Skip to content
Snippets Groups Projects
Select Git revision
  • 84dec083e27d523551f49f4cae83560ce4282e30
  • master default protected
  • nightly/20250714.0
  • beta/202507141552
  • beta/202506161038
  • stable/20250613.0
  • nightly/20250613.0
  • beta/202506101658
  • stable/20250610.0
  • nightly/20250610.0
  • beta/202506091027
  • beta/202506061543
  • nightly/20250605.0
  • beta/202506051039
  • beta/202506051002
  • beta/202506041611
  • beta/202506041335
  • beta/202505231812
  • stable/20250523.0
  • nightly/20250523.0
  • nightly/20250515.0
  • nightly/20250510.0
22 results

distantrenderer.h

Blame
  • Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    certstore.cpp 21.33 KiB
    /*
     *  Copyright (C) 2004-2017 Savoir-faire Linux Inc.
     *
     *  Author: Adrien Béraud <adrien.beraud@savoirfairelinux.com>
     *
     *  This program is free software; you can redistribute it and/or modify
     *  it under the terms of the GNU General Public License as published by
     *  the Free Software Foundation; either version 3 of the License, or
     *  (at your option) any later version.
     *
     *  This program is distributed in the hope that it will be useful,
     *  but WITHOUT ANY WARRANTY; without even the implied warranty of
     *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
     *  GNU General Public License for more details.
     *
     *  You should have received a copy of the GNU General Public License
     *  along with this program; if not, write to the Free Software
     *  Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301 USA.
     */
    
    #include "certstore.h"
    
    #include "client/ring_signal.h"
    
    #include "thread_pool.h"
    #include "fileutils.h"
    #include "logger.h"
    
    #include <thread>
    #include <sstream>
    
    namespace ring { namespace tls {
    
    CertificateStore&
    CertificateStore::instance()
    {
        // Meyers singleton
        static CertificateStore instance_;
        return instance_;
    }
    
    CertificateStore::CertificateStore()
        : certPath_(fileutils::get_data_dir()+DIR_SEPARATOR_CH+"certificates"),
          crlPath_(fileutils::get_data_dir()+DIR_SEPARATOR_CH+"crls")
    {
        fileutils::check_dir(certPath_.c_str());
        fileutils::check_dir(crlPath_.c_str());
        loadLocalCertificates();
    }
    
    unsigned
    CertificateStore::loadLocalCertificates()
    {
        std::lock_guard<std::mutex> l(lock_);
    
        auto dir_content = fileutils::readDirectory(certPath_);
        unsigned n = 0;
        for (const auto& f : dir_content) {
            try {
                auto crt = std::make_shared<crypto::Certificate>(fileutils::loadFile(certPath_+DIR_SEPARATOR_CH+f));
                auto id = crt->getId().toString();
                if (id != f)
                    throw std::logic_error({});
                while (crt) {
                    auto id_str = crt->getId().toString();
                    certs_.emplace(id_str, crt);
                    loadRevocations(*crt);
                    crt = crt->issuer;
                    ++n;
                }
            } catch (const std::exception& e) {
                remove((certPath_+DIR_SEPARATOR_CH+f).c_str());
            }
        }
        RING_DBG("CertificateStore: loaded %u local certificates.", n);
        return n;
    }
    
    void
    CertificateStore::loadRevocations(crypto::Certificate& crt)
    {
        auto dir = crlPath_+DIR_SEPARATOR_CH+crt.getId().toString();
        auto crl_dir_content = fileutils::readDirectory(dir);
        for (const auto& crl : crl_dir_content) {
            try {
                crt.addRevocationList(std::make_shared<crypto::RevocationList>(fileutils::loadFile(dir+DIR_SEPARATOR_CH+crl)));
            } catch (const std::exception& e) {
                RING_WARN("Can't load revocation list: %s", e.what());
            }
        }
    }
    
    std::vector<std::string>
    CertificateStore::getPinnedCertificates() const
    {
        std::lock_guard<std::mutex> l(lock_);
    
        std::vector<std::string> certIds;
        certIds.reserve(certs_.size());
        for (const auto& crt : certs_)
            certIds.emplace_back(crt.first);
        return certIds;
    }
    
