Skip to content

Bash wrapper for X.509 certificate linting and PKI validation.

License

Notifications You must be signed in to change notification settings

rwbaumg/pki-lint

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

pki-lint

X.509 certificate linter

License FOSSA Status CodeFactor Codacy Badge CII Best Practices Summary Travis (.org) branch GitHub release GitHub issues Donate with Bitcoin GitHub followers Twitter Follow Tweet Keybase PGP

Introduction

The pki-lint utility is a framework and wrapper for the linting of Public-key Infrastructure (PKI) X.509 certificates. The included GNU/Linux Bash script, lint.sh, enables quick and easy identification of potential issues with generated X.509 certificates. The lint.sh script also doubles as a wrapper for a number of third-party certificate linters, and enables running a large number of compliance checks with a single command.

Libraries (eg. OpenSSL, GnuTLS, etc.), languages (eg. Golang, C++, etc.) and applications (eg. cURL, Git, Firefox, Chrome, etc.) often have a variety of differences in X.509 certificate handling, including differences in the way certificates are validated. Despite extensive standards documentation, it is not uncommon to find different interpretations of those standards, either.

The primary purpose of this project is to identify potential compatibility issues prior to deploying a Public-key Infrastructure into production. It also provides a basic framework for adding additional checks in the future.


Dependencies

The following third-party linting tools are used by this project:

Module Upstream source
aws-certlint awslabs/certlint
gs-certlint globalsign/certlint
x509lint kroeckx/x509lint
ev-checker mozkeeler/ev-checker
zlint zmap/zlint

The following extra packages are also required

  • Golang go ≥ v1.11
  • Ruby ruby & ruby-dev ≥ v2.2, and
  • Ruby Gems simpleidn & public_suffix

Running the build.sh script will try to install missing dependencies for you. Note that only the Debian-based package manager APT is currently supported.

Installation

To initialize required modules and compile dependencies, run:

./build.sh

If you encounter errors building module sources you can use --verbose to get some basic debugging information:

./build.sh --verbose

Usage

In order to select the appropriate tests, you must specify the type of the certificate being checked. The following certificate types are supported:

  • Root CA certificates
  • Intermediate CA certificates
  • End-entity / subscriber certificates

Certificate type switches for lint.sh are listed below:

Type switch Certificate type
-r / --root Root CA / trust-anchor certificate.
-i / --intermediate Intermediate / Subordinate CA certificate.
-s / --subscriber Subscriber / end-entity certificate.

To check an end-entity certificate, pass the full path to the PEM-encoded certificate file along with the appropriate type switch (eg. --subscriber):

./lint.sh --subscriber /path/to/certificate.pem

To print the certificate being tested use the --print switch:

./lint.sh --subscriber /path/to/certificate.pem --print

To view extended usage information, run:

./lint.sh --help

To validate a certificate's intended purpose, you can use the -u / --usage argument. The supported options are:

ID Name
0 client
1 server
2 mailsign
3 mailencrypt
4 ocsp
5 anyCA

Certificate usage can be specified either by name or by numeric ID. For example, to validate an SSL server certificate:

# both commands are the same
./lint.sh --subscriber /path/to/certificate.pem --u 1
./lint.sh --subscriber /path/to/certificate.pem --usage server

Other useful validation arguments are:

Argument Description
-c / --chain Specifies a CA chain file to use.
-o / --policy Specifies an OID of a policy to test.
-n / --hostname Specifies the hostname for validation.
-l / --level Specifies the required security level.

Available security levels are:

Security Level Bits of security Min. RSA bits Min. ECC bits
minimum (0) 112 bits >= 2048 bits >= 224 bits
medium (1) 128 bits >= 3072 bits >= 256 bits
high (2) 192 bits >= 7680 bits >= 384 bits
extreme (3) 256 bits >= 15360 bits >= 512 bits

Extended-validation certificate testing is performed whenever the supplied options enable doing so.

EV certificate testing requires a policy OID and hostname, at a minimum. If the certificate being tested is not an EV certificate, EV test results can be safely ignored.

Lints

The collection of checks and third-party modules used by lint.sh linter can be found in the lints/ folder.

The basic folder structure is shown in the diagram below:

pki-lint/
  |
  |- --lints/
  |     |
  |     |--- bin/
  |     |
  |     |--- golang/
  |     |
  |     |--- Makefile
  |
  |--- Makefile
  |
  |--- build.sh
  |
  |--- lint.sh

The main files and directories are:

  • lints/: The top-level directory for all checks and third-party modules.
  • bin/: Directory containing symlinks to compiled linting tools.
  • golang: Golang .go scripts for performing simple compatibility checks. Each .go script in this directory is run by lint.sh.
  • Makefile: The make configuration for building linting module sources.
  • build.sh: The main build script for the project. Pulls down Git submodules and compiles all of the linting sources. This script will also try to resolve dependency packages for your system.
  • lint.sh: The main linting script. Calls individual lints and reports on the results.

Building sources manually

To compile all of the dependencies and linting modules you can call make directly, so long as you have all of the required compilers and libraries installed on your system.

First, you must pull down all of the Git submodules referenced by the .gitmodules file. To do so, run:

git submodule init && \
git submodule update --recursive

For Debian and Debian-based distributions (e.g Ubuntu) with APT (Advanced Package Manager) installed, you can run the following commands to setup a build environment:

sudo apt-get update && \
sudo apt-get install make gcc clang \
   gnutls-bin openssl git jq libssl-dev \
   ruby-dev golang-go libnspr4-dev \
   libcurl4-openssl-dev libnss3-dev \
   libnss3-tools && \
sudo gem install simpleidn && \
sudo gem install public_suffix && \
sudo apt-get install shellcheck

The Makefile included in the top-level directory simply calls to lints/Makefile. For more control over the process, it's best to run make from within the lints/ subdirectory:

cd lints/

To get a list of available Makefile targets, you can use the included list target:

make list

To run make with some additional debugging information, run:

make --debug=v all

Releases

Releases are produced by taking a snapshot of all compiled linting modules in addition to the lint.sh wrapper and documentation.

First, all sources are compiled:

./build.sh

Next, the release is tagged and signed by running something like:

git tag -a -s master-v1.0.0 -m "Initial release v1.0.0 (master)"
git push --tags

After the release is tagged an archive is produced containing all of the files:

tar -czvf pki-lint-v1.0.0.tar.gz --exclude-vcs --exclude ".go" --exclude ".gocache" pki-lint-v1.0.0

Finally, a checksum and GPG signature is produced for the release archive:

sha256sum pki-lint-v1.0.0.tar.gz > pki-lint-v1.0.0.tar.gz.sha256
gpg --output pki-lint-v1.0.0.tar.gz.asc --detach-sign pki-lint-v1.0.0.tar.gz

To validate a release archive you can run:

sha256sum --check pki-lint-v1.0.0.tar.gz.sha256
gpg --verify pki-lint-v1.0.0.tar.gz.asc

Contributing

Pull requests are welcome. For major changes, please open an issue first to discuss what you would like to change.

License

License

  • MIT license
  • Unpublished Copyright 2019 © Robert W. Baumgartner. All rights reserved.