This repository has been archived by the owner on Apr 27, 2021. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 28
/
CertificateTransparencyBase.kt
129 lines (112 loc) · 5.73 KB
/
CertificateTransparencyBase.kt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
/*
* Copyright 2019 Babylon Partners Limited
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*
* Code derived from https://github.com/google/certificate-transparency-java
*/
package com.babylon.certificatetransparency.internal.verifier
import com.babylon.certificatetransparency.CTPolicy
import com.babylon.certificatetransparency.SctVerificationResult
import com.babylon.certificatetransparency.VerificationResult
import com.babylon.certificatetransparency.cache.DiskCache
import com.babylon.certificatetransparency.chaincleaner.CertificateChainCleaner
import com.babylon.certificatetransparency.chaincleaner.CertificateChainCleanerFactory
import com.babylon.certificatetransparency.datasource.DataSource
import com.babylon.certificatetransparency.internal.loglist.LogListDataSourceFactory
import com.babylon.certificatetransparency.internal.loglist.NoLogServers
import com.babylon.certificatetransparency.internal.utils.Base64
import com.babylon.certificatetransparency.internal.utils.hasEmbeddedSct
import com.babylon.certificatetransparency.internal.utils.signedCertificateTimestamps
import com.babylon.certificatetransparency.internal.verifier.model.Host
import com.babylon.certificatetransparency.loglist.LogListResult
import kotlinx.coroutines.runBlocking
import java.io.IOException
import java.security.KeyStore
import java.security.cert.Certificate
import java.security.cert.X509Certificate
import javax.net.ssl.TrustManagerFactory
import javax.net.ssl.X509TrustManager
@Suppress("LongParameterList")
internal open class CertificateTransparencyBase(
private val includeHosts: Set<Host>,
private val excludeHosts: Set<Host> = emptySet(),
private val certificateChainCleanerFactory: CertificateChainCleanerFactory? = null,
trustManager: X509TrustManager? = null,
logListDataSource: DataSource<LogListResult>? = null,
policy: CTPolicy? = null,
diskCache: DiskCache? = null
) {
init {
require(includeHosts.isNotEmpty()) { "Please provide at least one host to enable certificate transparency verification" }
excludeHosts.forEach {
require(!it.startsWithWildcard) { "Certificate transparency exclusions cannot use wildcards" }
require(!includeHosts.contains(it)) { "Certificate transparency exclusions must not match include directly" }
}
}
private val cleaner: CertificateChainCleaner by lazy {
val localTrustManager = trustManager ?: (TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm()).apply {
init(null as KeyStore?)
}.trustManagers.first { it is X509TrustManager } as X509TrustManager)
certificateChainCleanerFactory?.get(localTrustManager) ?: CertificateChainCleaner.get(localTrustManager)
}
private val logListDataSource = (logListDataSource ?: LogListDataSourceFactory.create(diskCache))
private val policy = (policy ?: DefaultPolicy())
fun verifyCertificateTransparency(host: String, certificates: List<Certificate>): VerificationResult {
return if (!enabledForCertificateTransparency(host)) {
VerificationResult.Success.DisabledForHost(host)
} else if (certificates.isEmpty()) {
VerificationResult.Failure.NoCertificates
} else {
val cleanedCerts = cleaner.clean(certificates.filterIsInstance<X509Certificate>(), host)
if (cleanedCerts.isEmpty()) {
VerificationResult.Failure.NoCertificates
} else {
hasValidSignedCertificateTimestamp(cleanedCerts)
}
}
}
/**
* Check if the certificates provided by a server contain Signed Certificate Timestamps
* from a trusted CT log.
*
* @property certificates the certificate chain provided by the server
* @return [VerificationResult.Success] if the certificates can be trusted, [VerificationResult.Failure] otherwise.
*/
@Suppress("ReturnCount")
private fun hasValidSignedCertificateTimestamp(certificates: List<X509Certificate>): VerificationResult {
val result = runBlocking {
logListDataSource.get()
}
val verifiers = when (result) {
is LogListResult.Valid -> result.servers.associateBy({ Base64.toBase64String(it.id) }) { LogSignatureVerifier(it) }
is LogListResult.Invalid -> return VerificationResult.Failure.LogServersFailed(result)
null -> return VerificationResult.Failure.LogServersFailed(NoLogServers)
}
val leafCertificate = certificates[0]
if (!leafCertificate.hasEmbeddedSct()) {
return VerificationResult.Failure.NoScts
}
return try {
val sctResults = leafCertificate.signedCertificateTimestamps()
.associateBy { Base64.toBase64String(it.id.keyId) }
.mapValues { (logId, sct) ->
verifiers[logId]?.verifySignature(sct, certificates) ?: SctVerificationResult.Invalid.NoTrustedLogServerFound
}
policy.policyVerificationResult(leafCertificate, sctResults)
} catch (e: IOException) {
VerificationResult.Failure.UnknownIoException(e)
}
}
private fun enabledForCertificateTransparency(host: String) = includeHosts.any { it.matches(host) } && !excludeHosts.any { it.matches(host) }
}