    std::shared_ptr<crypto::Certificate>
    CertificateStore::getCertificate(const std::string& k) const
    {
        std::unique_lock<std::mutex> l(lock_);
    
        auto cit = certs_.find(k);
        if (cit == certs_.cend()) {
            return {};
        }
        return cit->second;
    }
    
    std::shared_ptr<crypto::Certificate>
    CertificateStore::findCertificateByName(const std::string& name, crypto::Certificate::NameType type) const
    {
        std::unique_lock<std::mutex> l(lock_);
        for (auto& i : certs_) {
            if (i.second->getName() == name)
                return i.second;
            if (type != crypto::Certificate::NameType::UNKNOWN) {
                for (const auto& alt : i.second->getAltNames())
                    if (alt.first == type and alt.second == name)
                        return i.second;
            }
        }
        return {};
    }
    
    std::shared_ptr<crypto::Certificate>
    CertificateStore::findCertificateByUID(const std::string& uid) const
    {
        std::unique_lock<std::mutex> l(lock_);
        for (auto& i : certs_) {
            if (i.second->getUID() == uid)
                return i.second;
        }
        return {};
    }
    
    std::shared_ptr<crypto::Certificate>
    CertificateStore::findIssuer(const std::shared_ptr<crypto::Certificate>& crt) const
    {
        std::shared_ptr<crypto::Certificate> ret {};
        auto n = crt->getIssuerUID();
        if (not n.empty()) {
            if (crt->issuer and crt->issuer->getUID() == n)
                ret = crt->issuer;
            else
                ret = findCertificateByUID(n);
        }
        if (not ret) {
            n = crt->getIssuerName();
            if (not n.empty())
                ret = findCertificateByName(n);
        }
        if (not ret)
            return ret;
        unsigned verify_out = 0;
        int err = gnutls_x509_crt_verify(crt->cert, &ret->cert, 1, 0, &verify_out);
        if (err != GNUTLS_E_SUCCESS) {
            RING_WARN("gnutls_x509_crt_verify failed: %s", gnutls_strerror(err));
            return {};
        }
        if (verify_out & GNUTLS_CERT_INVALID)
            return {};
        return ret;
    }
    
    static std::vector<crypto::Certificate>
    readCertificates(const std::string& path, const std::string& crl_path)
    {
        std::vector<crypto::Certificate> ret;
        if (fileutils::isDirectory(path)) {
            auto files = fileutils::readDirectory(path);
            for (const auto& file : files) {
                auto certs = readCertificates(path+DIR_SEPARATOR_CH+file, crl_path);
                ret.insert(std::end(ret),
                           std::make_move_iterator(std::begin(certs)),
                           std::make_move_iterator(std::end(certs)));
            }
        } else {
            try {
                auto data = fileutils::loadFile(path);
                const gnutls_datum_t dt {data.data(), (unsigned)data.size()};
                gnutls_x509_crt_t* certs {nullptr};
                unsigned cert_num {0};
                gnutls_x509_crt_list_import2(&certs, &cert_num, &dt, GNUTLS_X509_FMT_PEM, 0);
                for (unsigned i=0; i<cert_num; i++)
                    ret.emplace_back(certs[i]);
            } catch (const std::exception& e) {};
        }
        return ret;
    }
    
    void
    CertificateStore::pinCertificatePath(const std::string& path, std::function<void(const std::vector<std::string>&)> cb)
    {
        ThreadPool::instance().run([&, path, cb]() {
            auto certs = readCertificates(path, crlPath_);
            std::vector<std::string> ids;
            std::vector<std::weak_ptr<crypto::Certificate>> scerts;
            ids.reserve(certs.size());
            scerts.reserve(certs.size());
            {
                std::lock_guard<std::mutex> l(lock_);
    
                for (auto& cert : certs) {
                    auto shared = std::make_shared<crypto::Certificate>(std::move(cert));
                    scerts.emplace_back(shared);
                    auto e = certs_.emplace(shared->getId().toString(), shared);
                    ids.emplace_back(e.first->first);
                }
                paths_.emplace(path, std::move(scerts));
            }
            RING_DBG("CertificateStore: loaded %zu certificates from %s.",
                     certs.size(), path.c_str());
            if (cb)
                cb(ids);
            emitSignal<DRing::ConfigurationSignal::CertificatePathPinned>(path, ids);
        });
    }
    
