Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix broken node API x509 validation #655

Merged
merged 2 commits into from Dec 20, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
25 changes: 15 additions & 10 deletions pkg/agent/manager/manager_test.go
Expand Up @@ -679,9 +679,6 @@ func TestFetchJWTSVID(t *testing.T) {
}
defer l.Close()

ca, cakey := createCA(t, trustDomain)
baseSVID, baseSVIDKey := createSVID(t, ca, cakey, "spiffe://"+trustDomain+"/agent", 1*time.Hour)

fetchResp := &node.FetchJWTSVIDResponse{}

apiHandler := newMockNodeAPIHandler(&mockNodeAPIHandlerConfig{
Expand All @@ -693,6 +690,9 @@ func TestFetchJWTSVID(t *testing.T) {
},
svidTTL: 200,
})

baseSVID, baseSVIDKey := apiHandler.newSVID("spiffe://"+trustDomain+"/spire/agent/join_token/abcd", 1*time.Hour)

apiHandler.start()
defer apiHandler.stop()

Expand Down Expand Up @@ -1097,7 +1097,7 @@ func (h *mockNodeAPIHandler) getGRPCServerConfig(hello *tls.ClientHelloInfo) (*t
roots.AddCert(h.ca())

c := &tls.Config{
ClientAuth: tls.RequestClientCert,
ClientAuth: tls.VerifyClientCertIfGiven,
Certificates: certs,
ClientCAs: roots,
}
Expand All @@ -1106,21 +1106,26 @@ func (h *mockNodeAPIHandler) getGRPCServerConfig(hello *tls.ClientHelloInfo) (*t
}

func (h *mockNodeAPIHandler) getCertFromCtx(ctx context.Context) (certificate *x509.Certificate, err error) {

ctxPeer, ok := peer.FromContext(ctx)
if !ok {
return nil, errors.New("It was not posible to extract peer from request")
return nil, errors.New("no peer information")
}
tlsInfo, ok := ctxPeer.AuthInfo.(credentials.TLSInfo)
if !ok {
return nil, errors.New("It was not posible to extract AuthInfo from request")
return nil, errors.New("no TLS auth info for peer")
}

if len(tlsInfo.State.PeerCertificates) == 0 {
return nil, errors.New("PeerCertificates was empty")
if len(tlsInfo.State.VerifiedChains) == 0 {
return nil, errors.New("no verified client certificate presented by peer")
}
chain := tlsInfo.State.VerifiedChains[0]
if len(chain) == 0 {
// this shouldn't be possible with the tls package, but we should be
// defensive.
return nil, errors.New("verified client chain is missing certificates")
}

return tlsInfo.State.PeerCertificates[0], nil
return chain[0], nil
}

func createTempDir(t *testing.T) string {
Expand Down
2 changes: 1 addition & 1 deletion pkg/server/endpoints/endpoints.go
Expand Up @@ -200,7 +200,7 @@ func (e *endpoints) getGRPCServerConfig(ctx context.Context) func(*tls.ClientHel
// an SVID. In order to include the bootstrap endpoint
// in the same server as the rest of the Node API,
// request but don't require a client certificate
ClientAuth: tls.RequestClientCert,
ClientAuth: tls.VerifyClientCertIfGiven,

Certificates: certs,
ClientCAs: roots,
Expand Down
111 changes: 109 additions & 2 deletions pkg/server/endpoints/endpoints_test.go
Expand Up @@ -8,13 +8,16 @@ import (
"errors"
"net"
"net/url"
"strings"
"sync"
"testing"
"time"

"github.com/imkira/go-observer"
observer "github.com/imkira/go-observer"
"github.com/sirupsen/logrus/hooks/test"
"github.com/spiffe/spire/pkg/common/bundleutil"
"github.com/spiffe/spire/pkg/server/svid"
"github.com/spiffe/spire/proto/common"
"github.com/spiffe/spire/proto/server/datastore"
"github.com/spiffe/spire/test/fakes/fakedatastore"
"github.com/spiffe/spire/test/fakes/fakeservercatalog"
Expand Down Expand Up @@ -152,7 +155,7 @@ func (s *EndpointsTestSuite) TestGetGRPCServerConfig() {
tlsConfig, err := s.e.getGRPCServerConfig(ctx)(nil)
require.NoError(s.T(), err)

