Browse Source

Ajout auth client par certificat

pierre 5 years ago
parent
commit
c89668e79e
1 changed files with 97 additions and 85 deletions
  1. 97 85
      myPKI.py

+ 97 - 85
myPKI.py

@@ -1,102 +1,114 @@
-#!/usr/bin/env python2
-# -*- coding: utf-8 -*-
+import sys, getopt, os
 
-# Todo :
-# - Fix options in command line. -d and -s not working
+def usage():
+    print(' USAGE: ./myPKI.py [OPTIONS]')
+    print(' OPTIONS:')
+    print('\t-A --initall\t-i -g -d -s')
+    print('\t-i --init\tInitialise directorys of PKI')
+    print('\t-g --genca\tGenerate CA root')
+    print('\t-d --gender\tGenerate DER cert for browser know my self-signed cert')
+    print('\t-s --gensign\tGenerate and sign certificate for hosts')
+    print('\t-n --genauth\tGenerate and sign certificate for client authenticationf in .pfx format')
+    print('\t-h --help\tShows this help')
 
+def generate_client_auth_cert():
+    tld = input("=> TLD of your certificate :")
+    client_name = input("=> Client Name :")
 
-import sys, getopt, os
+    # Changement du fichier de config
+    os.system('sed -i "s/DNSCHANGEME/'+ tld +'/" ./config/ca.config')
+    os.system('sed -i "s/Root Certificate/'+ tld +'/" ./config/ca.config')
+
+
+    print("=> Création du certificat client")
+    os.system("openssl genrsa -out ./certificats/" +client_name+ "_" +tld+ ".key 4096")
+    print("[*] " +client_name+"_"+tld+".key is done")
+    os.system('openssl req -new -config config/ca.config -key ./certificats/'+client_name+ '_'  +tld+  '.key  -out ./certificats/'+ client_name +'-remote.csr')
+    print("[*] CSR Request completed  !")
+    os.system('openssl x509 -req -days 3650 -in ./certificats/'+client_name+'-remote.csr -CA ./certificats/ca.crt -CAkey ./certificats/ca.key -set_serial 001 -out ./certificats/'+client_name+'-remote.pem')
+    print("[*] Sign OK")
+    os.system("openssl pkcs12 -export -out ./"+client_name+".full.pfx -inkey ./certificats/"+client_name+'_'+tld+".key -in ./certificats/"+client_name+"-remote.pem -certfile ./certificats/ca.crt")
+    print("[*] Certificate OK")
 
-def usage():
-	print ' USAGE: ./myPKI.py [OPTIONS]'
-	print
-	print ' OPTIONS:'
-	print '\t-A --initall\t-i -g -d -s'
-	print '\t-i --init\tInitialise directorys of PKI'
-	print '\t-g --genca\tGenerate CA root'
-	print '\t-d --gender\tGenerate DER cert for browser'
-	print '\t-s --gensign\tGenerate and sign certificate'
-	print '\t-h --help\tShows this help'
-    
 
 def generate_sign():
-	tld = raw_input("=> TLD of your certificate :")
-	ip_addr = raw_input("=> IPv4 :")
-
-	# Changement du fichier de config
-	os.system('sed -i "s/DNSCHANGEME/'+ tld +'/" ./config/ca.config')
-	os.system('sed -i "s/0.0.0.0/'+ ip_addr +'/" ./config/ca.config')
-	os.system('sed -i "s/Root Certificate/'+ tld +'/" ./config/ca.config')
-	
-	# Création des certificats
-	os.system("openssl genrsa -out ./certificats/"+tld+".key 4096")
-	os.system("openssl req -days 3000 -new -config config/ca.config -key ./certificats/"+tld+".key -out certificats/"+tld+".csr")
-	os.system("openssl ca -out "+tld+".crt -config config/ca.config -infiles certificats/"+tld+".csr ")
-	
-	# On restaure ca.config d'origine
-	os.system('sed -i "s/'+ tld +'/DNSCHANGEME/" ./config/ca.config')
-	os.system('sed -i "s/'+ ip_addr +'/0.0.0.0/" ./config/ca.config')
-	os.system('sed -i "s/'+ tld +'/Root Certificate/" ./config/ca.config')
-
-	print "[*] Certificate Signed !"
+    tld = input("=> TLD of your certificate :")
+    ip_addr = input("=> IPv4 :")
+
+    # Changement du fichier de config
+    os.system('sed -i "s/DNSCHANGEME/'+ tld +'/" ./config/ca.config')
+    os.system('sed -i "s/0.0.0.0/'+ ip_addr +'/" ./config/ca.config')
+    os.system('sed -i "s/Root Certificate/'+ tld +'/" ./config/ca.config')
+
+    # Création des certificats
+    os.system("openssl genrsa -out ./certificats/"+tld+".key 4096")
+    os.system("openssl req -days 3650 -new -config config/ca.config -key ./certificats/"+tld+".key -out certificats/"+tld+".csr")
+    os.system("openssl ca -out "+tld+".crt -config config/ca.config -infiles certificats/"+tld+".csr ")
+
+    # On restaure ca.config d'origine
+    os.system('sed -i "s/'+ tld +'/DNSCHANGEME/" ./config/ca.config')
+    os.system('sed -i "s/'+ ip_addr +'/0.0.0.0/" ./config/ca.config')
+    os.system('sed -i "s/'+ tld +'/Root Certificate/" ./config/ca.config')
+
+    print("[*] Certificate Signed !")
 