    unsigned
    CertificateStore::unpinCertificatePath(const std::string& path)
    {
        std::lock_guard<std::mutex> l(lock_);
    
        auto certs = paths_.find(path);
        if (certs == std::end(paths_))
            return 0;
        unsigned n = 0;
        for (const auto& wcert : certs->second) {
            if (auto cert = wcert.lock()) {
                certs_.erase(cert->getId().toString());
                ++n;
            }
        }
        paths_.erase(certs);
        return n;
    }
    
    std::vector<std::string>
    CertificateStore::pinCertificate(const std::vector<uint8_t>& cert,
                                     bool local) noexcept
    {
        try {
            return pinCertificate(crypto::Certificate(cert), local);
        } catch (const std::exception& e) {}
        return {};
    }
    
    std::vector<std::string>
    CertificateStore::pinCertificate(crypto::Certificate&& cert, bool local)
    {
        return pinCertificate(std::make_shared<crypto::Certificate>(std::move(cert)), local);
    }
    
    std::vector<std::string>
    CertificateStore::pinCertificate(const std::shared_ptr<crypto::Certificate>& cert, bool local)
    {
        bool sig {false};
        std::vector<std::string> ids {};
        {
            auto c = cert;
            std::lock_guard<std::mutex> l(lock_);
            while (c) {
                bool inserted;
                auto id = c->getId().toString();
                decltype(certs_)::iterator it;
                std::tie(it, inserted) = certs_.emplace(id, c);
                if (not inserted)
                    it->second = c;
                if (local) {
                    for (const auto& crl : c->getRevocationLists())
                        pinRevocationList(id, *crl);
                }
                ids.emplace_back(id);
                c = c->issuer;
                sig |= inserted;
            }
            if (local) {
                if (sig)
                    fileutils::saveFile(certPath_+DIR_SEPARATOR_CH+ids.front(), cert->getPacked());
            }
        }
        for (const auto& id : ids)
            emitSignal<DRing::ConfigurationSignal::CertificatePinned>(id);
        return ids;
    }
    
    bool
    CertificateStore::unpinCertificate(const std::string& id)
    {
        std::lock_guard<std::mutex> l(lock_);
    
        certs_.erase(id);
        return remove((certPath_+DIR_SEPARATOR_CH+id).c_str()) == 0;
    }
    
    
    bool
    CertificateStore::setTrustedCertificate(const std::string& id, TrustStatus status)
    {
        if (status == TrustStatus::TRUSTED) {
            if (auto crt = getCertificate(id)) {
                trustedCerts_.emplace_back(crt);
                return true;
            }
        } else {
            auto tc = std::find_if(trustedCerts_.begin(), trustedCerts_.end(),
                                   [&](const std::shared_ptr<crypto::Certificate>& crt){
                                       return crt->getId().toString() == id;
                                   });
            if (tc != trustedCerts_.end()) {
                trustedCerts_.erase(tc);
                return true;
            }
        }
        return false;
    }
    
    std::vector<gnutls_x509_crt_t>
    CertificateStore::getTrustedCertificates() const
    {
        std::vector<gnutls_x509_crt_t> crts;
        crts.reserve(trustedCerts_.size());
        for (auto& crt : trustedCerts_)
            crts.emplace_back(crt->cert);
        return crts;
    }
    
    void
    CertificateStore::pinRevocationList(const std::string& id, const std::shared_ptr<dht::crypto::RevocationList>& crl)
    {
        try {
            if (auto c = getCertificate(id))
                c->addRevocationList(crl);
            pinRevocationList(id, *crl);
        } catch (...) {
            RING_WARN("Can't add revocation list");
        }
    }
    
    void
    CertificateStore::pinRevocationList(const std::string& id, const dht::crypto::RevocationList& crl)
    {
        auto v = crl.getNumber();
        std::stringstream ss;
        ss << std::hex;
        for (const auto& b : v)
            ss << (unsigned)b;
    
        fileutils::check_dir((crlPath_+DIR_SEPARATOR_CH+id).c_str());
        fileutils::saveFile(crlPath_+DIR_SEPARATOR_CH+id+DIR_SEPARATOR_CH+ss.str(), crl.getPacked());
    }
    
