]> git.ipfire.org Git - thirdparty/squid.git/blob - src/ssl/ssl_crtd.cc
SourceFormat Enforcement
[thirdparty/squid.git] / src / ssl / ssl_crtd.cc
1 /*
2 * $Id$
3 */
4
5 #include "squid.h"
6 #include "helpers/defines.h"
7 #include "ssl/gadgets.h"
8 #include "ssl/crtd_message.h"
9 #include "ssl/certificate_db.h"
10
11 #if HAVE_CSTRING
12 #include <cstring>
13 #endif
14 #if HAVE_SSTREAM
15 #include <sstream>
16 #endif
17 #if HAVE_IOSTREAM
18 #include <iostream>
19 #endif
20 #if HAVE_STDEXCEPT
21 #include <stdexcept>
22 #endif
23 #if HAVE_STRING
24 #include <string>
25 #endif
26 #if HAVE_GETOPT_H
27 #include <getopt.h>
28 #endif
29
30 /**
31 \defgroup ssl_crtd ssl_crtd
32 \ingroup ExternalPrograms
33 \par
34 Because the standart generation of ssl certificate for
35 sslBump feature, Squid must use external proccess to
36 actually make these calls. This process generate new ssl
37 certificates and worked with ssl certificates disk cache.
38 Typically there will be five ssl_crtd processes spawned
39 from Squid. Communication occurs via TCP sockets bound
40 to the loopback interface. The class in helper.h are
41 primally concerned with starting and stopping the ssl_crtd.
42 Reading and writing to and from the ssl_crtd occurs in the
43 \link IPCacheAPI IP\endlink and the dnsservers occurs in
44 the \link IPCacheAPI IP\endlink and \link FQDNCacheAPI
45 FQDN\endlink cache modules.
46
47 \section ssl_crtdInterface Command Line Interface
48 \verbatim
49 usage: ssl_crtd -hv -s ssl_storage_path -M storage_max_size
50 -h Help
51 -v Version
52 -s ssl_storage_path Path to specific disk storage of ssl server
53 certificates.
54 -M storage_max_size max size of ssl certificates storage.
55 -b fs_block_size File system block size in bytes. Need for processing
56 natural size of certificate on disk. Default value is
57 2048 bytes."
58
59 After running write requests in the next format:
60 <request code><whitespace><body_len><whitespace><body>
61 There are two kind of request now:
62 new_certificate 14 host=host.dom
63 Create new private key and selfsigned certificate for "host.dom".
64
65 new_certificate xxx host=host.dom
66 -----BEGIN CERTIFICATE-----
67 ...
68 -----END CERTIFICATE-----
69 -----BEGIN RSA PRIVATE KEY-----
70 ...
71 -----END RSA PRIVATE KEY-----
72 Create new private key and certificate request for "host.dom".
73 Sign new request by received certificate and private key.
74
75 usage: ssl_crtd -c -s ssl_store_path\n
76 -c Init ssl db directories and exit.
77
78 \endverbatim
79 */
80
81 static const char *const B_KBYTES_STR = "KB";
82 static const char *const B_MBYTES_STR = "MB";
83 static const char *const B_GBYTES_STR = "GB";
84 static const char *const B_BYTES_STR = "B";
85
86 /**
87 \ingroup ssl_crtd
88 * Get current time.
89 */
90 time_t getCurrentTime(void)
91 {
92 struct timeval current_time;
93 #if GETTIMEOFDAY_NO_TZP
94 gettimeofday(&current_time);
95 #else
96 gettimeofday(&current_time, NULL);
97 #endif
98 return current_time.tv_sec;
99 }
100
101 /**
102 \ingroup ssl_crtd
103 * Parse bytes unit. It would be one of the next value: MB, GB, KB or B.
104 * This function is caseinsensitive.