 
 def generate_der():
-	os.system("openssl x509 -in certificats/ca.crt -outform DER -out certificats/ca.der")
-	print "[*] Put public CA ./certificats/ca.der on all browser you see !"
-    
+    os.system("openssl x509 -in certificats/ca.crt -outform DER -out certificats/ca.der")
+    print("[*] Put public CA ./certificats/ca.der on all browser you see !")
+
 def generate_ca():
-	if not os.path.isfile("./certificats/ca.key"):
-		os.system("openssl genrsa -out ./certificats/ca.key 4096")
-		os.system("openssl req -utf8 -new -x509 -days 3000 -config ./config/ca.config -key ./certificats/ca.key -out ./certificats/ca.crt")
-		print "[*] CA Certificate done !"
-	else:
-		print "[x] CA Certificate already exist..."
-		
+    if not os.path.isfile("./certificats/ca.key"):
+        os.system("openssl genrsa -out ./certificats/ca.key 4096")
+        os.system("openssl req -utf8 -new -x509 -days 3000 -config ./config/ca.config -key ./certificats/ca.key -out ./certificats/ca.crt")
+        print("[*] CA Certificate done !")
+    else:
+        print("[x] CA Certificate already exist...")
 
-def init_dir():
-	if not os.path.exists("./db/ca.db.certs"):
-		print "[*] Creating directories"
-		os.makedirs("./db/ca.db.certs")
-		os.makedirs("./config")
-		os.makedirs("./certificats")
-		os.system("echo '01'> ./db/ca.db.serial")
-		os.system("cp /dev/null ./db/ca.db.index")
-		os.system("cp ./ca.config.sample ./config/ca.config")
-		os.system("touch ./db/ca.db.index.attr")
 
+def init_dir():
+    if not os.path.exists("./db/ca.db.certs"):
+        print("[*] Creating directories")
+        os.makedirs("./db/ca.db.certs")
+        os.makedirs("./config")
+        os.makedirs("./certificats")
+        os.system("echo '01'> ./db/ca.db.serial")
+        os.system("cp /dev/null ./db/ca.db.index")
+        os.system("cp ./ca.config.sample ./config/ca.config")
+        os.system("touch ./db/ca.db.index.attr")
+    else:
+        print("[x] Directorys already exist")
 
-	else:
-		print "[x] Directorys already exist"
-	
 
 def main():
-	try:
-		opts, args = getopt.getopt(sys.argv[1:], "Ahigds", ["initall", "help", "init", "genca", "gender", "gensign"])
-		
-		for o, a in opts:
-			if o in ("--help"):
-				usage()
-				sys.exit()
-			elif o in ("--genca"):
-				generate_ca()
-			elif o in ("--init"):
-				init_dir()
-			elif o in ("--gender"):
-				generate_der()
-			elif o in ("--gensign"):
-				generate_sign()
-			elif o in ("--initall"):
-				init_dir()
-				generate_ca()
-				generate_der()
-				generate_sign()
-		sys.exit()
-
-	except getopt.GetoptError, err:
-		sys.stderr.write(str(err))
-		usage()
-		sys.exit(2)            
+    try:
+        opts, args = getopt.getopt(sys.argv[1:], "Ahigdsn", ["initall", "help", "init", "genca", "gender", "gensign", "genauth"])
+
+        for o, a in opts:
+            if o in ("--help"):
+                usage()
+                sys.exit()
+            elif o in ("--genca"):
+                generate_ca()
+            elif o in ("--init"):
+                init_dir()
+            elif o in ("--gender"):
+                generate_der()
+            elif o in ("--gensign"):
+                generate_sign()
+            elif o in ("--genauth"):
+                generate_client_auth_cert()
+            elif o in ("--initall"):
+                init_dir()
+                generate_ca()
+                generate_der()
+                generate_sign()
+                sys.exit()
+
+    except getopt.GetoptError as err:
+        sys.stderr.write(str(err))
+        usage()
+        sys.exit(2)
 
 if __name__ == "__main__":
-	main()
+    main()