    TrustStore::PermissionStatus
    TrustStore::statusFromStr(const char* str)
    {
        if (!std::strcmp(str, DRing::Certificate::Status::ALLOWED))
            return PermissionStatus::ALLOWED;
        if (!std::strcmp(str, DRing::Certificate::Status::BANNED))
            return PermissionStatus::BANNED;
        return PermissionStatus::UNDEFINED;
    }
    
    const char*
    TrustStore::statusToStr(TrustStore::PermissionStatus s)
    {
        switch (s) {
            case PermissionStatus::ALLOWED:
                return DRing::Certificate::Status::ALLOWED;
            case PermissionStatus::BANNED:
                return DRing::Certificate::Status::BANNED;
            case PermissionStatus::UNDEFINED:
            default:
                return DRing::Certificate::Status::UNDEFINED;
        }
    }
    
    TrustStatus
    trustStatusFromStr(const char* str)
    {
        if (!std::strcmp(str, DRing::Certificate::TrustStatus::TRUSTED))
            return TrustStatus::TRUSTED;
        return TrustStatus::UNTRUSTED;
    }
    
    const char*
    statusToStr(TrustStatus s)
    {
        switch (s) {
            case TrustStatus::TRUSTED:
                return DRing::Certificate::TrustStatus::TRUSTED;
            case TrustStatus::UNTRUSTED:
            default:
                return DRing::Certificate::TrustStatus::UNTRUSTED;
        }
    }
    
    TrustStore::TrustStore()
    {
        //gnutls_x509_trust_list_init(&trust_, 0);
        gnutls_x509_trust_list_init(&allowed_, 0);
    }
    
    TrustStore::~TrustStore()
    {
        //gnutls_x509_trust_list_deinit(trust_, false);
        gnutls_x509_trust_list_deinit(allowed_, false);
    }
    
    TrustStore&
    TrustStore::operator=(TrustStore&& o)
    {
        unknownCertStatus_ = std::move(o.unknownCertStatus_);
        certStatus_ = std::move(o.certStatus_);
        revokedList_ = std::move(o.revokedList_);
        if (allowed_)
            gnutls_x509_trust_list_deinit(allowed_, false);
        allowed_ = std::move(o.allowed_);
        o.allowed_ = nullptr;
        return *this;
    }
    
    bool
    TrustStore::addRevocationList(dht::crypto::RevocationList&& crl)
    {
        auto packed = crl.getPacked();
        revokedList_.emplace_back(std::forward<dht::crypto::RevocationList>(crl));
        auto crlp = crl.get();
        return gnutls_x509_trust_list_add_crls(allowed_, &crlp, 1, GNUTLS_TL_VERIFY_CRL, 0) > 0;
    }
    
    bool
    TrustStore::setCertificateStatus(const std::string& cert_id,
                                     const TrustStore::PermissionStatus status)
    {
        updateKnownCerts();
        auto s = certStatus_.find(cert_id);
        if (s == std::end(certStatus_)) {
            if (auto cert = CertificateStore::instance().getCertificate(cert_id)) {
                auto& crt_status = certStatus_[cert->getId().toString()];
                if (not crt_status.first)
                    crt_status.first = cert;
                crt_status.second.allowed = (status == PermissionStatus::ALLOWED);
                setStoreCertStatus(*cert, status);
            } else
                unknownCertStatus_[cert_id].allowed = (status == PermissionStatus::ALLOWED);
        } else {
            s->second.second.allowed = (status == PermissionStatus::ALLOWED);
            setStoreCertStatus(*s->second.first, status);
        }
        return true;
    }
    
    bool
    TrustStore::setCertificateStatus(const std::shared_ptr<crypto::Certificate>& cert,
                                     const TrustStore::PermissionStatus status, bool local)
    {
        CertificateStore::instance().pinCertificate(cert, local);
        auto& crt_status = certStatus_[cert->getId().toString()];
        if (not crt_status.first)
            crt_status.first = cert;
        crt_status.second.allowed = (status == PermissionStatus::ALLOWED);
        setStoreCertStatus(*cert, status);
        return true;
    }
    
