . attributes ) { r . attributes [ cert . subject . attributes [ j ] . shortName ] = cert . subject . attributes [ j ] . value ; }
return r ;
}
return null ;
}
2020-10-26 23:39:04 -04:00
// Get the setup.bin file
2020-10-27 05:15:52 -04:00
obj . GetSetupBinFile = function ( amtacmactivation , oldmebxpass , newmebxpass , domain , user ) {
2020-10-26 23:39:04 -04:00
// Create a setup.bin file for our own root cert
// Get the wiadcard certificate hash
var wildcardCertSha256 = null ;
for ( var i = 0 ; i < amtacmactivation . acmmatch . length ; i ++ ) { if ( amtacmactivation . acmmatch [ i ] . cn == '*' ) { wildcardCertSha256 = amtacmactivation . acmmatch [ i ] . sha256 ; } }
// Create the Setup.bin stack
const AmtSetupBinStack = require ( './amt/amt-setupbin' ) ( ) ;
var setupbin = AmtSetupBinStack . AmtSetupBinCreate ( 3 , 1 ) ; // Version 3, 1 = Records will not be consumed.
var certRootName = 'MeshCentral' ;
2021-03-08 02:31:19 -05:00
// Figure out what trusted FQDN to use.
var trustedFQDN = 'rootcert.meshcentral.com' ; // Default DNS name. Any DNS name will do, we this is the fallback.
if ( typeof domain . dns == 'string' ) {
// Use domain DNS name
trustedFQDN = domain . dns ;
} else if ( typeof parent . config . settings . cert == 'string' ) {
// Use main DNS name
trustedFQDN = parent . config . settings . cert ;
}
2020-10-26 23:39:04 -04:00
// Create a new record
var r = { } ;
r . typeIdentifier = 1 ;
r . flags = 1 ; // Valid, unscrambled record.
r . chunkCount = 0 ;
r . headerByteCount = 0 ;
r . number = 0 ;
r . variables = [ ] ;
setupbin . records . push ( r ) ;
// Create "Current MEBx Password" variable
var v = { } ;
v . moduleid = 1 ;
v . varid = 1 ;
v . length = - 1 ;
v . value = oldmebxpass ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "New MEBx Password" variable
v = { } ;
v . moduleid = 1 ;
v . varid = 2 ;
v . length = - 1 ;
v . value = newmebxpass ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "User Defined Certificate Addition" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 8 ;
v . length = - 1 ;
v . value = String . fromCharCode ( 2 ) + Buffer . from ( wildcardCertSha256 , 'hex' ) . toString ( 'binary' ) + String . fromCharCode ( certRootName . length ) + certRootName ; // 2 = SHA256 hash type
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "PKI DNS Suffix" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 3 ;
v . length = - 1 ;
2021-03-08 02:31:19 -05:00
v . value = trustedFQDN ;
2020-10-26 23:39:04 -04:00
setupbin . records [ 0 ] . variables . push ( v ) ;
2020-11-24 22:56:59 -05:00
// Create "ME Provision Halt Active" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 28 ;
v . length = - 1 ;
2021-03-13 21:15:53 -05:00
v . value = 0 ; // Stop
2020-11-24 22:56:59 -05:00
setupbin . records [ 0 ] . variables . push ( v ) ;
2020-10-27 05:15:52 -04:00
// Write to log file
2021-03-13 21:15:53 -05:00
obj . logAmtActivation ( domain , { time : new Date ( ) , action : 'setupbin' , domain : domain . id , userid : user . _id , oldmebx : oldmebxpass , newmebx : newmebxpass , rootname : certRootName , hash : wildcardCertSha256 , dns : trustedFQDN } ) ;
2019-06-19 20:16:50 -04:00
2020-10-27 05:15:52 -04:00
// Encode the setup.bin file
return AmtSetupBinStack . AmtSetupBinEncode ( setupbin ) ;
2019-06-19 20:16:50 -04:00
}
2021-03-12 16:44:42 -05:00
// Get a bare metal setup.bin file
obj . GetBareMetalSetupBinFile = function ( amtacmactivation , oldmebxpass , newmebxpass , domain , user ) {
// Create a setup.bin file for our own root cert
// Get the wiadcard certificate hash
var wildcardCertSha256 = null ;
for ( var i = 0 ; i < amtacmactivation . acmmatch . length ; i ++ ) { if ( amtacmactivation . acmmatch [ i ] . cn == '*' ) { wildcardCertSha256 = amtacmactivation . acmmatch [ i ] . sha256 ; } }
// Create the Setup.bin stack
const AmtSetupBinStack = require ( './amt/amt-setupbin' ) ( ) ;
var setupbin = AmtSetupBinStack . AmtSetupBinCreate ( 3 , 1 ) ; // Version 3, 1 = Records will not be consumed.
var certRootName = 'MeshCentral' ;
// Figure out what trusted FQDN to use.
var trustedFQDN = parent . config . settings . amtprovisioningserver . trustedfqdn
// Figure out the provisioning server port
var port = 9971 ;
if ( typeof parent . config . settings . amtprovisioningserver . port == 'number' ) { port = parent . config . settings . amtprovisioningserver . port ; }
2021-03-13 03:53:27 -05:00
// Get the provisioning server IP address from the config file
if ( typeof parent . config . settings . amtprovisioningserver . ip != 'string' ) return null ;
var ipaddr = parent . config . settings . amtprovisioningserver . ip ;
2021-03-12 16:44:42 -05:00
var ipaddrSplit = ipaddr . split ( '.' ) ;
var ipaddrStr = String . fromCharCode ( parseInt ( ipaddrSplit [ 3 ] ) ) + String . fromCharCode ( parseInt ( ipaddrSplit [ 2 ] ) ) + String . fromCharCode ( parseInt ( ipaddrSplit [ 1 ] ) ) + String . fromCharCode ( parseInt ( ipaddrSplit [ 0 ] ) ) ;
// Create a new record
var r = { } ;
r . typeIdentifier = 1 ;
r . flags = 1 ; // Valid, unscrambled record.
r . chunkCount = 0 ;
r . headerByteCount = 0 ;
r . number = 0 ;
r . variables = [ ] ;
setupbin . records . push ( r ) ;
// Create "Current MEBx Password" variable
var v = { } ;
v . moduleid = 1 ;
v . varid = 1 ;
v . length = - 1 ;
v . value = oldmebxpass ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "New MEBx Password" variable
v = { } ;
v . moduleid = 1 ;
v . varid = 2 ;
v . length = - 1 ;
v . value = newmebxpass ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "User Defined Certificate Addition" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 8 ;
v . length = - 1 ;
v . value = String . fromCharCode ( 2 ) + Buffer . from ( wildcardCertSha256 , 'hex' ) . toString ( 'binary' ) + String . fromCharCode ( certRootName . length ) + certRootName ; // 2 = SHA256 hash type
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "PKI DNS Suffix" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 3 ;
v . length = - 1 ;
v . value = trustedFQDN ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "Configuration Server FQDN" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 4 ;
v . length = - 1 ;
v . value = trustedFQDN ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "Provisioning Server Address" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 17 ;
v . length = - 1 ;
v . value = ipaddrStr ;
setupbin . records [ 0 ] . variables . push ( v ) ;
// Create "Provisioning Server Port Number" variable
v = { } ;
v . moduleid = 2 ;
v . varid = 18 ;
v . length = - 1 ;
v . value = port ;
setupbin . records [ 0 ] . variables . push ( v ) ;
2021-03-12 19:05:18 -05:00
// Create "ME Provision Halt Active" variable
2021-03-12 16:44:42 -05:00
v = { } ;
v . moduleid = 2 ;
2021-03-12 19:05:18 -05:00
v . varid = 28 ;
2021-03-12 16:44:42 -05:00
v . length = - 1 ;
2021-03-12 19:05:18 -05:00
v . value = 1 ; // Start
2021-03-12 16:44:42 -05:00
setupbin . records [ 0 ] . variables . push ( v ) ;
// Write to log file
2021-03-13 21:15:53 -05:00
obj . logAmtActivation ( domain , { time : new Date ( ) , action : 'setupbin-bare-metal' , domain : domain . id , userid : user . _id , oldmebx : oldmebxpass , newmebx : newmebxpass , rootname : certRootName , hash : wildcardCertSha256 , dns : trustedFQDN , ip : ipaddr , port : port } ) ;
2021-03-12 16:44:42 -05:00
// Encode the setup.bin file
return AmtSetupBinStack . AmtSetupBinEncode ( setupbin ) ;
}
2019-06-12 22:40:27 -04:00
