diff --git a/.github/workflows/build_releases.yml b/.github/workflows/build_releases.yml index c6e902a..7ef37de 100644 --- a/.github/workflows/build_releases.yml +++ b/.github/workflows/build_releases.yml @@ -8,9 +8,39 @@ on: env: GITHUB_REF: ${{ github.ref }} + GO_VERSION: '1.24.1' jobs: - build-all: + build-common: + runs-on: ubuntu-24.04 + + steps: + - name: Checkout Main Repo + uses: actions/checkout@v4 + with: + repository: gregtwallace/apc-p15-tool + ref: ${{ env.GITHUB_REF }} + fetch-depth: 0 + + - name: Save README + uses: actions/upload-artifact@v4 + with: + name: README.md + path: ./README.md + + - name: Save LICENSE + uses: actions/upload-artifact@v4 + with: + name: LICENSE.md + path: ./LICENSE.md + + - name: Save CHANGELOG + uses: actions/upload-artifact@v4 + with: + name: CHANGELOG.md + path: ./CHANGELOG.md + + build-linux-arm64: runs-on: ubuntu-24.04 steps: - name: Checkout Repo @@ -20,17 +50,255 @@ jobs: ref: ${{ env.GITHUB_REF }} fetch-depth: 0 + - name: Update apt + run: sudo apt update + + - name: Install cross-compiler for linux/arm64 + run: sudo apt-get -y install gcc-aarch64-linux-gnu + - name: Set up Go uses: actions/setup-go@v5 with: - go-version-file: 'go.mod' + go-version: '${{ env.GO_VERSION }}' - - name: Build All - run: | - python ./build_release.py + - name: Build Tool + run: go build -o ./apc-p15-tool -v ./cmd/tool + env: + GOOS: linux + GOARCH: arm64 + CC: aarch64-linux-gnu-gcc + CGO_ENABLED: 0 - - name: Save Zip of all targets + - name: Save Compiled Binary uses: actions/upload-artifact@v4 with: - name: apc-p15-tool-release - path: ./_out/_release + name: apc-p15-tool-linux-arm64 + path: ./apc-p15-tool + + - name: Build Install Only + run: go build -o ./apc-p15-install -v ./cmd/install_only + env: + GOOS: linux + GOARCH: arm64 + CC: aarch64-linux-gnu-gcc + CGO_ENABLED: 0 + + - name: Save Compiled Binary + uses: actions/upload-artifact@v4 + with: + name: apc-p15-install-linux-arm64 + path: ./apc-p15-install + + build-linux-amd64: + runs-on: ubuntu-24.04 + steps: + - name: Checkout Backend Repo + uses: actions/checkout@v4 + with: + repository: gregtwallace/apc-p15-tool + ref: ${{ env.GITHUB_REF }} + fetch-depth: 0 + + - name: Set up Go + uses: actions/setup-go@v5 + with: + go-version: '${{ env.GO_VERSION }}' + + - name: Build Tool + run: go build -o ./apc-p15-tool -v ./cmd/tool + env: + GOOS: linux + GOARCH: amd64 + CGO_ENABLED: 0 + + - name: Save Compiled Binary + uses: actions/upload-artifact@v4 + with: + name: apc-p15-tool-linux-amd64 + path: ./apc-p15-tool + + - name: Build Install Only + run: go build -o ./apc-p15-install -v ./cmd/install_only + env: + GOOS: linux + GOARCH: amd64 + CGO_ENABLED: 0 + + - name: Save Compiled Binary + uses: actions/upload-artifact@v4 + with: + name: apc-p15-install-linux-amd64 + path: ./apc-p15-install + + build-windows-amd64: + runs-on: windows-latest + steps: + - name: Checkout Backend Repo + uses: actions/checkout@v4 + with: + repository: gregtwallace/apc-p15-tool + ref: ${{ env.GITHUB_REF }} + fetch-depth: 0 + + - name: Set up Go + uses: actions/setup-go@v5 + with: + go-version: '${{ env.GO_VERSION }}' + + - name: Build Tool + run: go build -o ./apc-p15-tool.exe -v ./cmd/tool + env: + GOOS: windows + GOARCH: amd64 + CGO_ENABLED: 0 + + - name: Save Compiled Binary + uses: actions/upload-artifact@v4 + with: + name: apc-p15-tool-windows-amd64 + path: ./apc-p15-tool.exe + + - name: Build Install Only + run: go build -o ./apc-p15-install.exe -v ./cmd/install_only + env: + GOOS: windows + GOARCH: amd64 + CGO_ENABLED: 0 + + - name: Save Compiled Binary + uses: actions/upload-artifact@v4 + with: + name: apc-p15-install-windows-amd64 + path: ./apc-p15-install.exe + + release-file-linux-arm64: + needs: [build-common, build-linux-arm64] + runs-on: ubuntu-24.04 + + steps: + - name: Make release directory + run: mkdir ./release + + - name: Download Tool Binary + uses: actions/download-artifact@v4 + with: + name: apc-p15-tool-linux-arm64 + path: ./release + + - name: Download Install Binary + uses: actions/download-artifact@v4 + with: + name: apc-p15-install-linux-arm64 + path: ./release + + - name: Download README + uses: actions/download-artifact@v4 + with: + name: README.md + path: ./release + + - name: Download LICENSE + uses: actions/download-artifact@v4 + with: + name: LICENSE.md + path: ./release + + - name: Download CHANGELOG + uses: actions/download-artifact@v4 + with: + name: CHANGELOG.md + path: ./release + + - name: Save Release + uses: actions/upload-artifact@v4 + with: + name: apc-p15-tool_linux_arm64 + path: ./release + + release-file-linux-amd64: + needs: [build-common, build-linux-amd64] + runs-on: ubuntu-24.04 + + steps: + - name: Make release directory + run: mkdir ./release + + - name: Download Tool Binary + uses: actions/download-artifact@v4 + with: + name: apc-p15-tool-linux-amd64 + path: ./release + + - name: Download Install Binary + uses: actions/download-artifact@v4 + with: + name: apc-p15-install-linux-amd64 + path: ./release + + - name: Download README + uses: actions/download-artifact@v4 + with: + name: README.md + path: ./release + + - name: Download LICENSE + uses: actions/download-artifact@v4 + with: + name: LICENSE.md + path: ./release + + - name: Download CHANGELOG + uses: actions/download-artifact@v4 + with: + name: CHANGELOG.md + path: ./release + + - name: Save Release + uses: actions/upload-artifact@v4 + with: + name: apc-p15-tool_linux_amd64 + path: ./release + + release-file-windows-amd64: + needs: [build-common, build-windows-amd64] + runs-on: ubuntu-24.04 + + steps: + - name: Make release directory + run: mkdir ./release + + - name: Download Tool Binary + uses: actions/download-artifact@v4 + with: + name: apc-p15-tool-windows-amd64 + path: ./release + + - name: Download Install Binary + uses: actions/download-artifact@v4 + with: + name: apc-p15-install-windows-amd64 + path: ./release + + - name: Download README + uses: actions/download-artifact@v4 + with: + name: README.md + path: ./release + + - name: Download LICENSE + uses: actions/download-artifact@v4 + with: + name: LICENSE.md + path: ./release + + - name: Download CHANGELOG + uses: actions/download-artifact@v4 + with: + name: CHANGELOG.md + path: ./release + + - name: Save Release + uses: actions/upload-artifact@v4 + with: + name: apc-p15-tool_windows_amd64 + path: ./release diff --git a/CHANGELOG.md b/CHANGELOG.md index c8a6ff5..f99a0f0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,41 +1,5 @@ # APC P15 Tool Changelog -## [v1.3.0] - 2025-06-23 - -This release attempts to detect and warn of possible incompatibilies with a -spcecified certificate. NMCs do not warn or error when a bad file is installed, -instead they silently fail and generally just generate a new self-signed -certificate. This release checks some properties of the specified certificate -and produces warning messages that can be referenced if the cert installation -appears to work but ultimately doesn't prododuce the expected result. - -- Add warnings based on key type, signature algorithm, validity dates, and - extensions. -- Minor lint. - - -## [v1.2.3] - 2025-06-19 - -Minor updates to the application. Large updates to the build process to -improve building, releasing, and maintainability. - -- Go updated to 1.24.4 and all dependencies updated. -- Added FreeBSD arm64 and amd64 builds. -- Build process overhauled for simplicity. Build is now OS agnostic. PowerShell - script was removed and replaced with a python script. -- Build instructions added to README. -- GitHub build