    bool
    TrustStore::setCertificateStatus(const std::string& cert_id, const TrustStatus status)
    {
        updateKnownCerts();
        auto s = certStatus_.find(cert_id);
        if (s == std::end(certStatus_)) {
            if (auto cert = CertificateStore::instance().getCertificate(cert_id)) {
                auto& crt_status = certStatus_[cert->getId().toString()];
                if (not crt_status.first)
                    crt_status.first = cert;
                crt_status.second.trusted = (status == TrustStatus::TRUSTED);
            } else
                unknownCertStatus_[cert_id].trusted = (status == TrustStatus::TRUSTED);
        } else {
            s->second.second.trusted = (status == TrustStatus::TRUSTED);
        }
        return true;
    }
    
    bool
    TrustStore::setCertificateStatus(const std::shared_ptr<crypto::Certificate>& cert,
                                     const TrustStatus status, bool local)
    {
        CertificateStore::instance().pinCertificate(cert, local);
        auto& crt_status = certStatus_[cert->getId().toString()];
        if (not crt_status.first)
            crt_status.first = cert;
        crt_status.second.trusted = (status == TrustStatus::TRUSTED);
        return true;
    }
    
    TrustStore::PermissionStatus
    TrustStore::getCertificateStatus(const std::string& cert_id) const
    {
        auto s = certStatus_.find(cert_id);
        if (s == std::end(certStatus_)) {
            auto us = unknownCertStatus_.find(cert_id);
            if (us == std::end(unknownCertStatus_))
                return PermissionStatus::UNDEFINED;
            return us->second.allowed ? PermissionStatus::ALLOWED : PermissionStatus::BANNED;
        }
        return s->second.second.allowed ? PermissionStatus::ALLOWED : PermissionStatus::BANNED;
    }
    
    TrustStatus
    TrustStore::getCertificateTrustStatus(const std::string& cert_id) const
    {
        auto s = certStatus_.find(cert_id);
        if (s == std::end(certStatus_)) {
            auto us = unknownCertStatus_.find(cert_id);
            if (us == std::end(unknownCertStatus_))
                return TrustStatus::UNTRUSTED;
            return us->second.trusted ? TrustStatus::TRUSTED : TrustStatus::UNTRUSTED;
        }
        return s->second.second.trusted ? TrustStatus::TRUSTED : TrustStatus::UNTRUSTED;
    }
    
    std::vector<std::string>
    TrustStore::getCertificatesByStatus(TrustStore::PermissionStatus status)
    {
        std::vector<std::string> ret;
        for (const auto& i : certStatus_)
            if (i.second.second.allowed == (status == TrustStore::PermissionStatus::ALLOWED))
                ret.emplace_back(i.first);
        for (const auto& i : unknownCertStatus_)
            if (i.second.allowed == (status == TrustStore::PermissionStatus::ALLOWED))
                ret.emplace_back(i.first);
        return ret;
    }
    
    bool
    TrustStore::isAllowed(const crypto::Certificate& crt)
    {
        // Match by certificate pinning (device)
        auto status = getCertificateStatus(crt.getId().toString());
        if (status == PermissionStatus::ALLOWED)
            return true;
        else if (status == PermissionStatus::BANNED)
            return false;
    
        // Match by certificate chain
        updateKnownCerts();
        return matchTrustStore(getChain(crt), allowed_);
    }
    
    
    std::vector<gnutls_x509_crt_t>
    TrustStore::getTrustedCertificates() const
    {
        auto cas = CertificateStore::instance().getTrustedCertificates();
        for (const auto& i : certStatus_)
            if (i.second.second.trusted)
                cas.emplace_back(i.second.first->cert);
        return cas;
    }
    
    bool
    TrustStore::matchTrustStore(std::vector<gnutls_x509_crt_t>&& crts, gnutls_x509_trust_list_st* store)
    {
        unsigned result = 0;
    