// Return the certificate of the remote HTTPS server
obj . loadPfxCertificate = function ( filename , password ) {
var r = { certs : [ ] , keys : [ ] } ;
2019-06-20 21:23:52 -04:00
var pfxb64 = Buffer . from ( obj . fs . readFileSync ( filename ) ) . toString ( 'base64' ) ;
var pfx = obj . forge . pkcs12 . pkcs12FromAsn1 ( obj . forge . asn1 . fromDer ( obj . forge . util . decode64 ( pfxb64 ) ) , true , password ) ;
2019-06-12 22:40:27 -04:00
// Get the certs from certbags
var bags = pfx . getBags ( { bagType : obj . forge . pki . oids . certBag } ) ;
for ( var i = 0 ; i < bags [ obj . forge . pki . oids . certBag ] . length ; i ++ ) { r . certs . push ( bags [ obj . forge . pki . oids . certBag ] [ i ] . cert ) ; }
2019-06-20 21:23:52 -04:00
2019-06-12 22:40:27 -04:00
// Get shrouded key from key bags
bags = pfx . getBags ( { bagType : obj . forge . pki . oids . pkcs8ShroudedKeyBag } ) ;
for ( var i = 0 ; i < bags [ obj . forge . pki . oids . pkcs8ShroudedKeyBag ] . length ; i ++ ) { r . keys . push ( bags [ obj . forge . pki . oids . pkcs8ShroudedKeyBag ] [ i ] . key ) ; }
return r ;
}
2020-12-10 16:56:15 -05:00
// Return a text file from a remote HTTPS server
obj . loadTextFile = function ( url , tag , func ) {
const u = require ( 'url' ) . parse ( url ) ;
if ( u . protocol == 'https:' ) {
// Read from HTTPS
const https = require ( 'https' ) ;
https . get ( url , function ( resp ) {
var data = '' ;
resp . on ( 'data' , function ( chunk ) { data += chunk ; } ) ;
resp . on ( 'end' , function ( ) { func ( url , data , tag ) ; } ) ;
resp . on ( 'error' , function ( chunk ) { func ( url , null , tag ) ; } ) ;
} ) . on ( 'error' , function ( err ) { func ( url , null , tag ) ; } ) ;
} else if ( u . protocol == 'file:' ) {
// Read a file
obj . fs . readFile ( url . substring ( 7 ) , 'utf8' , function ( err , data ) {
func ( url , err ? null : data , tag ) ;
} ) ;
} else { func ( url , null , tag ) ; }
} ;
2018-10-31 19:03:09 -04:00
// Return the certificate of the remote HTTPS server
2019-10-29 14:10:57 -04:00
obj . loadCertificate = function ( url , hostname , tag , func ) {
2018-11-30 19:42:58 -05:00
const u = require ( 'url' ) . parse ( url ) ;
2018-10-31 19:03:09 -04:00
if ( u . protocol == 'https:' ) {
2018-11-30 19:42:58 -05:00
// Read the certificate from HTTPS
2019-10-29 14:10:57 -04:00
if ( hostname == null ) { hostname = u . hostname ; }
2020-03-19 16:42:37 -04:00
parent . debug ( 'cert' , "loadCertificate() - Loading certificate from " + u . hostname + ":" + ( u . port ? u . port : 443 ) + ", Hostname: " + hostname + "..." ) ;
const tlssocket = obj . tls . connect ( ( u . port ? u . port : 443 ) , u . hostname , { servername : hostname , rejectUnauthorized : false } , function ( ) {
this . xxcert = this . getPeerCertificate ( ) ;
parent . debug ( 'cert' , "loadCertificate() - TLS connected, " + ( ( this . xxcert != null ) ? "got certificate." : "no certificate." ) ) ;
try { this . destroy ( ) ; } catch ( ex ) { }
this . xxfunc ( this . xxurl , ( this . xxcert == null ) ? null : ( this . xxcert . raw . toString ( 'binary' ) ) , hostname , this . xxtag ) ;
} ) ;
2018-10-31 19:03:09 -04:00
tlssocket . xxurl = url ;
tlssocket . xxfunc = func ;
tlssocket . xxtag = tag ;
2020-03-19 16:42:37 -04:00
tlssocket . on ( 'error' , function ( error ) { try { this . destroy ( ) ; } catch ( ex ) { } parent . debug ( 'cert' , "loadCertificate() - TLS error: " + error ) ; this . xxfunc ( this . xxurl , null , hostname , this . xxtag ) ; } ) ;
2018-11-30 19:42:58 -05:00
} else if ( u . protocol == 'file:' ) {
// Read the certificate from a file
obj . fs . readFile ( url . substring ( 7 ) , 'utf8' , function ( err , data ) {
2020-12-10 16:56:15 -05:00
if ( err ) { func ( url , null , hostname , tag ) ; return ; }
2018-11-30 19:42:58 -05:00
var x1 = data . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = data . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
2019-10-29 14:10:57 -04:00
func ( url , Buffer . from ( data . substring ( x1 + 27 , x2 ) , 'base64' ) . toString ( 'binary' ) , hostname , tag ) ;
2018-11-30 19:42:58 -05:00
} else {
2019-10-29 14:10:57 -04:00
func ( url , data , hostname , tag ) ;
2018-11-30 19:42:58 -05:00
}
} ) ;
2019-10-29 19:17:29 -04:00
} else { func ( url , null , hostname , tag ) ; }
2018-10-31 19:03:09 -04:00
} ;
2019-02-02 17:54:36 -05:00
// Check if a configuration file exists
obj . fileExists = function ( filename ) {
if ( ( parent . configurationFiles != null ) && ( parent . configurationFiles [ filename ] != null ) ) { return true ; }
var filePath = parent . getConfigFilePath ( filename ) ;
try { return obj . fs . statSync ( filePath ) . isFile ( ) ; } catch ( err ) { return false ; }
} ;
// Load a configuration file
obj . fileLoad = function ( filename , encoding ) {
if ( ( parent . configurationFiles != null ) && ( parent . configurationFiles [ filename ] != null ) ) {
2019-10-14 16:35:27 -04:00
if ( typeof parent . configurationFiles [ filename ] == 'string' ) { return fixEndOfLines ( parent . configurationFiles [ filename ] ) ; }
2019-02-02 17:54:36 -05:00
return fixEndOfLines ( parent . configurationFiles [ filename ] . toString ( ) ) ;
} else {
return fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( filename ) , encoding ) ) ;
}
}
2018-11-01 18:01:21 -04:00
// Return the SHA384 hash of the certificate public key
2017-10-15 02:22:19 -04:00
obj . getPublicKeyHash = function ( cert ) {
var publickey = obj . pki . certificateFromPem ( cert ) . publicKey ;
2019-12-01 15:52:32 -05:00
return obj . pki . getPublicKeyFingerprint ( publickey , { encoding : 'hex' , md : obj . forge . md . sha384 . create ( ) } ) ;
2018-08-29 20:40:30 -04:00
} ;
2017-09-29 17:26:51 -04:00
2021-03-14 00:26:59 -05:00
// Return the SHA1 hash of the certificate, return hex
2019-10-05 17:24:40 -04:00
obj . getCertHashSha1 = function ( cert ) {
try {
var md = obj . forge . md . sha1 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . toHex ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
return obj . crypto . createHash ( 'sha1' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
2019-12-01 15:52:32 -05:00
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
2019-10-05 17:24:40 -04:00
}
} ;
2021-03-14 00:26:59 -05:00
// Return the SHA256 hash of the certificate, return hex
obj . getCertHashSha256 = function ( cert ) {
try {
var md = obj . forge . md . sha256 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . toHex ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
return obj . crypto . createHash ( 'sha256' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
}
} ;
2018-11-30 19:42:58 -05:00
// Return the SHA384 hash of the certificate, return hex
obj . getCertHash = function ( cert ) {
try {
var md = obj . forge . md . sha384 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . toHex ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
2019-01-02 21:03:34 -05:00
return obj . crypto . createHash ( 'sha384' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'hex' ) ;
2019-12-01 15:52:32 -05:00
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
2018-11-30 19:42:58 -05:00
}
} ;
// Return the SHA384 hash of the certificate public key
2023-08-21 02:29:08 -04:00
obj . getPublicKeyHashBinary = function ( pem ) {
const { X509Certificate } = require ( 'crypto' ) ;
if ( X509Certificate == null ) {
// This version of NodeJS (<v15.6.0) does not support X509 certs, use Node-Forge instead which only supports RSA certs.