105 */
106 static size_t parseBytesUnits(const char * unit)
107 {
108 if (!strncasecmp(unit, B_BYTES_STR, strlen(B_BYTES_STR)) ||
109 !strncasecmp(unit, "", strlen(unit)))
110 return 1;
111
112 if (!strncasecmp(unit, B_KBYTES_STR, strlen(B_KBYTES_STR)))
113 return 1 << 10;
114
115 if (!strncasecmp(unit, B_MBYTES_STR, strlen(B_MBYTES_STR)))
116 return 1 << 20;
117
118 if (!strncasecmp(unit, B_GBYTES_STR, strlen(B_GBYTES_STR)))
119 return 1 << 30;
120
121 std::cerr << "WARNING: Unknown bytes unit '" << unit << "'" << std::endl;
122
123 return 0;
124 }
125
126 /**
127 \ingroup ssl_crtd
128 * Parse uninterrapted string of bytes value. It looks like "4MB".
129 */
130 static bool parseBytesOptionValue(size_t * bptr, char const * value)
131 {
132 // Find number from string beginning.
133 char const * number_begin = value;
134 char const * number_end = value;
135
136 while ((*number_end >= '0' && *number_end <= '9')) {
137 number_end++;
138 }
139
140 std::string number(number_begin, number_end - number_begin);
141 std::istringstream in(number);
142 int d = 0;
143 if (!(in >> d))
144 return false;
145
146 int m;
147 if ((m = parseBytesUnits(number_end)) == 0) {
148 return false;
149 }
150
151 *bptr = static_cast<size_t>(m * d);
152 if (static_cast<long>(*bptr * 2) != m * d * 2)
153 return false;
154
155 return true;
156 }
157
158 /**
159 \ingroup ssl_crtd
160 * Print help using response code.
161 */
162 static void usage()
163 {
164 std::string example_host_name = "host.dom";
165 std::string request_string = Ssl::CrtdMessage::param_host + "=" + example_host_name;
166 std::stringstream request_string_size_stream;
167 request_string_size_stream << request_string.length();
168 std::string help_string =
169 "usage: ssl_crtd -hv -s ssl_storage_path -M storage_max_size\n"
170 "\t-h Help\n"
171 "\t-v Version\n"
172 "\t-s ssl_storage_path Path to specific disk storage of ssl server\n"
173 "\t certificates.\n"
174 "\t-M storage_max_size max size of ssl certificates storage.\n"
175 "\t-b fs_block_size File system block size in bytes. Need for processing\n"
176 "\t natural size of certificate on disk. Default value is\n"
177 "\t 2048 bytes.\n"
178 "\n"
179 "After running write requests in the next format:\n"
180 "<request code><whitespace><body_len><whitespace><body>\n"
181 "There are two kind of request now:\n"
182 + Ssl::CrtdMessage::code_new_certificate + " " + request_string_size_stream.str() + " " + request_string + "\n" +
183 "\tCreate new private key and selfsigned certificate for \"host.dom\".\n"
184 + Ssl::CrtdMessage::code_new_certificate + " xxx " + request_string + "\n" +
185 "-----BEGIN CERTIFICATE-----\n"
186 "...\n"
187 "-----END CERTIFICATE-----\n"
188 "-----BEGIN RSA PRIVATE KEY-----\n"
189 "...\n"
190 "-----END RSA PRIVATE KEY-----\n"
191 "\tCreate new private key and certificate request for \"host.dom\"\n"
192 "\tSign new request by received certificate and private key.\n"
193 "usage: ssl_crtd -c -s ssl_store_path\n"
194 "\t-c Init ssl db directories and exit.\n";
195 std::cerr << help_string << std::endl;
196 }
197
198 /**
199 \ingroup ssl_crtd
200 * Proccess new request message.
201 */
202 static bool proccessNewRequest(Ssl::CrtdMessage & request_message, std::string const & db_path, size_t max_db_size, size_t fs_block_size)
203 {
204 Ssl::CertificateProperties certProperties;
205 std::string error;
206 if (!request_message.parseRequest(certProperties, error))
207 throw std::runtime_error("Error while parsing the crtd request: " + error);
208
209 Ssl::CertificateDb db(db_path, max_db_size, fs_block_size);
210
211 Ssl::X509_Pointer cert;
212 Ssl::EVP_PKEY_Pointer pkey;
213 std::string &cert_subject = certProperties.dbKey();
214
215 db.find(cert_subject, cert, pkey);
216
217 if (cert.get()) {
218 if (!Ssl::certificateMatchesProperties(cert.get(), certProperties)) {
219 // The certificate changed (renewed or other reason).