    #if GNUTLS_VERSION_NUMBER > 0x030308
        auto ret = gnutls_x509_trust_list_verify_crt2(
            store,
            crts.data(), crts.size(),
            nullptr, 0,
            GNUTLS_PROFILE_TO_VFLAGS(GNUTLS_PROFILE_MEDIUM),
            &result, nullptr);
    #else
        auto ret = gnutls_x509_trust_list_verify_crt(
            store,
            crts.data(), crts.size(),
            0,
            &result, nullptr);
    #endif
    
        if (ret < 0) {
            RING_ERR("Error verifying certificate: %s", gnutls_strerror(ret));
            return false;
        } else if (result & GNUTLS_CERT_INVALID) {
            RING_WARN("Certificate check failed with code: %d", result);
            if (result & GNUTLS_CERT_SIGNATURE_FAILURE)
                RING_WARN("* The signature verification failed.");
            if (result & GNUTLS_CERT_REVOKED)
                RING_WARN("* Certificate is revoked");
            if (result & GNUTLS_CERT_SIGNER_NOT_FOUND)
                RING_WARN("* Certificate's issuer is not known");
            if (result & GNUTLS_CERT_SIGNER_NOT_CA)
                RING_WARN("* Certificate's issuer not a CA");
            if (result & GNUTLS_CERT_SIGNER_CONSTRAINTS_FAILURE)
                RING_WARN("* Certificate's signer constraints were violated");
            if (result & GNUTLS_CERT_INSECURE_ALGORITHM)
                RING_WARN("* Certificate was signed using an insecure algorithm");
            if (result & GNUTLS_CERT_NOT_ACTIVATED)
                RING_WARN("* Certificate is not yet activated");
            if (result & GNUTLS_CERT_EXPIRED)
                RING_WARN("* Certificate has expired");
            if (result & GNUTLS_CERT_UNEXPECTED_OWNER)
                RING_WARN("* The owner is not the expected one");
            if (result & GNUTLS_CERT_PURPOSE_MISMATCH)
                RING_WARN("* Certificate or an intermediate does not match the intended purpose");
            if (result & GNUTLS_CERT_MISMATCH)
                RING_WARN("* Certificate presented isn't the expected one");
        }
    
        return !(result & GNUTLS_CERT_INVALID);
    }
    
    std::vector<gnutls_x509_crt_t>
    getChain(const crypto::Certificate& crt)
    {
        std::vector<gnutls_x509_crt_t> crts;
        auto c = &crt;
        do {
            crts.emplace_back(c->cert);
            c = c->issuer.get();
        } while (c);
        return crts;
    }
    
    std::vector<gnutls_x509_crl_t>
    getRevocationList(const crypto::Certificate& crt)
    {
        std::vector<gnutls_x509_crl_t> crls_ret;
        const auto& crls = crt.getRevocationLists();
        crls_ret.reserve(crls.size());
        for (const auto& crl : crls)
            crls_ret.emplace_back(crl->get());
        return crls_ret;
    }
    
    void
    TrustStore::updateKnownCerts()
    {
        auto i = std::begin(unknownCertStatus_);
        while (i != std::end(unknownCertStatus_)) {
            if (auto crt = CertificateStore::instance().getCertificate(i->first)) {
                certStatus_.emplace(i->first, std::make_pair(crt, i->second));
                setStoreCertStatus(*crt, i->second.allowed ? PermissionStatus::ALLOWED : PermissionStatus::UNDEFINED);
                i = unknownCertStatus_.erase(i);
            } else
                ++i;
        }
    }
    
    void
    TrustStore::setStoreCertStatus(const crypto::Certificate& crt, TrustStore::PermissionStatus status)
    {
        if (not crt.isCA())
            return;
    
        if (status == PermissionStatus::ALLOWED) {
            gnutls_x509_trust_list_add_cas(allowed_, &crt.cert, 1, 0);
            auto crls = getRevocationList(crt);
            if (not crls.empty())
                if (gnutls_x509_trust_list_add_crls(allowed_, crls.data(), crls.size(), GNUTLS_TL_VERIFY_CRL, 0) == 0)
                    RING_WARN("No CRLs where added");
        }
        else
            gnutls_x509_trust_list_remove_cas(allowed_, &crt.cert, 1);
    
        RING_DBG("TrustStore: setting %s status to %s.",
                 crt.getId().toString().c_str(),
                 status == PermissionStatus::ALLOWED ? "ALLOWED" : "NOT ALLOWED");
    }
    
    }} // namespace ring::tls