action now only runs in one Ubuntu container and cross-compiles. -- Release windows and macos as zip files and all others as gztar. -- Add file permissions for non-windows and non-macos releases. - - -## [v1.2.2] - 2025-04-22 - -All dependencies updated. - -Add darwin arm64 and amd64 builds. - - ## [v1.2.1] - 2025-03-17 Fix time check for UPS when it is set to GMT timezone. diff --git a/README.md b/README.md index 9286344..1d494ed 100644 --- a/README.md +++ b/README.md @@ -53,14 +53,13 @@ This project aims to solve all of these problems by accepting the most common key and cert file format (PEM) and by being 100% open source and licensed under the GPL-3.0 license. +## Compatibility Notice + +Both NMC2 and NMC3 devices should be fully supported. However, I have one +NMC2 device in a home lab and have no way to guarantee success in all cases. + ### Key Types and Sizes -Ensure you select an appropriate key! - -NMC2 is extremely picky about the key type and size it supports. NMC3 is a bit -more flexible. Beware, some ACME clients will generate an ECDSA key by default -which is NOT supported by NMC2. - NMC2: - RSA 1,024, 2,048, 3,072* bit lengths. @@ -81,60 +80,22 @@ NMC3*: this size if possible. Most (all?) public ACME services won't accept keys of this size anyway. -### Compatibility Notice - -Both NMC2 and NMC3 devices should be fully supported. However, I have one -NMC2 device in a home lab and have no way to guarantee success in all cases. +### General Troubleshooting My setup (and therefore the testing setup) is: - APC Smart-UPS 1500VA RM 2U SUA1500RM2U (Firmware Revision 667.18.D) - AP9631 NMC2 Hardware Revision 05 running AOS v7.1.2 and Boot Monitor v1.0.9. -Generally, if there is a compatibility issue, there is a good chance you will -not see an error. Rather, the NMC will silently fail and you'll only know -something went wrong because the NMC's certificate didn't update, or it regenerated -a self-signed certificate that you'll see upon your next connection attempt. -I've tried to add some `WARNING` messages to the tool to indicate what might -be going wrong, but the list is definitely not exhaustive. +If you have trouble, your first step should be to update your NMC's firmware. +Many issues with this tool will be resolved simply by updating to the newest +firmware. -### Troubleshooting +If you have a problem after that, please post the log in an issue and I can +try to fix it but it may be difficult without your particular hardware to +test with. -Suggested troubleshooting steps: -- Review the `Key Types and Sizes` and `Compatibility Notice` sections of this - README. -- Update your NMC's firmware to the latest version. -- Read this tool's output, look specifically for any `WARNING` messages and - adjust your certificate accordingly. -- Test using an RSA 2048 bit key to obtain a certificate from Let's Encrypt. - Their certificates are known to work with NMC. -- Use the official NMC Security Wizard to verify you can create a working - certificate and load it into your NMC. If the official tool does not work - switching to this tool won't help. - -If you have tried all of these steps and are still experiencing a problem, -you may open an Issue on GitHub. - -Include: -- The full command you are running that is causing the problem. -- The full log of this tool's output when you run the command. Append the - `--debug` flag to your command to get the debug output. - -Keep in mind, I am one person with one specific hardware setup. I may not -be able to help you. - -#### NMC3 Install `ssh: parse error in message type 53` Error - -Configuring a `System Message` on an NMC3 breaks the install function. I do -not have an NMC3 and after doing some code review it is highly unlikely I'll -be able to fix