2023-10-01 03:52:17 -04:00
return obj . pki . getPublicKeyFingerprint ( obj . pki . certificateFromPem ( pem ) . publicKey , { encoding : 'binary' , md : obj . forge . md . sha384 . create ( ) } ) ;
2023-08-21 02:29:08 -04:00
} else {
// This version of NodeJS supports x509 certificates
2023-10-01 03:52:17 -04:00
var cert = new X509Certificate ( pem ) ;
return obj . crypto . createHash ( 'sha384' ) . update ( cert . publicKey . export ( { type : ( ( cert . publicKey . asymmetricKeyType == 'rsa' ) ? 'pkcs1' : 'spki' ) , format : 'der' } ) ) . digest ( 'binary' ) ;
2023-08-21 02:29:08 -04:00
}
2018-11-30 19:42:58 -05:00
} ;
// Return the SHA384 hash of the certificate, return binary
obj . getCertHashBinary = function ( cert ) {
try {
// If this is a RSA certificate, we can use Forge to hash the ASN1
var md = obj . forge . md . sha384 . create ( ) ;
md . update ( obj . forge . asn1 . toDer ( obj . pki . certificateToAsn1 ( obj . pki . certificateFromPem ( cert ) ) ) . getBytes ( ) ) ;
return md . digest ( ) . getBytes ( ) ;
} catch ( ex ) {
// If this is not an RSA certificate, hash the raw PKCS7 out of the PEM file
var x1 = cert . indexOf ( '-----BEGIN CERTIFICATE-----' ) , x2 = cert . indexOf ( '-----END CERTIFICATE-----' ) ;
if ( ( x1 >= 0 ) && ( x2 > x1 ) ) {
2019-01-02 21:03:34 -05:00
return obj . crypto . createHash ( 'sha384' ) . update ( Buffer . from ( cert . substring ( x1 + 27 , x2 ) , 'base64' ) ) . digest ( 'binary' ) ;
2019-12-01 15:52:32 -05:00
} else { console . log ( "ERROR: Unable to decode certificate." ) ; return null ; }
2018-11-30 19:42:58 -05:00
}
} ;
2017-08-28 12:27:45 -04:00
// Create a self-signed certificate
2017-10-18 19:28:05 -04:00
obj . GenerateRootCertificate = function ( addThumbPrintToName , commonName , country , organization , strong ) {
2019-02-11 17:41:15 -05:00
var keys = obj . pki . rsa . generateKeyPair ( { bits : ( strong == true ) ? 3072 : 2048 , e : 0x10001 } ) ;
2017-08-28 12:27:45 -04:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
2020-09-23 12:29:19 -04:00
cert . serialNumber = '' + require ( 'crypto' ) . randomBytes ( 4 ) . readUInt32BE ( 0 ) ;
2020-02-10 15:22:01 -05:00
cert . validity . notBefore = new Date ( 2018 , 0 , 1 ) ;
cert . validity . notAfter = new Date ( 2049 , 11 , 31 ) ;
2019-12-01 15:52:32 -05:00
if ( addThumbPrintToName === true ) { commonName += '-' + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
2018-09-01 16:00:53 -04:00
if ( country == null ) { country = "unknown" ; }
if ( organization == null ) { organization = "unknown" ; }
2019-12-01 15:52:32 -05:00
var attrs = [ { name : 'commonName' , value : commonName } , { name : 'organizationName' , value : organization } , { name : 'countryName' , value : country } ] ;
2017-08-28 12:27:45 -04:00
cert . setSubject ( attrs ) ;
cert . setIssuer ( attrs ) ;
2017-10-02 17:12:29 -04:00
// Create a root certificate
2019-12-01 15:52:32 -05:00
//cert.setExtensions([{ name: 'basicConstraints', cA: true }, { name: 'nsCertType', sslCA: true, emailCA: true, objCA: true }, { name: 'subjectKeyIdentifier' }]);
cert . setExtensions ( [ { name : 'basicConstraints' , cA : true } , { name : 'subjectKeyIdentifier' } , { name : 'keyUsage' , keyCertSign : true } ] ) ;
2017-10-15 02:22:19 -04:00
cert . sign ( keys . privateKey , obj . forge . md . sha384 . create ( ) ) ;
2017-08-28 12:27:45 -04:00
return { cert : cert , key : keys . privateKey } ;
2018-08-29 20:40:30 -04:00
} ;
2017-08-28 12:27:45 -04:00
// Issue a certificate from a root
2017-10-15 02:22:19 -04:00
obj . IssueWebServerCertificate = function ( rootcert , addThumbPrintToName , commonName , country , organization , extKeyUsage , strong ) {
2019-02-11 17:41:15 -05:00
var keys = obj . pki . rsa . generateKeyPair ( { bits : ( strong == true ) ? 3072 : 2048 , e : 0x10001 } ) ;
2017-08-28 12:27:45 -04:00
var cert = obj . pki . createCertificate ( ) ;
cert . publicKey = keys . publicKey ;
2020-09-23 12:29:19 -04:00
cert . serialNumber = '' + require ( 'crypto' ) . randomBytes ( 4 ) . readUInt32BE ( 0 ) ;
2020-02-10 15:22:01 -05:00
cert . validity . notBefore = new Date ( 2018 , 0 , 1 ) ;
cert . validity . notAfter = new Date ( 2049 , 11 , 31 ) ;
2019-12-01 15:52:32 -05:00
if ( addThumbPrintToName === true ) { commonName += "-" + obj . pki . getPublicKeyFingerprint ( cert . publicKey , { encoding : 'hex' } ) . substring ( 0 , 6 ) ; }
var attrs = [ { name : 'commonName' , value : commonName } ] ;
if ( country != null ) { attrs . push ( { name : 'countryName' , value : country } ) ; }
if ( organization != null ) { attrs . push ( { name : 'organizationName' , value : organization } ) ; }
2017-08-28 12:27:45 -04:00
cert . setSubject ( attrs ) ;
cert . setIssuer ( rootcert . cert . subject . attributes ) ;
2017-09-29 17:26:51 -04:00
2019-12-01 15:52:32 -05:00
if ( extKeyUsage == null ) { extKeyUsage = { name : 'extKeyUsage' , serverAuth : true } ; } else { extKeyUsage . name = 'extKeyUsage' ; }
//var extensions = [{ name: 'basicConstraints', cA: false }, { name: 'keyUsage', keyCertSign: true, digitalSignature: true, nonRepudiation: true, keyEncipherment: true, dataEncipherment: true }, extKeyUsage, { name: "nsCertType", client: false, server: true, email: false, objsign: false, sslCA: false, emailCA: false, objCA: false }, { name: "subjectKeyIdentifier" }];
var extensions = [ { name : 'basicConstraints' , cA : false } , { name : 'keyUsage' , keyCertSign : false , digitalSignature : true , nonRepudiation : false , keyEncipherment : true , dataEncipherment : ( extKeyUsage . serverAuth !== true ) } , extKeyUsage , { name : "subjectKeyIdentifier" } ] ;
2019-03-16 17:49:48 -04:00
if ( extKeyUsage . serverAuth === true ) {
2019-03-19 12:54:52 -04:00
// Set subjectAltName according to commonName parsing.
2019-03-16 17:49:48 -04:00
// Ideally, we should let opportunity in given interface to set any type of altNames according to node_forge library
2019-03-19 12:54:52 -04:00
// such as type 2, 6 and 7. (2 -> DNS, 6 -> URI, 7 -> IP)
2019-03-16 17:49:48 -04:00
var altNames = [ ] ;
// According to commonName parsing (IP or DNS), add URI and DNS and/or IP altNames
if ( require ( 'net' ) . isIP ( commonName ) ) {
// set both IP and DNS when commonName is an IP@
altNames . push ( { type : 7 , ip : commonName } ) ;
altNames . push ( { type : 2 , value : commonName } ) ;
} else {
// set only DNS when commonName is a FQDN
altNames . push ( { type : 2 , value : commonName } ) ;
}
2019-12-01 15:52:32 -05:00
altNames . push ( { type : 6 , value : 'http://' + commonName + '/' } )
2019-03-16 17:49:48 -04:00
2019-03-19 12:54:52 -04:00
// Add localhost stuff for easy testing on localhost ;)
2019-12-01 15:52:32 -05:00
altNames . push ( { type : 2 , value : 'localhost' } ) ;
altNames . push ( { type : 6 , value : 'http://localhost/' } ) ;
altNames . push ( { type : 7 , ip : '127.0.0.1' } ) ;
2019-03-16 17:49:48 -04:00
2019-12-01 15:52:32 -05:00
extensions . push ( { name : 'subjectAltName' , altNames : altNames } ) ;
2019-03-16 17:49:48 -04:00
}
2018-12-21 17:39:26 -05:00
2022-05-25 14:05:53 -04:00
if ( extKeyUsage . codeSign === true ) {
extensions = [ { name : 'basicConstraints' , cA : false } , { name : 'keyUsage' , keyCertSign : false , digitalSignature : true , nonRepudiation : false , keyEncipherment : false , dataEncipherment : false } , { name : 'extKeyUsage' , codeSigning : true } , { name : "subjectKeyIdentifier" } ] ;
}
2017-09-29 17:26:51 -04:00
cert . setExtensions ( extensions ) ;
2017-10-15 02:22:19 -04:00
cert . sign ( rootcert . key , obj . forge . md . sha384 . create ( ) ) ;
2018-08-29 20:40:30 -04:00
2017-08-28 12:27:45 -04:00
return { cert : cert , key : keys . privateKey } ;
2018-08-29 20:40:30 -04:00
} ;
2017-08-28 12:27:45 -04:00
2019-01-11 17:01:36 -05:00
// Make sure a string with Mac style CR endo of line is changed to Linux LF style.
function fixEndOfLines ( str ) {
2019-01-15 12:20:21 -05:00
if ( typeof ( str ) != 'string' ) return str ; // If this is not a string, do nothing.
var i = str . indexOf ( '-----' ) ; // Remove everything before "-----".
if ( i > 0 ) { str = str . substring ( i ) ; } // this solves problems with editors that save text file type indicators ahead of the text.
2019-01-11 17:01:36 -05:00
if ( ( typeof ( str ) != 'string' ) || ( str . indexOf ( '\n' ) > 0 ) ) return str ; // If there is a \n in the file, keep the file as-is.
return str . split ( '\r' ) . join ( '\n' ) ; // If there is no \n, replace all \r with \n.
}
2019-03-09 17:28:08 -05:00
// Return true if the name is found in the certificates names, we support wildcard certificates
2023-08-21 02:29:08 -04:00
obj . compareCertificateNames = function ( certNames , name ) {
2019-03-09 17:28:08 -05:00
if ( certNames == null ) return false ;
2022-08-26 18:43:12 -04:00
name = name . toLowerCase ( ) ;
var xcertNames = [ ] ;
for ( var i in certNames ) { xcertNames . push ( certNames [ i ] . toLowerCase ( ) ) ; }
if ( xcertNames . indexOf ( name ) >= 0 ) return true ;
for ( var i in xcertNames ) {
if ( ( xcertNames [ i ] . startsWith ( '*.' ) == true ) && ( name . endsWith ( xcertNames [ i ] . substring ( 1 ) ) == true ) ) { return true ; }
if ( xcertNames [ i ] . startsWith ( 'http://*.' ) == true ) {
if ( name . endsWith ( xcertNames [ i ] . substring ( 8 ) ) == true ) { return true ; }
if ( ( xcertNames [ i ] . endsWith ( '/' ) == true ) && ( name . endsWith ( xcertNames [ i ] . substring ( 8 , xcertNames [ i ] . length - 1 ) ) == true ) ) { return true ; }
2019-03-09 17:28:08 -05:00
}
}
return false ;
}
2020-09-23 13:13:15 -04:00
// Return true if the certificate is valid
obj . checkCertificate = function ( pem , key ) {
2023-08-21 02:29:08 -04:00
const { X509Certificate } = require ( 'crypto' ) ;
if ( X509Certificate == null ) {
// This version of NodeJS (<v15.6.0) does not support X509 certs, use Node-Forge instead which only supports RSA certs.
var cert = null ;
try { cert = obj . pki . certificateFromPem ( pem ) ; } catch ( ex ) { return false ; } // Unable to decode certificate
if ( cert . serialNumber == '' ) return false ; // Empty serial number is not allowed.