s.Assert().Equal(tls.RequestClientCert, tlsConfig.ClientAuth)
s.Assert().Equal(tls.VerifyClientCertIfGiven, tlsConfig.ClientAuth)
s.Assert().Equal(certs, tlsConfig.Certificates)
s.Assert().Equal(pool, tlsConfig.ClientCAs)
}
Expand Down Expand Up @@ -221,3 +224,107 @@ func (s *EndpointsTestSuite) configureBundle() ([]tls.Certificate, *x509.CertPoo
},
}, caPool
}

func (s *EndpointsTestSuite) TestClientCertificateVerification() {
caTmpl, err := util.NewCATemplate("example.org")
s.Require().NoError(err)
caCert, caKey, err := util.SelfSign(caTmpl)
s.Require().NoError(err)

serverTmpl, err := util.NewSVIDTemplate("spiffe://example.org/server")
s.Require().NoError(err)
serverTmpl.DNSNames = []string{"just-for-validation"}
serverCert, serverKey, err := util.Sign(serverTmpl, caCert, caKey)
s.Require().NoError(err)

clientTmpl, err := util.NewSVIDTemplate("spiffe://example.org/agent")
s.Require().NoError(err)
clientCert, clientKey, err := util.Sign(clientTmpl, caCert, caKey)
s.Require().NoError(err)

otherCaTmpl, err := util.NewCATemplate("example.org")
s.Require().NoError(err)
otherCaCert, otherCaKey, err := util.SelfSign(otherCaTmpl)
s.Require().NoError(err)

otherClientTmpl, err := util.NewSVIDTemplate("spiffe://example.org/agent")
s.Require().NoError(err)
otherClientCert, otherClientKey, err := util.Sign(otherClientTmpl, otherCaCert, otherCaKey)
s.Require().NoError(err)

rootCAs := x509.NewCertPool()
rootCAs.AddCert(caCert)

// set the trust bundle and plumb a CA certificate
_, err = s.ds.CreateBundle(context.Background(), &datastore.CreateBundleRequest{
Bundle: &common.Bundle{
TrustDomainId: "spiffe://example.org",
RootCas: []*common.Certificate{
{DerBytes: caCert.Raw},
},
},
})
s.Require().NoError(err)
s.svidState.Update(svid.State{
SVID: []*x509.Certificate{serverCert},
Key: serverKey,
})

var wg sync.WaitGroup
defer wg.Wait()

ctx, cancel := context.WithCancel(ctx)
defer cancel()

wg.Add(1)
go func() {
defer wg.Done()
s.e.ListenAndServe(ctx)
}()

// This helper function attempts a TLS connection to the gRPC server. It
// uses the supplied client certificate, if any. It gives up the 2 seconds
// for the server to start listening, which is generous. Any non-dial
// related errors (i.e. TLS handshake failures) are returned.
try := func(cert *tls.Certificate) error {
tlsConfig := &tls.Config{
RootCAs: rootCAs,
// this override is just so we don't have to set up spiffe peer
// validation of the server by the client, which is outside the
// scope of this test.
ServerName: "just-for-validation",
}
if cert != nil {
tlsConfig.Certificates = append(tlsConfig.Certificates, *cert)
}
for i := 0; i < 20; i++ {
conn, err := tls.Dial("tcp", "127.0.0.1:8000", tlsConfig)
if err != nil {
if strings.HasPrefix(err.Error(), "dial") {
time.Sleep(time.Millisecond * 100)
continue
}
return err
}
conn.Close()
return nil
}
s.FailNow("unable to connect to server within 2 seconds")
return errors.New("unreachable")
}

err = try(nil)
s.Require().NoError(err, "client should be allowed if no cert presented")

err = try(&tls.Certificate{
Certificate: [][]byte{clientCert.Raw},
PrivateKey: clientKey,
})
s.Require().NoError(err, "client should be allowed if proper cert presented")