this. Don't use a `System Message` if the install feature is -important to you. - -see: https://github.com/gregtwallace/apc-p15-tool/issues/14 - -#### Install `ssh: handshake failed` Error - -If you are experiencing `ssh: handshake failed:` first try +In particular, if you are experiencing `ssh: handshake failed:` first try using the `--insecurecipher` flag. If this works, you should upgrade your NMC to a newer firmware which includes secure ciphers. You should NOT automate your environment using this flag as SSH over these ciphers is broken and @@ -210,20 +171,6 @@ separate script.  -## Building - -Python3, Go, and git all must be installed to run the build script. - -Once the dependencies are installed, clone this repo and run -`python build_release.py`. If you only want to build for certain OS or -ARCH targets, edit the `targets` array in the `build_release.py` file -before running it. - -## Links - -@Owl-Tec's write up using this tool with ACDS: -https://owltec.ca/Windows+Server/Deploying+An+Internal+HTTPS+Certificate+for+a+UPS+APC+with+ADCS+(Active+Directory+Certificate+Services)+with+APC+P15+Tool - ## Thanks Special thanks to the following people and resources which helped me diff --git a/build.ps1 b/build.ps1 new file mode 100644 index 0000000..7147a33 --- /dev/null +++ b/build.ps1 @@ -0,0 +1,36 @@ +# Parent dir is root +$scriptDir = Get-Location +$outDir = Join-Path -Path $scriptDir -ChildPath "/_out" + +# Windows x64 +$env:GOARCH = "amd64" +$env:GOOS = "windows" +$env:CGO_ENABLED = 0 +go build -o $outDir/apc-p15-tool-amd64.exe ./cmd/tool + +$env:GOARCH = "amd64" +$env:GOOS = "windows" +$env:CGO_ENABLED = 0 +go build -o $outDir/apc-p15-install-amd64.exe ./cmd/install_only + +# Linux x64 +$env:GOARCH = "amd64" +$env:GOOS = "linux" +$env:CGO_ENABLED = 0 +go build -o $outDir/apc-p15-tool-amd64 ./cmd/tool + +$env:GOARCH = "amd64" +$env:GOOS = "linux" +$env:CGO_ENABLED = 0 +go build -o $outDir/apc-p15-install-amd64 ./cmd/install_only + +# Linux arm64 +$env:GOARCH = "arm64" +$env:GOOS = "linux" +$env:CGO_ENABLED = 0 +go build -o $outDir/apc-p15-tool-arm64 ./cmd/tool + +$env:GOARCH = "arm64" +$env:GOOS = "linux" +$env:CGO_ENABLED = 0 +go build -o $outDir/apc-p15-install-arm64 ./cmd/install_only diff --git a/build_release.py b/build_release.py deleted file mode 100644 index d3892e7..0000000 --- a/build_release.py +++ /dev/null @@ -1,89 +0,0 @@ -#!/usr/bin/env python3 -import os.path -import shutil -import subprocess -import tarfile - -# Configuration -# output path (relative to this script) -outRelativeDir = "_out" - -# target strings must be in the format: -# `GOOS_GOARCH` -# see: https://github.com/golang/go/blob/master/src/internal/syslist/syslist.go -# or unofficially: https://gist.github.com/asukakenji/f15ba7e588ac42795f421b48b8aede63 -targets = [ - "windows_amd64", - "linux_amd64", - "linux_arm64", - "darwin_amd64", - "darwin_arm64", - "freebsd_amd64", - "freebsd_arm64", -] - -### - -# Script -# relative dir is root -scriptDir = dirname = os.path.dirname(__file__) -outBaseDir = os.path.join(scriptDir, outRelativeDir) -releaseDir = os.path.join(outBaseDir, "_release") - -# recreate paths -if os.path.exists(outBaseDir): - shutil.rmtree(outBaseDir) -os.makedirs(outBaseDir) -os.makedirs(releaseDir) - -# get version number / tag -gitTag = subprocess.check_output(["git", "describe", "--tags", "--abbrev=0"]).decode('utf-8').strip() - -# loop through and build all targets -for target in targets: - # environment vars - split = target.split("_") - GOOS = split[0] - GOARCH = split[1] - os.environ["GOOS"] = GOOS - os.environ["GOARCH"] = GOARCH - os.environ["CGO_ENABLED"] = "0" - - # send build product to GOOS_GOARCH subfolders - targetOutDir = os.path.join(outBaseDir, target) - if not