freedombone-pin-cert 4.2KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # Performs certificate pinning (HPKP) on a given domain name
  12. # License
  13. # =======
  14. #
  15. # Copyright (C) 2015-2016 Bob Mottram <bob@freedombone.net>
  16. #
  17. # This program is free software: you can redistribute it and/or modify
  18. # it under the terms of the GNU Affero General Public License as published by
  19. # the Free Software Foundation, either version 3 of the License, or
  20. # (at your option) any later version.
  21. #
  22. # This program is distributed in the hope that it will be useful,
  23. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  24. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  25. # GNU Affero General Public License for more details.
  26. #
  27. # You should have received a copy of the GNU Affero General Public License
  28. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  29. PROJECT_NAME='freedombone'
  30. export TEXTDOMAIN=${PROJECT_NAME}-pin-cert
  31. export TEXTDOMAINDIR="/usr/share/locale"
  32. WEBSITES_DIRECTORY=/etc/nginx/sites-available
  33. # 90 days
  34. PIN_MAX_AGE=7776000
  35. function pin_all_certs {
  36. if [ ! -d $WEBSITES_DIRECTORY ]; then
  37. return
  38. fi
  39. cd $WEBSITES_DIRECTORY
  40. for file in `dir -d *` ; do
  41. if grep -q "Public-Key-Pins" $file; then
  42. DOMAIN_NAME=$file
  43. KEY_FILENAME=/etc/ssl/private/${DOMAIN_NAME}.key
  44. if [ -f $KEY_FILENAME ]; then
  45. BACKUP_KEY_FILENAME=/etc/ssl/certs/${DOMAIN_NAME}.pem
  46. if [ -f $BACKUP_KEY_FILENAME ]; then
  47. KEY_HASH=$(openssl rsa -in $KEY_FILENAME -outform der -pubout | openssl dgst -sha256 -binary | openssl enc -base64)
  48. BACKUP_KEY_HASH=$(openssl rsa -in $BACKUP_KEY_FILENAME -outform der -pubout | openssl dgst -sha256 -binary | openssl enc -base64)
  49. if [ ${#BACKUP_KEY_HASH} -gt 5 ]; then
  50. PIN_HEADER="Public-Key-Pins 'pin-sha256=\"${KEY_HASH}\"; pin-sha256=\"${BACKUP_KEY_HASH}\"; max-age=${PIN_MAX_AGE}; includeSubDomains';"
  51. sed -i "s|Public-Key-Pins.*|${PIN_HEADER}|g" $file
  52. echo $"Pinned $DOMAIN_NAME with keys $KEY_HASH $BACKUP_KEY_HASH"
  53. fi
  54. fi
  55. fi
  56. fi
  57. done
  58. }
  59. if [[ $1 == "all" ]]; then
  60. pin_all_certs
  61. systemctl restart nginx
  62. exit 0
  63. fi
  64. DOMAIN_NAME=$1
  65. REMOVE=$2
  66. KEY_FILENAME=/etc/ssl/private/${DOMAIN_NAME}.key
  67. BACKUP_KEY_FILENAME=/etc/ssl/certs/${DOMAIN_NAME}.pem
  68. SITE_FILENAME=$WEBSITES_DIRECTORY/${DOMAIN_NAME}
  69. if [ ! ${DOMAIN_NAME} ]; then
  70. exit 0
  71. fi
  72. if [ ! -f "$SITE_FILENAME" ]; then
  73. exit 0
  74. fi
  75. if [[ $REMOVE == "remove" ]]; then
  76. if grep -q "Public-Key-Pins" $SITE_FILENAME; then
  77. sed -i "/Public-Key-Pins/d" $SITE_FILENAME
  78. echo $"Removed pinning for ${DOMAIN_NAME}"
  79. systemctl restart nginx
  80. fi
  81. exit 0
  82. fi
  83. if [ ! -f "$KEY_FILENAME" ]; then
  84. echo $"No private key certificate found for $DOMAIN_NAME"
  85. exit 1
  86. fi
  87. if [ ! -f "$BACKUP_KEY_FILENAME" ]; then
  88. echo $"No fullchain certificate found for $DOMAIN_NAME"
  89. exit 2
  90. fi
  91. KEY_HASH=$(openssl rsa -in $KEY_FILENAME -outform der -pubout | openssl dgst -sha256 -binary | openssl enc -base64)
  92. BACKUP_KEY_HASH=$(openssl rsa -in $BACKUP_KEY_FILENAME -outform der -pubout | openssl dgst -sha256 -binary | openssl enc -base64)
  93. if [ ${#KEY_HASH} -lt 5 ]; then
  94. echo 'Pin hash unexpectedly short'
  95. exit 3
  96. fi
  97. if [ ${#BACKUP_KEY_HASH} -lt 5 ]; then
  98. echo 'Backup pin hash unexpectedly short'
  99. exit 4
  100. fi
  101. PIN_HEADER="Public-Key-Pins 'pin-sha256=\"${KEY_HASH}\"; pin-sha256=\"${BACKUP_KEY_HASH}\"; max-age=5184000; includeSubDomains';"
  102. if ! grep -q "Public-Key-Pins" $SITE_FILENAME; then
  103. sed -i "/ssl_ciphers.*/a add_header ${PIN_HEADER}" $SITE_FILENAME
  104. else
  105. sed -i "s|Public-Key-Pins.*|${PIN_HEADER}|g" $SITE_FILENAME
  106. fi
  107. systemctl restart nginx
  108. if ! grep -q "add_header Public-Key-Pins" $SITE_FILENAME; then
  109. echo $'Pinning failed'
  110. fi
  111. echo "Pinned $DOMAIN_NAME with keys $KEY_HASH $BACKUP_KEY_HASH"
  112. exit 0