} else {
// This version of NodeJS supports x509 certificates
try {
const cert = new X509Certificate ( pem ) ;
if ( ( cert . serialNumber == '' ) || ( cert . serialNumber == null ) ) return false ; // Empty serial number is not allowed.
} catch ( ex ) { return false ; } // Unable to decode certificate
}
2020-09-23 13:13:15 -04:00
return true ;
}
2023-08-21 02:29:08 -04:00
// Get the Common Name from a certificate
obj . getCertificateCommonName = function ( pem , field ) {
if ( field == null ) { field = 'CN' ; }
const { X509Certificate } = require ( 'crypto' ) ;
if ( X509Certificate == null ) {
// This version of NodeJS (<v15.6.0) does not support X509 certs, use Node-Forge instead which only supports RSA certs.
var cert = obj . pki . certificateFromPem ( pem ) ;
if ( cert . subject . getField ( field ) != null ) return cert . subject . getField ( field ) . value ;
} else {
// This version of NodeJS supports x509 certificates
const subjects = new X509Certificate ( pem ) . subject . split ( '\n' ) ;
for ( var i in subjects ) { if ( subjects [ i ] . startsWith ( field + '=' ) ) { return subjects [ i ] . substring ( field . length + 1 ) ; } }
}
return null ;
}
// Get the Issuer Common Name from a certificate
obj . getCertificateIssuerCommonName = function ( pem , field ) {
if ( field == null ) { field = 'CN' ; }
const { X509Certificate } = require ( 'crypto' ) ;
if ( X509Certificate == null ) {
// This version of NodeJS (<v15.6.0) does not support X509 certs, use Node-Forge instead which only supports RSA certs.
var cert = obj . pki . certificateFromPem ( pem ) ;
if ( cert . issuer . getField ( field ) != null ) return cert . issuer . getField ( field ) . value ;
} else {
// This version of NodeJS supports x509 certificates
const subjects = new X509Certificate ( pem ) . issuer . split ( '\n' ) ;
for ( var i in subjects ) { if ( subjects [ i ] . startsWith ( field + '=' ) ) { return subjects [ i ] . substring ( field . length + 1 ) ; } }
}
return null ;
}
// Get the Common Name and alternate names from a certificate
obj . getCertificateAltNames = function ( pem ) {
const altNamesResults = [ ] ;
const { X509Certificate } = require ( 'crypto' ) ;
if ( X509Certificate == null ) {
// This version of NodeJS (<v15.6.0) does not support X509 certs, use Node-Forge instead which only supports RSA certs.
var cert = obj . pki . certificateFromPem ( pem ) ;
if ( cert . subject . getField ( 'CN' ) != null ) { altNamesResults . push ( cert . subject . getField ( 'CN' ) . value ) ; }
var altNames = cert . getExtension ( 'subjectAltName' ) ;
if ( altNames ) {
for ( i = 0 ; i < altNames . altNames . length ; i ++ ) {
if ( ( altNames . altNames [ i ] != null ) && ( altNames . altNames [ i ] . type === 2 ) && ( typeof altNames . altNames [ i ] . value === 'string' ) ) {
var acn = altNames . altNames [ i ] . value . toLowerCase ( ) ;
if ( altNamesResults . indexOf ( acn ) == - 1 ) { altNamesResults . push ( acn ) ; }
}
}
}
} else {
// This version of NodeJS supports x509 certificates
const cert = new X509Certificate ( pem ) ;
const subjects = cert . subject . split ( '\n' ) ;
for ( var i in subjects ) { if ( subjects [ i ] . startsWith ( 'CN=' ) ) { altNamesResults . push ( subjects [ i ] . substring ( 3 ) ) ; } }
var subjectAltNames = cert . subjectAltName ;
if ( subjectAltNames != null ) {
subjectAltNames = subjectAltNames . split ( ', ' ) ;
for ( var i = 0 ; i < subjectAltNames . length ; i ++ ) {
if ( subjectAltNames [ i ] . startsWith ( 'DNS:' ) && altNamesResults . indexOf ( subjectAltNames [ i ] . substring ( 4 ) ) == - 1 ) {
altNamesResults . push ( subjectAltNames [ i ] . substring ( 4 ) ) ;
}
}
}
}
return altNamesResults ;
}
// Get the expiration time from a certificate
obj . getCertificateExpire = function ( pem ) {
const altNamesResults = [ ] ;
const { X509Certificate } = require ( 'crypto' ) ;
if ( X509Certificate == null ) {
// This version of NodeJS (<v15.6.0) does not support X509 certs, use Node-Forge instead which only supports RSA certs.
return Date . parse ( parent . certificateOperations . forge . pki . certificateFromPem ( parent . certificates . web . cert ) . validity . notAfter ) ;
} else {
// This version of NodeJS supports x509 certificates
return Date . parse ( new X509Certificate ( pem ) . validTo ) ;
}
}
2021-08-20 15:03:52 -04:00
// Decrypt private key if needed
obj . decryptPrivateKey = function ( key ) {
if ( typeof key != 'string' ) return key ;
var i = key . indexOf ( '-----BEGIN ENCRYPTED PRIVATE KEY-----' ) ;
var j = key . indexOf ( '-----END ENCRYPTED PRIVATE KEY-----' ) ;
if ( ( i >= 0 ) && ( j > i ) ) {
var passwords = parent . config . settings . certificateprivatekeypassword ;
if ( parent . config . settings . certificateprivatekeypassword == null ) { passwords = [ ] ; }
else if ( typeof parent . config . settings . certificateprivatekeypassword == 'string' ) { passwords = [ parent . config . settings . certificateprivatekeypassword ] ; }
var privateKey = null ;
for ( var k in passwords ) { if ( privateKey == null ) { try { privateKey = obj . pki . decryptRsaPrivateKey ( key , passwords [ k ] ) ; } catch ( ex ) { } } }
if ( privateKey == null ) {
console . log ( "Private certificate key is encrypted, but no correct password was found." ) ;
console . log ( "Add the password to the \"certificatePrivateKeyPassword\" value in the Settings section of the config.json." ) ;
console . log ( "Example: \"certificatePrivateKeyPassword\": [ \"MyPassword\" ]" ) ;
process . exit ( ) ;
return null ;
}
return obj . pki . privateKeyToPem ( privateKey ) ;
}
return key ;
}
2017-08-28 12:27:45 -04:00
// Returns the web server TLS certificate and private key, if not present, create demonstration ones.
2019-02-02 17:54:36 -05:00
obj . GetMeshServerCertificate = function ( args , config , func ) {
2018-08-29 20:40:30 -04:00
var i = 0 ;
2017-10-02 17:12:29 -04:00
var certargs = args . cert ;
2018-03-06 20:50:44 -05:00
var mpscertargs = args . mpscert ;
2017-10-18 19:28:05 -04:00
var strongCertificate = ( args . fastcert ? false : true ) ;
2022-05-25 14:05:53 -04:00
var rcountmax = 5 ;
2018-08-29 20:40:30 -04:00
var caindex = 1 ;
var caok = false ;
var calist = [ ] ;
var dnsname = null ;
2017-08-28 12:27:45 -04:00
// commonName, country, organization
2018-08-29 20:40:30 -04:00
2017-08-28 12:27:45 -04:00
// If the certificates directory does not exist, create it.
2018-07-13 22:18:43 -04:00
if ( ! obj . dirExists ( parent . datapath ) ) { obj . fs . mkdirSync ( parent . datapath ) ; }
2018-08-29 20:40:30 -04:00
var r = { } ;
var rcount = 0 ;
2017-08-28 12:27:45 -04:00
// If the root certificate already exist, load it
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'root-cert-public.crt' ) && obj . fileExists ( 'root-cert-private.key' ) ) {
var rootCertificate = obj . fileLoad ( 'root-cert-public.crt' , 'utf8' ) ;
2021-08-20 15:03:52 -04:00
var rootPrivateKey = obj . decryptPrivateKey ( obj . fileLoad ( 'root-cert-private.key' , 'utf8' ) ) ;
2017-08-28 12:27:45 -04:00
r . root = { cert : rootCertificate , key : rootPrivateKey } ;
rcount ++ ;
2019-11-14 19:10:16 -05:00
// Check if the root certificate has the "Certificate Signing (04)" Key usage.