os.path.exists(targetOutDir): - os.makedirs(targetOutDir) - - # special case for windows to add file extensions - extension = "" - if GOOS.lower() == "windows": - extension = ".exe" - - # build binary and install only binary - subprocess.run(["go", "build", "-o", f"{targetOutDir}/apc-p15-tool{extension}", "./cmd/tool"]) - subprocess.run(["go", "build", "-o", f"{targetOutDir}/apc-p15-install{extension}", "./cmd/install_only"]) - - # copy other important files for release - shutil.copy("README.md", targetOutDir) - shutil.copy("CHANGELOG.md", targetOutDir) - shutil.copy("LICENSE.md", targetOutDir) - - # compress release file - # special case for windows & mac to use zip format - if GOOS.lower() == "windows" or GOOS.lower() == "darwin": - shutil.make_archive(f"{releaseDir}/apc-p15-tool-{gitTag}_{target}", "zip", targetOutDir) - else: - # for others, use gztar and set permissions on the files - - # filter for setting permissions - def set_permissions(tarinfo): - if tarinfo.name == "apc-p15-tool" or tarinfo.name == "apc-p15-install": - tarinfo.mode = 0o0755 - else: - tarinfo.mode = 0o0644 - return tarinfo - - # make tar - with tarfile.open(f"{releaseDir}/apc-p15-tool-{gitTag}_{target}.tar.gz", "w:gz") as tar: - for file in os.listdir(targetOutDir): - tar.add(os.path.join(targetOutDir, file), arcname=file, recursive=False, filter=set_permissions) diff --git a/go.mod b/go.mod index 4848582..3c00d28 100644 --- a/go.mod +++ b/go.mod @@ -1,14 +1,14 @@ module apc-p15-tool -go 1.24.4 +go 1.24.1 require ( github.com/peterbourgon/ff/v4 v4.0.0-alpha.4 github.com/sigurn/crc16 v0.0.0-20240131213347-83fcde1e29d1 - golang.org/x/crypto v0.39.0 + golang.org/x/crypto v0.36.0 ) -require golang.org/x/sys v0.33.0 // indirect +require golang.org/x/sys v0.31.0 // indirect replace apc-p15-tool/cmd/install_only => /cmd/install_only diff --git a/go.sum b/go.sum index cd5913b..950e8c5 100644 --- a/go.sum +++ b/go.sum @@ -4,11 +4,11 @@ github.com/peterbourgon/ff/v4 v4.0.0-alpha.4 h1:aiqS8aBlF9PsAKeMddMSfbwp3smONCn3 github.com/peterbourgon/ff/v4 v4.0.0-alpha.4/go.mod h1:H/13DK46DKXy7EaIxPhk2Y0EC8aubKm35nBjBe8AAGc= github.com/sigurn/crc16 v0.0.0-20240131213347-83fcde1e29d1 h1:NVK+OqnavpyFmUiKfUMHrpvbCi2VFoWTrcpI7aDaJ2I= github.com/sigurn/crc16 v0.0.0-20240131213347-83fcde1e29d1/go.mod h1:9/etS5gpQq9BJsJMWg1wpLbfuSnkm8dPF6FdW2JXVhA= -golang.org/x/crypto v0.39.0 h1:SHs+kF4LP+f+p14esP5jAoDpHU8Gu/v9lFRK6IT5imM= -golang.org/x/crypto v0.39.0/go.mod h1:L+Xg3Wf6HoL4Bn4238Z6ft6KfEpN0tJGo53AAPC632U= -golang.org/x/sys v0.33.0 h1:q3i8TbbEz+JRD9ywIRlyRAQbM0qF7hu24q3teo2hbuw= -golang.org/x/sys v0.33.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k= -golang.org/x/term v0.32.0 h1:DR4lr0TjUs3epypdhTOkMmuF5CDFJ/8pOnbzMZPQ7bg= -golang.org/x/term v0.32.0/go.mod h1:uZG1FhGx848Sqfsq4/DlJr3xGGsYMu/L5GW4abiaEPQ= +golang.org/x/crypto v0.36.0 h1:AnAEvhDddvBdpY+uR+MyHmuZzzNqXSe/GvuDeob5L34= +golang.org/x/crypto v0.36.0/go.mod h1:Y4J0ReaxCR1IMaabaSMugxJES1EpwhBHhv2bDHklZvc= +golang.org/x/sys v0.31.0 h1:ioabZlmFYtWhL+TRYpcnNlLwhyxaM9kWTDEmfnprqik= +golang.org/x/sys v0.31.0/go.mod h1:BJP2sWEmIv4KK5OTEluFJCKSidICx8ciO85XgH3Ak8k= +golang.org/x/term v0.30.0 h1:PQ39fJZ+mfadBm0y5WlL4vlM7Sx1Hgf13sMIY2+QS9Y= +golang.org/x/term v0.30.0/go.mod h1:NYYFdzHoI5wRh/h5tDMdMqCqPJZEuNqVR5xJLd/n67g= gopkg.in/yaml.v2 v2.4.0 h1:D8xgwECY7CYvx+Y2n4sBz93Jn9JRvxdiyyo8CTfuKaY= gopkg.in/yaml.v2 v2.4.0/go.mod h1:RDklbk79AGWmwhnvt/jBztapEOGDOx6ZbXqjP6csGnQ= diff --git a/pkg/app/app.go b/pkg/app/app.go index 151236e..65b21be 100644 --- a/pkg/app/app.go +++ b/pkg/app/app.go @@ -12,7 +12,7 @@ import ( ) const ( - appVersion = "1.3.0" + appVersion = "1.2.1" ) // struct for receivers to use common app pieces diff --git a/pkg/app/cmd_install.go b/pkg/app/cmd_install.go index d94c00c..eacda53 100644 --- a/pkg/app/cmd_install.go +++ b/pkg/app/cmd_install.go @@ -145,7 +145,7 @@ func (app *app) cmdInstall(cmdCtx context.Context, args []string) error { // verify cert is the correct one certVerified := bytes.Equal(leafCert.Raw, pemBlock.Bytes) if !certVerified { - return errors.New("install: web ui leaf cert does not match new cert (your cert may not be compatible with NMC; check for WARNINGs in this tool's output)") + return errors.New("install: web ui leaf cert does not match new cert") } app.stdLogger.Println("install: ups web ui cert verified") diff --git a/pkg/app/pem_to_p15.go b/pkg/app/pem_to_p15.go index f6a6094..d48d4a8 100644 --- a/pkg/app/pem_to_p15.go +++ b/pkg/app/pem_to_p15.go @@ -2,11 +2,8 @@ package app import ( "apc-p15-tool/pkg/pkcs15" - "crypto/x509" - "encoding/asn1" "fmt" "slices" - "time" ) // list of keys supported by the NMC2 @@ -16,32 +13,6 @@ var nmc2SupportedKeyTypes = []pkcs15.KeyType{ pkcs15.KeyTypeRSA3072, // officially not supported but works } -// known good signing algorithms -var knownSupportedNMC2SigningAlgs = []x509.SignatureAlgorithm{ - x509.SHA256WithRSA, -} - -var knownSupportedNMC3SigningAlgs = append(knownSupportedNMC2SigningAlgs, []x509.SignatureAlgorithm{ - x509.ECDSAWithSHA384, -}...) - -// known supported cert extensions -var knownSupportedCriticalOIDs = []asn1.ObjectIdentifier{ - {2, 5, 29, 15}, // keyUsage - {2, 5, 29, 19}, // basicConstraints - {2, 5, 29, 17}, // subjectAltName -} - -var knownSupportedOIDs = append(knownSupportedCriticalOIDs, []asn1.ObjectIdentifier{ - {2, 5, 29, 37}, // extKeyUsage - {2, 5, 29, 14}, // subjectKeyIdentifier - {2, 5, 29, 35}, // authorityKeyIdentifier - {1, 3, 6, 1, 5, 5, 7, 1, 1}, // authorityInfoAccess - {2, 5, 29, 32}, // certificatePolicies - {1, 3, 6, 1, 4, 1, 11129, 2, 4, 2}, // googleSignedCertificateTimestamp - {2, 5, 29, 31}, // cRLDistributionPoints -}...) - // pemToAPCP15 reads the specified pem files and returns the apc p15 file(s). If the // key type of the key is not supported by NMC2, the combined key+cert file is not // generated and nil is returned instead for that file. If the key IS supported by @@ -66,10 +37,7 @@ func (app *app) pemToAPCP15(keyPem, certPem []byte, parentCmdName string) (keyFi app.stdLogger.Printf("%s: successfully generated p15 key file content", parentCmdName) // check key type for compat with NMC2 - nmc2KeyType := false if slices.Contains(nmc2SupportedKeyTypes, p15.KeyType()) { - nmc2KeyType = true - app.stdLogger.Printf("%s: key type is supported by NMC2, generating p15 key+cert file content...", parentCmdName) // make file bytes @@ -86,84 +54,11 @@ func (app *app) pemToAPCP15(keyPem, certPem []byte, parentCmdName string) (keyFi // combine header with file apcKeyCertFile = append(apcHeader, keyCertFile...) - } - - // check various parts of cert and log compatibility warnings - warned := false - - // key not supported for NMC2 - if !nmc2KeyType { - app.stdLogger.Printf("WARNING: %s: key type is %s and is not supported by NMC2.", parentCmdName, p15.KeyType().String()) - warned = true - } - - // signature algorithm (see: https://github.com/gregtwallace/apc-p15-tool/issues/18) - if !nmc2KeyType { - // definitely not for NMC2 - if !slices.Contains(knownSupportedNMC3SigningAlgs, p15.Cert.SignatureAlgorithm) { - app.stdLogger.Printf("WARNING: %s: Certificate signing algorithm is %s and it is not known if NMC3 supports this algorithm.", parentCmdName, p15.Cert.SignatureAlgorithm.String()) - warned = true - } } else { - // could be for either NMC2 or NMC3 - if !slices.Contains(knownSupportedNMC2SigningAlgs, p15.Cert.SignatureAlgorithm) { - if !slices.Contains(knownSupportedNMC3SigningAlgs, p15.Cert.SignatureAlgorithm) { - // not in NMC2 or NMC3 list - app.stdLogger.Printf("WARNING: %s: Certificate signing