220 // Generete a new one with the updated fields.
221 cert.reset(NULL);
222 pkey.reset(NULL);
223 db.purgeCert(cert_subject);
224 }
225 }
226
227 if (!cert || !pkey) {
228 if (!Ssl::generateSslCertificate(cert, pkey, certProperties))
229 throw std::runtime_error("Cannot create ssl certificate or private key.");
230
231 if (!db.addCertAndPrivateKey(cert, pkey, cert_subject) && db.IsEnabledDiskStore())
232 throw std::runtime_error("Cannot add certificate to db.");
233 }
234
235 std::string bufferToWrite;
236 if (!Ssl::writeCertAndPrivateKeyToMemory(cert, pkey, bufferToWrite))
237 throw std::runtime_error("Cannot write ssl certificate or/and private key to memory.");
238
239 Ssl::CrtdMessage response_message;
240 response_message.setCode("OK");
241 response_message.setBody(bufferToWrite);
242
243 // Use the '\1' char as end-of-message character
244 std::cout << response_message.compose() << '\1' << std::flush;
245
246 return true;
247 }
248
249 /**
250 \ingroup ssl_crtd
251 * This is the external ssl_crtd process.
252 */
253 int main(int argc, char *argv[])
254 {
255 try {
256 size_t max_db_size = 0;
257 size_t fs_block_size = 2048;
258 char c;
259 bool create_new_db = false;
260 std::string db_path;
261 // proccess options.
262 while ((c = getopt(argc, argv, "dcghvs:M:b:n:")) != -1) {
263 switch (c) {
264 case 'd':
265 debug_enabled = 1;
266 break;
267 case 'b':
268 if (!parseBytesOptionValue(&fs_block_size, optarg)) {
269 throw std::runtime_error("Error when parsing -b options value");
270 }
271 break;
272 case 's':
273 db_path = optarg;
274 break;
275 case 'M':
276 if (!parseBytesOptionValue(&max_db_size, optarg)) {
277 throw std::runtime_error("Error when parsing -M options value");
278 }
279 break;
280 case 'v':
281 std::cout << "ssl_crtd version " << VERSION << std::endl;
282 exit(0);
283 break;
284 case 'c':
285 create_new_db = true;
286 break;
287 case 'h':
288 usage();
289 exit(0);
290 default:
291 exit(0);
292 }
293 }
294
295 if (create_new_db) {
296 std::cout << "Initialization SSL db..." << std::endl;
297 Ssl::CertificateDb::create(db_path);
298 std::cout << "Done" << std::endl;
299 exit(0);
300 }
301
302 {
303 Ssl::CertificateDb::check(db_path, max_db_size);
304 }
305 // proccess request.
306 for (;;) {
307 char request[HELPER_INPUT_BUFFER];
308 Ssl::CrtdMessage request_message;
309 Ssl::CrtdMessage::ParseResult parse_result = Ssl::CrtdMessage::INCOMPLETE;
310
311 while (parse_result == Ssl::CrtdMessage::INCOMPLETE) {
312 if (fgets(request, HELPER_INPUT_BUFFER, stdin) == NULL)
313 return 1;
314 size_t gcount = strlen(request);
315 parse_result = request_message.parse(request, gcount);
316 }
317
318 if (parse_result == Ssl::CrtdMessage::ERROR) {
319 throw std::runtime_error("Cannot parse request message.");
320 } else if (request_message.getCode() == Ssl::CrtdMessage::code_new_certificate) {
321 proccessNewRequest(request_message, db_path, max_db_size, fs_block_size);
322 } else {
323 throw std::runtime_error("Unknown request code: \"" + request_message.getCode() + "\".");
324 }
325 std::cout.flush();
326 }
327 } catch (std::runtime_error & error) {
328 std::cerr << argv[0] << ": " << error.what() << std::endl;
329 return 0;
330 }
331 return 0;
332 }