// This option is required for newer versions of Intel AMT for CIRA/WS-EVENTS.
var xroot = obj . pki . certificateFromPem ( rootCertificate ) ;
2019-12-01 15:52:32 -05:00
var xext = xroot . getExtension ( 'keyUsage' ) ;
2020-09-23 13:13:15 -04:00
if ( ( xext == null ) || ( xext . keyCertSign !== true ) || ( xroot . serialNumber == '' ) ) {
2019-11-14 19:10:16 -05:00
// We need to fix this certificate
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ 'root-cert-public-backup.crt' ] ) ;
2019-12-01 15:52:32 -05:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-public-backup.crt' ) , rootCertificate ) ;
2020-09-23 13:13:15 -04:00
if ( xroot . serialNumber == '' ) { console . log ( "Fixing root certificate to add serial number..." ) ; xroot . serialNumber = '' + require ( 'crypto' ) . randomBytes ( 4 ) . readUInt32BE ( 0 ) ; }
if ( ( xext == null ) || ( xext . keyCertSign !== true ) ) { console . log ( "Fixing root certificate to add signing key usage..." ) ; xroot . setExtensions ( [ { name : 'basicConstraints' , cA : true } , { name : 'subjectKeyIdentifier' } , { name : 'keyUsage' , keyCertSign : true } ] ) ; }
2019-11-14 19:10:16 -05:00
var xrootPrivateKey = obj . pki . privateKeyFromPem ( rootPrivateKey ) ;
xroot . sign ( xrootPrivateKey , obj . forge . md . sha384 . create ( ) ) ;
r . root . cert = obj . pki . certificateToPem ( xroot ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'root-cert-public.crt' ) ] ) ;
2019-12-01 15:52:32 -05:00
try { obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-public.crt' ) , r . root . cert ) ; } catch ( ex ) { }
2019-11-14 19:10:16 -05:00
}
2017-08-28 12:27:45 -04:00
}
2017-10-02 17:12:29 -04:00
2020-05-22 15:54:22 -04:00
// If web certificate exist, load it as default. This is useful for agent-only port. Load both certificate and private key
if ( obj . fileExists ( 'webserver-cert-public.crt' ) && obj . fileExists ( 'webserver-cert-private.key' ) ) {
2021-08-20 15:03:52 -04:00
r . webdefault = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . webdefault . cert , r . webdefault . key ) == false ) { delete r . webdefault ; }
2020-05-22 15:54:22 -04:00
}
2018-11-01 18:01:21 -04:00
if ( args . tlsoffload ) {
2017-10-02 17:12:29 -04:00
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-cert-public.crt' ) ) {
r . web = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . web . cert , null ) == false ) { delete r . web ; } else { rcount ++ ; }
2017-10-02 17:12:29 -04:00
}
} else {
// If the web certificate already exist, load it. Load both certificate and private key
2021-08-20 15:03:52 -04:00
if ( obj . fileExists ( 'webserver-cert-public.crt' ) && obj . decryptPrivateKey ( obj . fileExists ( 'webserver-cert-private.key' ) ) ) {
r . web = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . web . cert , r . web . key ) == false ) { delete r . web ; } else { rcount ++ ; }
2017-10-02 17:12:29 -04:00
}
2017-08-28 12:27:45 -04:00
}
2018-08-29 20:40:30 -04:00
2017-10-02 17:12:29 -04:00
// If the mps certificate already exist, load it
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'mpsserver-cert-public.crt' ) && obj . fileExists ( 'mpsserver-cert-private.key' ) ) {
2021-08-20 15:03:52 -04:00
r . mps = { cert : obj . fileLoad ( 'mpsserver-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'mpsserver-cert-private.key' , 'utf8' ) ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . mps . cert , r . mps . key ) == false ) { delete r . mps ; } else { rcount ++ ; }
2017-08-28 12:27:45 -04:00
}
2018-08-29 20:40:30 -04:00
2017-10-02 17:12:29 -04:00
// If the agent certificate already exist, load it
2019-02-02 17:54:36 -05:00
if ( obj . fileExists ( "agentserver-cert-public.crt" ) && obj . fileExists ( "agentserver-cert-private.key" ) ) {
2021-08-20 15:03:52 -04:00
r . agent = { cert : obj . fileLoad ( "agentserver-cert-public.crt" , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( "agentserver-cert-private.key" , 'utf8' ) ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . agent . cert , r . agent . key ) == false ) { delete r . agent ; } else { rcount ++ ; }
2017-08-28 12:27:45 -04:00
}
2017-09-07 19:01:44 -04:00
2022-05-25 14:05:53 -04:00
// If the code signing certificate already exist, load it
if ( obj . fileExists ( "codesign-cert-public.crt" ) && obj . fileExists ( "codesign-cert-private.key" ) ) {
r . codesign = { cert : obj . fileLoad ( "codesign-cert-public.crt" , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( "codesign-cert-private.key" , 'utf8' ) ) } ;
if ( obj . checkCertificate ( r . codesign . cert , r . codesign . key ) == false ) { delete r . codesign ; } else { rcount ++ ; }
2022-07-21 20:17:08 -04:00
} else {
// If we are reading certificates from a database or vault and are just missing the code signing cert, skip it.
if ( parent . configurationFiles != null ) { rcount ++ ; }
2022-05-25 14:05:53 -04:00
}
2017-11-03 20:01:30 -04:00
// If the swarm server certificate exist, load it (This is an optional certificate)
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'swarmserver-cert-public.crt' ) && obj . fileExists ( 'swarmserver-cert-private.key' ) ) {
2021-08-20 15:03:52 -04:00
r . swarmserver = { cert : obj . fileLoad ( 'swarmserver-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'swarmserver-cert-private.key' , 'utf8' ) ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . swarmserver . cert , r . swarmserver . key ) == false ) { delete r . swarmserver ; }
2017-11-03 20:01:30 -04:00
}
// If the swarm server root certificate exist, load it (This is an optional certificate)
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'swarmserverroot-cert-public.crt' ) ) {
r . swarmserverroot = { cert : obj . fileLoad ( 'swarmserverroot-cert-public.crt' , 'utf8' ) } ;
2020-09-23 13:13:15 -04:00
if ( obj . checkCertificate ( r . swarmserverroot . cert , null ) == false ) { delete r . swarmserverroot ; }
2017-11-03 20:01:30 -04:00
}
2017-09-07 19:01:44 -04:00
// If CA certificates are present, load them
2018-08-29 20:40:30 -04:00
do {
caok = false ;
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-cert-chain' + caindex + '.crt' ) ) {
calist . push ( obj . fileLoad ( 'webserver-cert-chain' + caindex + '.crt' , 'utf8' ) ) ;
2018-08-29 20:40:30 -04:00
caok = true ;
}
caindex ++ ;
} while ( caok === true ) ;
if ( r . web != null ) { r . web . ca = calist ; }
2018-01-02 19:52:49 -05:00
2017-08-28 12:27:45 -04:00
// Decode certificate arguments
2019-12-01 15:52:32 -05:00
var commonName = 'un-configured' ;
2018-08-29 20:40:30 -04:00
var country = null ;
var organization = null ;
var forceWebCertGen = 0 ;
var forceMpsCertGen = 0 ;
2017-08-28 12:27:45 -04:00
if ( certargs != undefined ) {
2019-12-01 15:52:32 -05:00
var xargs = certargs . split ( ',' ) ;
2018-08-29 20:40:30 -04:00
if ( xargs . length > 0 ) { commonName = xargs [ 0 ] ; }
if ( xargs . length > 1 ) { country = xargs [ 1 ] ; }
if ( xargs . length > 2 ) { organization = xargs [ 2 ] ; }
2017-08-28 12:27:45 -04:00
}
2017-10-02 17:12:29 -04:00
2018-03-06 20:50:44 -05:00
// Decode MPS certificate arguments, this is for the Intel AMT CIRA server
2019-12-01 15:52:32 -05:00
var mpsCommonName = ( ( config . settings != null ) && ( typeof config . settings . mpsaliashost == 'string' ) ) ? config . settings . mpsaliashost : commonName ;
2018-08-29 20:40:30 -04:00
var mpsCountry = country ;
var mpsOrganization = organization ;
if ( mpscertargs !== undefined ) {
2019-12-01 15:52:32 -05:00
var xxargs = mpscertargs . split ( ',' ) ;
2018-08-29 20:40:30 -04:00
if ( xxargs . length > 0 ) { mpsCommonName = xxargs [ 0 ] ; }
if ( xxargs . length > 1 ) { mpsCountry = xxargs [ 1 ] ; }
if ( xxargs . length > 2 ) { mpsOrganization = xxargs [ 2 ] ; }
2018-03-06 20:50:44 -05:00
}
2019-03-09 17:28:08 -05:00
if ( rcount === rcountmax ) {
// Fetch the certificates names for the main certificate
2023-08-21 02:29:08 -04:00
r . AmtMpsName = obj . getCertificateCommonName ( r . mps . cert ) ;
r . WebIssuer = obj . getCertificateIssuerCommonName ( r . web . cert ) ;
r . CommonName = obj . getCertificateCommonName ( r . web . cert ) ;
r . CommonNames = obj . getCertificateAltNames ( r . web . cert ) ;
r . RootName = obj . getCertificateCommonName ( r . root . cert ) ;
2022-08-24 18:03:02 -04:00
// If the "cert" name is not set, try to use the certificate CN instead (ok if the certificate is not wildcard).
if ( commonName == 'un-configured' ) {
if ( r . CommonName . startsWith ( '*.' ) ) { console . log ( "ERROR: Must specify a server full domain name in Config.json->Settings->Cert when using a wildcard certificate." ) ; process . exit ( 0 ) ; return ; }
commonName = r . CommonName ;
}
2019-03-09 17:28:08 -05:00
}
2018-01-02 19:52:49 -05:00
// Look for domains that have DNS names and load their certificates
r . dns = { } ;
2018-08-31 19:43:09 -04:00
for ( i in config . domains ) {
2022-08-24 18:03:02 -04:00
if ( ( i != '' ) && ( config . domains [ i ] != null ) && ( config . domains [ i ] . dns != null ) ) {
2018-08-29 20:40:30 -04:00
dnsname = config . domains [ i ] . dns ;
2019-03-09 17:28:08 -05:00
// Check if this domain matches a parent wildcard cert, if so, use the parent cert.