algorithm is %s and is not supported by NMC2. It is also not known if NMC3 supports this algorithm.", parentCmdName, p15.Cert.SignatureAlgorithm.String()) - } else { - // not in NMC2 list, but is in NMC3 list - app.stdLogger.Printf("WARNING: %s: Certificate signing algorithm is %s and it does not support NMC2.", parentCmdName, p15.Cert.SignatureAlgorithm.String()) - } - warned = true - } + // NMC2 unsupported + app.stdLogger.Printf("%s: key type is not supported by NMC2, skipping p15 key+cert file content", parentCmdName) } - // check validity dates - if time.Now().Before(p15.Cert.NotBefore) { - app.stdLogger.Printf("WARNING: %s: Current time (%s) is before certificate's NotBefore time (%s).", - parentCmdName, time.Now().Format(timeLoggingFormat), p15.Cert.NotBefore.Format(timeLoggingFormat)) - warned = true - } - - if time.Now().After(p15.Cert.NotAfter) { - app.stdLogger.Printf("WARNING: %s: Current time (%s) is after certificate's NotAfter time (%s).", - parentCmdName, time.Now().Format(timeLoggingFormat), p15.Cert.NotAfter.Format(timeLoggingFormat)) - warned = true - } - - // check extensions against known working extensions - for _, extension := range p15.Cert.Extensions { - // critical or not? - okOIDs := knownSupportedCriticalOIDs - criticalLogMsg := "Critical " - if !extension.Critical { - okOIDs = knownSupportedOIDs - criticalLogMsg = "" - } - - // validate OIDs - ok := false - for _, okOID := range okOIDs { - if okOID.Equal(extension.Id) { - ok = true - break - } - } - - if !ok { - app.stdLogger.Printf("WARNING: %s: %sExtension %s may not be supported by NMC.", parentCmdName, criticalLogMsg, extension.Id.String()) - } - } - - // log a message about possible failure - if warned { - app.stdLogger.Printf("WARNING: %s: Possible certificate compatibility issues were detected. If the resulting p15 file "+ - "does not work with your NMC (e.g., a self-signed certificate is regenerated after you try to install the p15), "+ - "modify your certificate to resolve the warnings and try again.", parentCmdName) - } - - // end compatibility warnings - app.stdLogger.Printf("%s: apc p15 file(s) data succesfully generated", parentCmdName) return keyFile, apcKeyCertFile, nil diff --git a/pkg/pkcs15/encrypted_envelope.go b/pkg/pkcs15/encrypted_envelope.go index a6dc525..71433d1 100644 --- a/pkg/pkcs15/encrypted_envelope.go +++ b/pkg/pkcs15/encrypted_envelope.go @@ -25,7 +25,7 @@ const ( // params expected in the APC file. func (p15 *pkcs15KeyCert) computeEncryptedKeyEnvelope() error { // if computation already performed, this is a no-op (keep existing envelope) - if len(p15.envelopedPrivateKey) > 0 { + if p15.envelopedPrivateKey != nil && len(p15.envelopedPrivateKey) != 0 { return nil } diff --git a/pkg/pkcs15/keyid.go b/pkg/pkcs15/keyid.go index cac7301..08a3ce4 100644 --- a/pkg/pkcs15/keyid.go +++ b/pkg/pkcs15/keyid.go @@ -15,7 +15,7 @@ func (p15 *pkcs15KeyCert) keyId() []byte { // SHA-1 Hash hasher := sha1.New() - _, err := hasher.Write(p15.Cert.RawSubjectPublicKeyInfo) + _, err := hasher.Write(p15.cert.RawSubjectPublicKeyInfo) if err != nil { panic(err) } @@ -46,9 +46,9 @@ func (p15 *pkcs15KeyCert) keyIdInt3() []byte { // object to hash hashObj := asn1obj.Sequence([][]byte{ // issuerDistinguishedName - p15.Cert.RawIssuer, + p15.cert.RawIssuer, // serialNumber - asn1obj.Integer(p15.Cert.SerialNumber), + asn1obj.Integer(p15.cert.SerialNumber), }) // SHA-1 Hash @@ -74,7 +74,7 @@ func (p15 *pkcs15KeyCert) keyIdInt6() []byte { // SHA-1 Hash hasher := sha1.New() - _, err := hasher.Write(p15.Cert.RawIssuer) + _, err := hasher.Write(p15.cert.RawIssuer) if err != nil { panic(err) } @@ -95,7 +95,7 @@ func (p15 *pkcs15KeyCert) keyIdInt7() []byte { // SHA-1 Hash hasher := sha1.New() - _, err := hasher.Write(p15.Cert.RawSubject) + _, err := hasher.Write(p15.cert.RawSubject) if err != nil { panic(err) } @@ -168,7 +168,7 @@ func (p15 *pkcs15KeyCert) keyIdInt9() []byte { // to be ~ 1 hour ish BEFORE the cert was even created. Key would also // obviously have to be created prior to the cert creation. time := make([]byte, 4) - binary.BigEndian.PutUint32(time, uint32(p15.Cert.NotBefore.Unix())) + binary.BigEndian.PutUint32(time, uint32(p15.cert.NotBefore.Unix())) publicKeyPacket = append(publicKeyPacket, time...) // the next part is key type specific diff --git a/pkg/pkcs15/pem_parse.go b/pkg/pkcs15/pem_parse.go index 9df0ecd..19e44f1 100644 --- a/pkg/pkcs15/pem_parse.go +++ b/pkg/pkcs15/pem_parse.go @@ -10,8 +10,8 @@ import ( // pkcs15KeyCert holds the data for a key and certificate pair; it provides // various methods to transform pkcs15 data type pkcs15KeyCert struct { - Cert *x509.Certificate key crypto.PrivateKey + cert *x509.Certificate // store the encrypted enveloped Private Key for re-use envelopedPrivateKey []byte } @@ -32,31 +32,6 @@ const ( KeyTypeUnknown ) -// String returns the private key type in a log friendly string format. -func (keyType KeyType) String() string { - switch keyType { - case KeyTypeRSA1024: - return "RSA 1024-bit" - case KeyTypeRSA2048: - return "RSA 2048-bit" - case KeyTypeRSA3072: - return "RSA 3072-bit" - case KeyTypeRSA4096: - return "RSA 4096-bit" - - case KeyTypeECP256: - return "ECDSA P-256" - case KeyTypeECP384: - return "ECDSA P-384" - case KeyTypeECP521: - return "ECDSA P-521" - - default: - } - - return "unknown key type" -} - // KeyType returns the private key type func (p15 *pkcs15KeyCert) KeyType() KeyType { switch pKey := p15.key.(type) { @@ -110,7 +85,7 @@ func ParsePEMToPKCS15(keyPem, certPem []byte) (*pkcs15KeyCert, error) { // create p15 struct p15 := &pkcs15KeyCert{ key: key, - Cert: cert, + cert: cert, } // pre-calculate encrypted envelope diff --git a/pkg/pkcs15/pem_to_p15.go b/pkg/pkcs15/pem_to_p15.go index a68aba2..0c2214d 100644 --- a/pkg/pkcs15/pem_to_p15.go +++ b/pkg/pkcs15/pem_to_p15.go @@ -43,9 +43,9 @@ func (p15 *pkcs15KeyCert) ToP15KeyCert() (keyCert []byte, err error) { // CommonKeyAttributes - accessFlags (trailing 0s will drop) asn1obj.BitString([]byte{byte(0b10110000)}), // CommonKeyAttributes - startDate - asn1obj.GeneralizedTime(p15.Cert.NotBefore), + asn1obj.GeneralizedTime(p15.cert.NotBefore), // CommonKeyAttributes - [0] endDate - asn1obj.GeneralizedTimeExplicitValue(0, p15.Cert.NotAfter), + asn1obj.GeneralizedTimeExplicitValue(0, p15.cert.NotAfter), }), // ObjectValue - indirect-protected asn1obj.ExplicitCompound(1, [][]byte{ @@ -74,9 +74,9 @@ func (p15 *pkcs15KeyCert) ToP15KeyCert() (keyCert []byte, err error) { // CommonKeyAttributes - accessFlags (trailing 0s will drop) asn1obj.BitString([]byte{byte(0b10110000)}), // CommonKeyAttributes - startDate - asn1obj.GeneralizedTime(p15.Cert.NotBefore), + asn1obj.GeneralizedTime(p15.cert.NotBefore), // CommonKeyAttributes - [0] endDate - asn1obj.GeneralizedTimeExplicitValue(0, p15.Cert.NotAfter), + asn1obj.GeneralizedTimeExplicitValue(0, p15.cert.NotAfter), }), // ObjectValue - indirect-protected asn1obj.ExplicitCompound(1, [][]byte{ @@ -114,15 +114,15 @@ func (p15 *pkcs15KeyCert) ToP15KeyCert() (keyCert []byte, err error) { p15.keyIdInt9(), }), // CommonKeyAttributes - startDate - asn1obj.GeneralizedTime(p15.Cert.NotBefore), + asn1obj.GeneralizedTime(p15.cert.NotBefore), // CommonKeyAttributes - [4] endDate - asn1obj.GeneralizedTimeExplicitValue(4, p15.Cert.NotAfter), + asn1obj.GeneralizedTimeExplicitValue(4, p15.cert.NotAfter), }), // actual certificate itself asn1obj.ExplicitCompound(1, [][]byte{ asn1obj.Sequence([][]byte{ asn1obj.ExplicitCompound(0, [][]byte{ - p15.Cert.Raw, + p15.cert.Raw, }), }), }),