err = try(&tls.Certificate{
Certificate: [][]byte{otherClientCert.Raw},
PrivateKey: otherClientKey,
})
s.Require().Error(err, "client should NOT be allowed if cert presented is not trusted")
}
17 changes: 11 additions & 6 deletions pkg/server/endpoints/node/handler.go
Expand Up @@ -560,21 +560,26 @@ func (h *Handler) getAttestResponse(ctx context.Context,
}

func (h *Handler) getCertFromCtx(ctx context.Context) (certificate *x509.Certificate, err error) {

ctxPeer, ok := peer.FromContext(ctx)
if !ok {
return nil, errors.New("It was not posible to extract peer from request")
return nil, errors.New("no peer information")
}
tlsInfo, ok := ctxPeer.AuthInfo.(credentials.TLSInfo)
if !ok {
return nil, errors.New("It was not posible to extract AuthInfo from request")
return nil, errors.New("no TLS auth info for peer")
}

if len(tlsInfo.State.PeerCertificates) == 0 {
return nil, errors.New("PeerCertificates was empty")
if len(tlsInfo.State.VerifiedChains) == 0 {
return nil, errors.New("no verified client certificate presented by peer")
}
chain := tlsInfo.State.VerifiedChains[0]
if len(chain) == 0 {
// this shouldn't be possible with the tls package, but we should be
// defensive.
return nil, errors.New("verified client chain is missing certificates")
}

return tlsInfo.State.PeerCertificates[0], nil
return chain[0], nil
}

func (h *Handler) signCSRs(ctx context.Context,
Expand Down
12 changes: 6 additions & 6 deletions pkg/server/endpoints/node/handler_test.go
Expand Up @@ -27,11 +27,11 @@ import (
"github.com/spiffe/spire/test/fakes/fakeserverca"
"github.com/spiffe/spire/test/fakes/fakeservercatalog"
"github.com/spiffe/spire/test/fakes/fakeupstreamca"
"github.com/spiffe/spire/test/mock/proto/api/node"
"github.com/spiffe/spire/test/mock/proto/server/datastore"
"github.com/spiffe/spire/test/mock/proto/server/nodeattestor"
"github.com/spiffe/spire/test/mock/proto/server/noderesolver"
"github.com/spiffe/spire/test/mock/server/ca"
mock_node "github.com/spiffe/spire/test/mock/proto/api/node"
mock_datastore "github.com/spiffe/spire/test/mock/proto/server/datastore"
mock_nodeattestor "github.com/spiffe/spire/test/mock/proto/server/nodeattestor"
mock_noderesolver "github.com/spiffe/spire/test/mock/proto/server/noderesolver"
mock_ca "github.com/spiffe/spire/test/mock/server/ca"
"github.com/spiffe/spire/test/util"
"github.com/stretchr/testify/require"
"github.com/stretchr/testify/suite"
Expand Down Expand Up @@ -732,7 +732,7 @@ func getFakePeer() *peer.Peer {
parsedCert := loadCertFromPEM("base_cert.pem")

state := tls.ConnectionState{
PeerCertificates: []*x509.Certificate{parsedCert},
VerifiedChains: [][]*x509.Certificate{{parsedCert}},
}

addr, _ := net.ResolveTCPAddr("tcp", "127.0.0.1:12345")
Expand Down
14 changes: 3 additions & 11 deletions test/util/cert_generation.go
Expand Up @@ -9,9 +9,8 @@ import (
"crypto/x509/pkix"
"math/big"
mrand "math/rand"
"net/url"
"time"

"github.com/spiffe/go-spiffe/uri"
)

// NewSVIDTemplate returns a default SVID template with the specified SPIFFE ID. Must
Expand Down Expand Up @@ -136,18 +135,11 @@ func defaultCATemplate() *x509.Certificate {
// Create an x509 extension with the URI SAN of the given SPIFFE ID, and set it onto
// the referenced certificate
func addSpiffeExtension(spiffeID string, cert *x509.Certificate) error {
uriSANs, err := uri.MarshalUriSANs([]string{spiffeID})
u, err := url.Parse(spiffeID)
if err != nil {
return err
}

ext := []pkix.Extension{{
Id: uri.OidExtensionSubjectAltName,
Value: uriSANs,
Critical: true,
}}

cert.ExtraExtensions = ext
cert.URIs = append(cert.URIs, u)
return nil
}

Expand Down