2019-06-07 18:55:24 -04:00
if ( obj . compareCertificateNames ( r . CommonNames , dnsname ) == true ) {
2021-08-20 15:03:52 -04:00
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) ) } ;
2018-01-02 19:52:49 -05:00
} else {
2019-03-09 17:28:08 -05:00
if ( args . tlsoffload ) {
// If the web certificate already exist, load it. Load just the certificate since we are in TLS offload situation
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-public.crt' ) ) {
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-' + i + '-cert-public.crt' , 'utf8' ) } ;
2019-03-09 17:28:08 -05:00
config . domains [ i ] . certs = r . dns [ i ] ;
} else {
console . log ( "WARNING: File \"webserver-" + i + "-cert-public.crt\" missing, domain \"" + i + "\" will not work correctly." ) ;
}
2018-01-02 19:52:49 -05:00
} else {
2019-03-09 17:28:08 -05:00
// If the web certificate already exist, load it. Load both certificate and private key
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-public.crt' ) && obj . fileExists ( 'webserver-' + i + '-cert-private.key' ) ) {
2021-08-20 15:03:52 -04:00
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-' + i + '-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'webserver-' + i + '-cert-private.key' , 'utf8' ) ) } ;
2019-03-09 17:28:08 -05:00
config . domains [ i ] . certs = r . dns [ i ] ;
// If CA certificates are present, load them
caindex = 1 ;
r . dns [ i ] . ca = [ ] ;
do {
caok = false ;
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' ) ) {
r . dns [ i ] . ca . push ( obj . fileLoad ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' , 'utf8' ) ) ;
2019-03-09 17:28:08 -05:00
caok = true ;
}
caindex ++ ;
} while ( caok === true ) ;
} else {
rcountmax ++ ; // This certificate must be generated
}
2018-01-02 19:52:49 -05:00
}
}
}
}
2022-07-21 20:17:08 -04:00
// If we have all the certificates we need, stop here.
2018-08-29 20:40:30 -04:00
if ( rcount === rcountmax ) {
if ( ( certargs == null ) && ( mpscertargs == null ) ) { if ( func != undefined ) { func ( r ) ; } return r ; } // If no certificate arguments are given, keep the certificate
2023-08-21 02:29:08 -04:00
const xcountry = obj . getCertificateCommonName ( r . web . cert , 'C' ) ;
const xorganization = obj . getCertificateCommonName ( r . web . cert , 'O' ) ;
2018-03-06 20:50:44 -05:00
if ( certargs == null ) { commonName = r . CommonName ; country = xcountry ; organization = xorganization ; }
2022-08-24 18:03:02 -04:00
// Check if we have correct certificates.
2022-08-26 18:43:12 -04:00
if ( obj . compareCertificateNames ( r . CommonNames , commonName ) == false ) { console . log ( "Error: " + commonName + " does not match name in TLS certificate: " + r . CommonNames . join ( ', ' ) ) ; forceWebCertGen = 1 ; } else { r . CommonName = commonName ; }
2019-03-09 17:28:08 -05:00
if ( r . AmtMpsName != mpsCommonName ) { forceMpsCertGen = 1 ; }
2022-08-26 18:43:12 -04:00
if ( args . keepcerts == true ) { forceWebCertGen = 0 ; forceMpsCertGen = 0 ; r . CommonName = commonName ; }
2019-03-09 17:28:08 -05:00
// If the certificates matches what we want, use them.
if ( ( forceWebCertGen == 0 ) && ( forceMpsCertGen == 0 ) ) {
2022-08-26 18:43:12 -04:00
if ( func !== null ) { func ( r ) ; }
2018-08-29 20:40:30 -04:00
return r ;
2018-07-23 20:34:24 -04:00
}
2017-08-28 12:27:45 -04:00
}
2022-11-02 13:45:10 -04:00
2022-07-22 23:40:51 -04:00
if ( parent . configurationFiles != null ) {
console . log ( "Error: Vault/Database missing some certificates." ) ;
if ( r . root == null ) { console . log ( ' Code signing certificate is missing.' ) ; }
if ( r . web == null ) { console . log ( ' HTTPS web certificate is missing.' ) ; }
if ( r . mps == null ) { console . log ( ' Intel AMT MPS certificate is missing.' ) ; }
if ( r . agent == null ) { console . log ( ' Server agent authentication certificate is missing.' ) ; }
if ( r . codesign == null ) { console . log ( ' Agent code signing certificate is missing.' ) ; }
2022-07-23 20:07:29 -04:00
process . exit ( 0 ) ;
return null ;
2022-07-22 23:40:51 -04:00
}
2019-02-02 17:54:36 -05:00
2018-08-29 20:40:30 -04:00
console . log ( "Generating certificates, may take a few minutes..." ) ;
2019-12-01 15:52:32 -05:00
parent . updateServerState ( 'state' , 'generatingcertificates' ) ;
2017-10-18 19:28:05 -04:00
// If a certificate is missing, but web certificate is present and --cert is not used, set the names to be the same as the web certificate
if ( ( certargs == null ) && ( r . web != null ) ) {
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
2019-12-01 15:52:32 -05:00
commonName = webCertificate . subject . getField ( 'CN' ) . value ;
var xcountryField = webCertificate . subject . getField ( 'C' ) ;
2017-10-18 19:28:05 -04:00
if ( xcountryField != null ) { country = xcountryField . value ; }
2019-12-01 15:52:32 -05:00
var xorganizationField = webCertificate . subject . getField ( 'O' ) ;
2017-10-18 19:28:05 -04:00
if ( xorganizationField != null ) { organization = xorganizationField . value ; }
}
2017-08-28 12:27:45 -04:00
var rootCertAndKey , rootCertificate , rootPrivateKey , rootName ;
2018-09-01 16:00:53 -04:00
if ( r . root == null ) {
2017-08-28 12:27:45 -04:00
// If the root certificate does not exist, create one
2018-08-29 20:40:30 -04:00
console . log ( "Generating root certificate..." ) ;
2022-07-05 16:44:24 -04:00
if ( typeof args . rootcertcommonname == 'string' ) {
// If a root certificate common name is specified, use it.
rootCertAndKey = obj . GenerateRootCertificate ( false , args . rootcertcommonname , null , null , strongCertificate ) ;
} else {
// A root certificate common name is not specified, use the default one.
rootCertAndKey = obj . GenerateRootCertificate ( true , 'MeshCentralRoot' , null , null , strongCertificate ) ;
}
2017-08-28 12:27:45 -04:00
rootCertificate = obj . pki . certificateToPem ( rootCertAndKey . cert ) ;
rootPrivateKey = obj . pki . privateKeyToPem ( rootCertAndKey . key ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'root-cert-public.crt' ) , parent . getConfigFilePath ( 'root-cert-private.key' ) ] ) ;
2019-12-01 15:52:32 -05:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-public.crt' ) , rootCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'root-cert-private.key' ) , rootPrivateKey ) ;
2017-08-28 12:27:45 -04:00
} else {
// Keep the root certificate we have
rootCertAndKey = { cert : obj . pki . certificateFromPem ( r . root . cert ) , key : obj . pki . privateKeyFromPem ( r . root . key ) } ;
2018-08-29 20:40:30 -04:00
rootCertificate = r . root . cert ;
rootPrivateKey = r . root . key ;
2017-08-28 12:27:45 -04:00
}
2019-12-01 15:52:32 -05:00
var rootName = rootCertAndKey . cert . subject . getField ( 'CN' ) . value ;
2017-08-28 12:27:45 -04:00
// If the web certificate does not exist, create one
var webCertAndKey , webCertificate , webPrivateKey ;
2022-08-26 18:43:12 -04:00
if ( ( r . web == null ) || ( forceWebCertGen === 1 ) ) {
2018-08-29 20:40:30 -04:00
console . log ( "Generating HTTPS certificate..." ) ;
2017-10-18 19:28:05 -04:00
webCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , commonName , country , organization , null , strongCertificate ) ;
2017-09-29 17:26:51 -04:00
webCertificate = obj . pki . certificateToPem ( webCertAndKey . cert ) ;
webPrivateKey = obj . pki . privateKeyToPem ( webCertAndKey . key ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'webserver-cert-public.crt' ) , parent . getConfigFilePath ( 'webserver-cert-private.key' ) ] ) ;
2019-12-01 15:52:32 -05:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-cert-public.crt' ) , webCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-cert-private.key' ) , webPrivateKey ) ;
2017-09-29 17:26:51 -04:00
} else {
// Keep the console certificate we have
2019-06-07 18:55:24 -04:00
if ( args . tlsoffload ) {
webCertAndKey = { cert : obj . pki . certificateFromPem ( r . web . cert ) } ;
webCertificate = r . web . cert ;
} else {
webCertAndKey = { cert : obj . pki . certificateFromPem ( r . web . cert ) , key : obj . pki . privateKeyFromPem ( r . web . key ) } ;
webCertificate = r . web . cert ;
webPrivateKey = r . web . key ;
}
2017-09-29 17:26:51 -04:00
}
2022-11-02 13:45:10 -04:00
var webIssuer = null ;
if ( webCertAndKey . cert . issuer . getField ( 'CN' ) != null ) { webIssuer = webCertAndKey . cert . issuer . getField ( 'CN' ) . value ; }
2017-09-29 17:26:51 -04:00
2017-10-18 19:28:05 -04:00
// If the mesh agent server certificate does not exist, create one
var agentCertAndKey , agentCertificate , agentPrivateKey ;
if ( r . agent == null ) {
2018-08-29 20:40:30 -04:00
console . log ( "Generating MeshAgent certificate..." ) ;
2019-12-01 15:52:32 -05:00
agentCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , true , 'MeshCentralAgentServer' , country , organization , { } , strongCertificate ) ;
2017-10-18 19:28:05 -04:00
agentCertificate = obj . pki . certificateToPem ( agentCertAndKey . cert ) ;
agentPrivateKey = obj . pki . privateKeyToPem ( agentCertAndKey . key ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'agentserver-cert-public.crt' ) , parent . getConfigFilePath ( 'agentserver-cert-private.key' ) ] ) ;
2019-12-01 15:52:32 -05:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'agentserver-cert-public.crt' ) , agentCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'agentserver-cert-private.key' ) , agentPrivateKey ) ;
2017-10-18 19:28:05 -04:00
} else {
// Keep the mesh agent server certificate we have
agentCertAndKey = { cert : obj . pki . certificateFromPem ( r . agent . cert ) , key : obj . pki . privateKeyFromPem ( r . agent . key ) } ;
2018-08-29 20:40:30 -04:00
agentCertificate = r . agent . cert ;
agentPrivateKey = r . agent . key ;
2017-10-18 19:28:05 -04:00
}
2022-05-25 14:05:53 -04:00
// If the code signing certificate does not exist, create one
var codesignCertAndKey , codesignCertificate , codesignPrivateKey ;
if ( r . codesign == null ) {
console . log ( "Generating code signing certificate..." ) ;
codesignCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , true , commonName , country , organization , { codeSign : true } , strongCertificate ) ;
codesignCertificate = obj . pki . certificateToPem ( codesignCertAndKey . cert ) ;
codesignPrivateKey = obj . pki . privateKeyToPem ( codesignCertAndKey . key ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'codesign-cert-public.crt' ) , parent . getConfigFilePath ( 'codesign-cert-private.key' ) ] ) ;
2022-05-25 14:05:53 -04:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'codesign-cert-public.crt' ) , codesignCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'codesign-cert-private.key' ) , codesignPrivateKey ) ;
} else {
// Keep the code signing certificate we have
codesignCertAndKey = { cert : obj . pki . certificateFromPem ( r . codesign . cert ) , key : obj . pki . privateKeyFromPem ( r . codesign . key ) } ;
codesignCertificate = r . codesign . cert ;
codesignPrivateKey = r . codesign . key ;
}
2017-08-28 12:27:45 -04:00
// If the Intel AMT MPS certificate does not exist, create one
var mpsCertAndKey , mpsCertificate , mpsPrivateKey ;
2022-08-26 18:43:12 -04:00
if ( ( r . mps == null ) || ( forceMpsCertGen === 1 ) ) {
2018-08-29 20:40:30 -04:00
console . log ( "Generating Intel AMT MPS certificate..." ) ;
2018-03-06 20:50:44 -05:00
mpsCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , mpsCommonName , mpsCountry , mpsOrganization , null , false ) ;
2017-09-29 17:26:51 -04:00
mpsCertificate = obj . pki . certificateToPem ( mpsCertAndKey . cert ) ;
mpsPrivateKey = obj . pki . privateKeyToPem ( mpsCertAndKey . key ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'mpsserver-cert-public.crt' ) , parent . getConfigFilePath ( 'mpsserver-cert-private.key' ) ] ) ;
2019-12-01 15:52:32 -05:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'mpsserver-cert-public.crt' ) , mpsCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'mpsserver-cert-private.key' ) , mpsPrivateKey ) ;
2017-09-29 17:26:51 -04:00
} else {
// Keep the console certificate we have
mpsCertAndKey = { cert : obj . pki . certificateFromPem ( r . mps . cert ) , key : obj . pki . privateKeyFromPem ( r . mps . key ) } ;
2018-08-29 20:40:30 -04:00
mpsCertificate = r . mps . cert ;
mpsPrivateKey = r . mps . key ;
2017-09-29 17:26:51 -04:00
}
2022-05-29 14:16:52 -04:00
r = { root : { cert : rootCertificate , key : rootPrivateKey } , web : { cert : webCertificate , key : webPrivateKey , ca : [ ] } , webdefault : { cert : webCertificate , key : webPrivateKey , ca : [ ] } , mps : { cert : mpsCertificate , key : mpsPrivateKey } , agent : { cert : agentCertificate , key : agentPrivateKey } , codesign : { cert : codesignCertificate , key : codesignPrivateKey } , ca : calist , CommonName : commonName , RootName : rootName , AmtMpsName : mpsCommonName , dns : { } , WebIssuer : webIssuer } ;
2018-01-02 19:52:49 -05:00
2019-03-09 17:28:08 -05:00
// Fetch the certificates names for the main certificate
var webCertificate = obj . pki . certificateFromPem ( r . web . cert ) ;
2022-11-02 13:45:10 -04:00
if ( webCertificate . issuer . getField ( 'CN' ) != null ) { r . WebIssuer = webCertificate . issuer . getField ( 'CN' ) . value ; } else { r . WebIssuer = null ; }
2019-12-01 15:52:32 -05:00
r . CommonName = webCertificate . subject . getField ( 'CN' ) . value ;
2019-03-09 17:28:08 -05:00
if ( r . CommonName . startsWith ( '*.' ) ) {
if ( commonName . indexOf ( '.' ) == - 1 ) { console . log ( "ERROR: Must specify a server full domain name in Config.json->Settings->Cert when using a wildcard certificate." ) ; process . exit ( 0 ) ; return ; }
if ( commonName . startsWith ( '*.' ) ) { console . log ( "ERROR: Server can't use a wildcard name: " + commonName ) ; process . exit ( 0 ) ; return ; }
r . CommonName = commonName ;
}
r . CommonNames = [ r . CommonName . toLowerCase ( ) ] ;
2019-12-01 15:52:32 -05:00
var altNames = webCertificate . getExtension ( 'subjectAltName' ) ;
2021-03-11 04:39:21 -05:00
if ( altNames ) {
for ( i = 0 ; i < altNames . altNames . length ; i ++ ) {
if ( ( altNames . altNames [ i ] != null ) && ( altNames . altNames [ i ] . type === 2 ) && ( typeof altNames . altNames [ i ] . value === 'string' ) ) {
var acn = altNames . altNames [ i ] . value . toLowerCase ( ) ;
if ( r . CommonNames . indexOf ( acn ) == - 1 ) { r . CommonNames . push ( acn ) ; }
}
}
}
2019-03-09 17:28:08 -05:00
var rootCertificate = obj . pki . certificateFromPem ( r . root . cert ) ;
2019-12-01 15:52:32 -05:00
r . RootName = rootCertificate . subject . getField ( 'CN' ) . value ;
2019-03-09 17:28:08 -05:00
2018-01-02 19:52:49 -05:00
// Look for domains with DNS names that have no certificates and generated them.
2018-08-31 19:43:09 -04:00
for ( i in config . domains ) {
2022-08-24 18:03:02 -04:00
if ( ( i != '' ) && ( config . domains [ i ] != null ) && ( config . domains [ i ] . dns != null ) ) {
2018-08-29 20:40:30 -04:00
dnsname = config . domains [ i ] . dns ;
2019-03-09 17:28:08 -05:00
// Check if this domain matches a parent wildcard cert, if so, use the parent cert.
2019-06-07 18:55:24 -04:00
if ( obj . compareCertificateNames ( r . CommonNames , dnsname ) == true ) {
2021-08-20 15:03:52 -04:00
r . dns [ i ] = { cert : obj . fileLoad ( 'webserver-cert-public.crt' , 'utf8' ) , key : obj . decryptPrivateKey ( obj . fileLoad ( 'webserver-cert-private.key' , 'utf8' ) ) } ;
2019-03-09 17:28:08 -05:00
} else {
if ( ! args . tlsoffload ) {
// If the web certificate does not exist, create it
2019-12-01 15:52:32 -05:00
if ( ( obj . fileExists ( 'webserver-' + i + '-cert-public.crt' ) === false ) || ( obj . fileExists ( 'webserver-' + i + '-cert-private.key' ) === false ) ) {
console . log ( 'Generating HTTPS certificate for ' + i + '...' ) ;
2019-03-09 17:28:08 -05:00
var xwebCertAndKey = obj . IssueWebServerCertificate ( rootCertAndKey , false , dnsname , country , organization , null , strongCertificate ) ;
var xwebCertificate = obj . pki . certificateToPem ( xwebCertAndKey . cert ) ;
var xwebPrivateKey = obj . pki . privateKeyToPem ( xwebCertAndKey . key ) ;
2022-08-26 17:19:28 -04:00
parent . common . moveOldFiles ( [ parent . getConfigFilePath ( 'webserver-' + i + '-cert-public.crt' ) , parent . getConfigFilePath ( 'webserver-' + i + '-cert-private.key' ) ] ) ;
2019-12-01 15:52:32 -05:00
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-' + i + '-cert-public.crt' ) , xwebCertificate ) ;
obj . fs . writeFileSync ( parent . getConfigFilePath ( 'webserver-' + i + '-cert-private.key' ) , xwebPrivateKey ) ;
2019-03-09 17:28:08 -05:00
r . dns [ i ] = { cert : xwebCertificate , key : xwebPrivateKey } ;
config . domains [ i ] . certs = r . dns [ i ] ;
// If CA certificates are present, load them
caindex = 1 ;
r . dns [ i ] . ca = [ ] ;
do {
caok = false ;
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' ) ) {
r . dns [ i ] . ca . push ( fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'webserver-' + i + '-cert-chain' + caindex + '.crt' ) , 'utf8' ) ) ) ;
2019-03-09 17:28:08 -05:00
caok = true ;
}
caindex ++ ;
} while ( caok === true ) ;
}
2018-01-02 19:52:49 -05:00
}
}
}
}
2018-03-06 20:50:44 -05:00
// If the swarm server certificate exist, load it (This is an optional certificate)
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'swarmserver-cert-public.crt' ) && obj . fileExists ( 'swarmserver-cert-private.key' ) ) {
r . swarmserver = { cert : fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'swarmserver-cert-public.crt' ) , 'utf8' ) ) , key : fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( "swarmserver-cert-private.key" ) , 'utf8' ) ) } ;
2018-03-06 20:50:44 -05:00
}
// If the swarm server root certificate exist, load it (This is an optional certificate)
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'swarmserverroot-cert-public.crt' ) ) {
r . swarmserverroot = { cert : fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'swarmserverroot-cert-public.crt' ) , 'utf8' ) ) } ;
2018-03-06 20:50:44 -05:00
}
// If CA certificates are present, load them
if ( r . web != null ) {
2018-08-29 20:40:30 -04:00
caindex = 1 ;
r . web . ca = [ ] ;
2018-03-06 20:50:44 -05:00
do {
caok = false ;
2019-12-01 15:52:32 -05:00
if ( obj . fileExists ( 'webserver-cert-chain' + caindex + '.crt' ) ) {
r . web . ca . push ( fixEndOfLines ( obj . fs . readFileSync ( parent . getConfigFilePath ( 'webserver-cert-chain' + caindex + '.crt' ) , 'utf8' ) ) ) ;
2018-03-06 20:50:44 -05:00
caok = true ;
}
caindex ++ ;
2018-08-29 20:40:30 -04:00
} while ( caok === true ) ;
2018-03-06 20:50:44 -05:00
}
2017-08-28 12:27:45 -04:00
if ( func != undefined ) { func ( r ) ; }
return r ;
2018-08-29 20:40:30 -04:00
} ;
2017-08-28 12:27:45 -04:00
2018-01-12 14:41:26 -05:00
// Accelerators, used to dispatch work to other processes
2019-12-01 15:52:32 -05:00
const fork = require ( 'child_process' ) . fork ;
const program = require ( 'path' ) . join ( _ _dirname , 'meshaccelerator.js' ) ;
const acceleratorTotalCount = require ( 'os' ) . cpus ( ) . length ; // TODO: Check if this accelerator can scale.
2018-01-12 14:41:26 -05:00
var acceleratorCreateCount = acceleratorTotalCount ;
2018-01-09 23:13:41 -05:00
var freeAccelerators = [ ] ;
2018-01-12 14:41:26 -05:00
var pendingAccelerator = [ ] ;
obj . acceleratorCertStore = null ;
2018-01-09 23:13:41 -05:00
2019-05-01 18:02:03 -04:00
// Accelerator Stats
var getAcceleratorFuncCalls = 0 ;
var acceleratorStartFuncCall = 0 ;
var acceleratorPerformSignatureFuncCall = 0 ;
var acceleratorPerformSignaturePushFuncCall = 0 ;
var acceleratorPerformSignatureRunFuncCall = 0 ;
var acceleratorMessage = 0 ;
var acceleratorMessageException = 0 ;
var acceleratorMessageLastException = null ;
var acceleratorException = 0 ;
var acceleratorLastException = null ;
// Get stats about the accelerators
obj . getAcceleratorStats = function ( ) {
return {
acceleratorTotalCount : acceleratorTotalCount ,
acceleratorCreateCount : acceleratorCreateCount ,
freeAccelerators : freeAccelerators . length ,
pendingAccelerator : pendingAccelerator . length ,
getAcceleratorFuncCalls : getAcceleratorFuncCalls ,
startFuncCall : acceleratorStartFuncCall ,
performSignatureFuncCall : acceleratorPerformSignatureFuncCall ,
performSignaturePushFuncCall : acceleratorPerformSignaturePushFuncCall ,
performSignatureRunFuncCall : acceleratorPerformSignatureRunFuncCall ,
message : acceleratorMessage ,
messageException : acceleratorMessageException ,
messageLastException : acceleratorMessageLastException ,
exception : acceleratorException ,
lastException : acceleratorLastException
} ;
}
2018-01-09 23:13:41 -05:00
// Create a new accelerator module
2018-01-12 14:41:26 -05:00
obj . getAccelerator = function ( ) {
2019-05-01 18:02:03 -04:00
getAcceleratorFuncCalls ++ ;
2018-01-12 14:41:26 -05:00
if ( obj . acceleratorCertStore == null ) { return null ; }
2018-01-09 23:13:41 -05:00
if ( freeAccelerators . length > 0 ) { return freeAccelerators . pop ( ) ; }
if ( acceleratorCreateCount > 0 ) {
2018-01-12 14:41:26 -05:00
acceleratorCreateCount -- ;
2019-12-01 15:52:32 -05:00
var accelerator = fork ( program , [ ] , { stdio : [ 'pipe' , 'pipe' , 'pipe' , 'ipc' ] } ) ;
2018-08-21 14:02:35 -04:00
accelerator . accid = acceleratorCreateCount ;
2019-12-01 15:52:32 -05:00
accelerator . on ( 'message' , function ( message ) {
2019-05-01 18:02:03 -04:00
acceleratorMessage ++ ;
2020-02-14 14:20:06 -05:00
if ( this . x . func ) { this . x . func ( this . x . tag , message ) ; }
2019-05-03 12:59:09 -04:00
delete this . x ;
if ( pendingAccelerator . length > 0 ) { this . send ( this . x = pendingAccelerator . shift ( ) ) ; } else { freeAccelerators . push ( this ) ; }
2018-08-21 14:02:35 -04:00
} ) ;
2019-12-01 15:52:32 -05:00
accelerator . on ( 'exit' , function ( code ) {
2019-05-03 12:59:09 -04:00
if ( this . x ) { pendingAccelerator . push ( this . x ) ; delete this . x ; }
acceleratorCreateCount ++ ;
if ( pendingAccelerator . length > 0 ) { var acc = obj . getAccelerator ( ) ; acc . send ( acc . x = pendingAccelerator . shift ( ) ) ; }
} ) ;
2019-12-01 15:52:32 -05:00
accelerator . on ( 'error' , function ( code ) { } ) ; // Not sure if somethign should be done here to help kill the process.
accelerator . send ( { action : 'setState' , certs : obj . acceleratorCertStore } ) ;
2018-01-09 23:13:41 -05:00
return accelerator ;
}
return null ;
2018-08-29 20:40:30 -04:00
} ;
2018-01-09 23:13:41 -05:00
2018-08-29 20:40:30 -04:00
// Set the state of the accelerators. This way, we don"t have to send certificate & keys to them each time.
2018-01-12 14:41:26 -05:00
obj . acceleratorStart = function ( certificates ) {
2019-05-01 18:02:03 -04:00
acceleratorStartFuncCall ++ ;
2018-08-29 20:40:30 -04:00
if ( obj . acceleratorCertStore != null ) { console . error ( "ERROR: Accelerators can only be started once." ) ; return ; }
2018-01-09 23:13:41 -05:00
obj . acceleratorCertStore = [ { cert : certificates . agent . cert , key : certificates . agent . key } ] ;
if ( certificates . swarmserver != null ) { obj . acceleratorCertStore . push ( { cert : certificates . swarmserver . cert , key : certificates . swarmserver . key } ) ; }
2018-08-29 20:40:30 -04:00
} ;
2018-01-09 23:13:41 -05:00
// Perform any RSA signature, just pass in the private key and data.
2018-08-21 14:02:35 -04:00
obj . acceleratorPerformSignature = function ( privatekey , data , tag , func ) {
2019-05-01 18:02:03 -04:00
acceleratorPerformSignatureFuncCall ++ ;
2018-01-12 14:41:26 -05:00
if ( acceleratorTotalCount <= 1 ) {
2018-01-09 23:13:41 -05:00
// No accelerators available
2019-12-01 15:52:32 -05:00
if ( typeof privatekey == 'number' ) { privatekey = obj . acceleratorCertStore [ privatekey ] . key ; }
const sign = obj . crypto . createSign ( 'SHA384' ) ;
sign . end ( Buffer . from ( data , 'binary' ) ) ;
try { func ( tag , sign . sign ( privatekey ) . toString ( 'binary' ) ) ; } catch ( ex ) { acceleratorMessageException ++ ; acceleratorMessageLastException = ex ; }
2018-01-09 23:13:41 -05:00
} else {
2018-01-12 14:41:26 -05:00
var acc = obj . getAccelerator ( ) ;
if ( acc == null ) {
// Add to pending accelerator workload
2019-05-01 18:02:03 -04:00
acceleratorPerformSignaturePushFuncCall ++ ;
2019-12-01 15:52:32 -05:00
pendingAccelerator . push ( { action : 'sign' , key : privatekey , data : data , tag : tag , func : func } ) ;
2018-01-12 14:41:26 -05:00
} else {
// Send to accelerator now
2019-05-01 18:02:03 -04:00
acceleratorPerformSignatureRunFuncCall ++ ;
2019-12-01 15:52:32 -05:00
acc . send ( acc . x = { action : 'sign' , key : privatekey , data : data , tag : tag , func : func } ) ;
2018-01-12 14:41:26 -05:00
}
2018-01-09 23:13:41 -05:00
}
2018-08-29 20:40:30 -04:00
} ;
2018-01-09 23:13:41 -05:00
2020-02-14 14:20:06 -05:00
// Perform any general operation
obj . acceleratorPerformOperation = function ( operation , data , tag , func ) {
2024-02-02 05:43:40 -05:00
var acc = obj . getAccelerator ( ) ;
if ( acc == null ) {
// Add to pending accelerator workload
acceleratorPerformSignaturePushFuncCall ++ ;
pendingAccelerator . push ( { action : operation , data : data , tag : tag , func : func } ) ;
2020-02-14 14:20:06 -05:00
} else {
2024-02-02 05:43:40 -05:00
// Send to accelerator now
acceleratorPerformSignatureRunFuncCall ++ ;
acc . send ( acc . x = { action : operation , data : data , tag : tag , func : func } ) ;
2020-02-14 14:20:06 -05:00
}
} ;
2017-08-28 12:27:45 -04:00
return obj ;
} ;