mirror of
https://gitlab.com/libvirt/libvirt.git
synced 2024-12-22 17:34:18 +03:00
2b80329a6a
A couple of paths passed in the error messages, didnt match the paths that were actually being tested. Reviewed-by: Pavel Hrdina <phrdina@redhat.com> Signed-off-by: Daniel P. Berrangé <berrange@redhat.com>
425 lines
16 KiB
C
425 lines
16 KiB
C
/*
|
|
* SPDX-License-Identifier: GPL-2.0-or-later
|
|
*/
|
|
|
|
#include <config.h>
|
|
#include "internal.h"
|
|
|
|
#include <getopt.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
|
|
#include <gnutls/gnutls.h>
|
|
#include <gnutls/x509.h>
|
|
|
|
#include "virgettext.h"
|
|
#include "virfile.h"
|
|
#include "virnettlsconfig.h"
|
|
#include "virnettlscert.h"
|
|
#include "virutil.h"
|
|
#include "virt-validate-common.h"
|
|
|
|
static bool
|
|
virPKIValidateFile(const char *file,
|
|
uid_t owner,
|
|
gid_t group,
|
|
mode_t mode)
|
|
{
|
|
struct stat sb;
|
|
if (stat(file, &sb) < 0)
|
|
return false;
|
|
|
|
if (sb.st_uid != owner ||
|
|
sb.st_gid != group)
|
|
return false;
|
|
|
|
return (sb.st_mode & 0777) == mode;
|
|
}
|
|
|
|
#define FILE_REQUIRE_EXISTS(scope, path, message, hint, ...) \
|
|
do { \
|
|
virValidateCheck(scope, "%s", message); \
|
|
if (!virFileExists(path)) { \
|
|
virValidateFail(VIR_VALIDATE_FAIL, hint, __VA_ARGS__); \
|
|
ok = false; \
|
|
goto done; \
|
|
} else { \
|
|
virValidatePass(); \
|
|
} \
|
|
} while (0)
|
|
|
|
#define FILE_REQUIRE_ACCESS(scope, path, message, uid, gid, mode, hint, ...) \
|
|
do { \
|
|
virValidateCheck(scope, "%s", message); \
|
|
if (!virPKIValidateFile(path, uid, gid, mode)) { \
|
|
virValidateFail(VIR_VALIDATE_FAIL, hint, __VA_ARGS__); \
|
|
ok = false; \
|
|
} else { \
|
|
virValidatePass(); \
|
|
} \
|
|
} while (0)
|
|
|
|
static bool
|
|
virPKIValidateTrust(bool system, const char *path)
|
|
{
|
|
g_autofree char *cacert = NULL, *cacrl = NULL;
|
|
bool ok = true;
|
|
|
|
if (system) {
|
|
virNetTLSConfigSystemTrust(&cacert,
|
|
&cacrl);
|
|
|
|
FILE_REQUIRE_EXISTS("TRUST",
|
|
LIBVIRT_PKI_DIR,
|
|
_("Checking if system PKI dir exists"),
|
|
_("The system PKI dir %1$s is usually installed as part of the base filesystem or openssl packages"),
|
|
LIBVIRT_PKI_DIR);
|
|
|
|
FILE_REQUIRE_ACCESS("TRUST",
|
|
LIBVIRT_PKI_DIR,
|
|
_("Checking system PKI dir access"),
|
|
0, 0, 0755,
|
|
_("The system PKI dir %1$s must be accessible to all users. As root, run: chown root.root; chmod 0755 %2$s"),
|
|
LIBVIRT_PKI_DIR, LIBVIRT_PKI_DIR);
|
|
|
|
|
|
FILE_REQUIRE_EXISTS("TRUST",
|
|
LIBVIRT_CACERT_DIR,
|
|
_("Checking if system CA dir exists"),
|
|
_("The system CA dir %1$s is usually installed as part of the base filesystem or openssl packages"),
|
|
LIBVIRT_CACERT_DIR);
|
|
|
|
FILE_REQUIRE_ACCESS("TRUST",
|
|
LIBVIRT_CACERT_DIR,
|
|
_("Checking system CA dir access"),
|
|
0, 0, 0755,
|
|
_("The system CA dir %1$s must be accessible to all users. As root, run: chown root.root; chmod 0755 %2$s"),
|
|
LIBVIRT_CACERT_DIR, LIBVIRT_CACERT_DIR);
|
|
} else if (path) {
|
|
virNetTLSConfigCustomTrust(path,
|
|
&cacert,
|
|
&cacrl);
|
|
|
|
FILE_REQUIRE_EXISTS("TRUST",
|
|
path,
|
|
_("Checking if custom PKI base dir exists"),
|
|
_("Create the dir %1$s"),
|
|
path);
|
|
|
|
FILE_REQUIRE_ACCESS("TRUST",
|
|
path,
|
|
_("Checking custom PKI base dir access"),
|
|
getuid(), getgid(), 0700,
|
|
_("The PKI base dir %1$s must not be accessible to other users. Run: chown %2$d.%3$d %4$s; chmod 0700 %5$s"),
|
|
path, getuid(), getgid(), path, path);
|
|
} else {
|
|
g_autofree char *pkipath = virNetTLSConfigUserPKIBaseDir();
|
|
|
|
virNetTLSConfigUserTrust(&cacert,
|
|
&cacrl);
|
|
|
|
FILE_REQUIRE_EXISTS("TRUST",
|
|
pkipath,
|
|
_("Checking if user PKI base dir exists"),
|
|
_("Create the dir %1$s"),
|
|
pkipath);
|
|
|
|
FILE_REQUIRE_ACCESS("TRUST",
|
|
pkipath,
|
|
_("Checking user PKI base dir access"),
|
|
getuid(), getgid(), 0700,
|
|
_("The PKI base dir %1$s must not be accessible to other users. Run: chown %2$d.%3$d %4$s; chmod 0700 %5$s"),
|
|
pkipath, getuid(), getgid(), pkipath, pkipath);
|
|
}
|
|
|
|
FILE_REQUIRE_EXISTS("TRUST",
|
|
cacert,
|
|
_("Checking if CA cert exists"),
|
|
_("The machine cannot act as a client or server. See https://libvirt.org/kbase/tlscerts.html#setting-up-a-certificate-authority-ca on how to install %1$s"),
|
|
cacert);
|
|
|
|
if (system) {
|
|
FILE_REQUIRE_ACCESS("TRUST",
|
|
cacert,
|
|
_("Checking CA cert access"),
|
|
0, 0, 0644,
|
|
_("The CA certificate %1$s must be accessible to all users. As root run: chown root.root %2$s; chmod 0644 %3$s"),
|
|
cacert, cacert, cacert);
|
|
} else {
|
|
FILE_REQUIRE_ACCESS("TRUST",
|
|
cacert,
|
|
_("Checking CA cert access"),
|
|
getuid(), getgid(), 0600,
|
|
_("The CA certificate %1$s must not be accessible to other users. As this user, run: chown %2$d.%3$d %4$s; chmod 0600 %5$s"),
|
|
cacert, getuid(), getgid(), cacert, cacert);
|
|
}
|
|
|
|
done:
|
|
return ok;
|
|
}
|
|
|
|
static bool
|
|
virPKIValidateIdentity(bool isServer, bool system, const char *path)
|
|
{
|
|
g_autofree char *cacert = NULL, *cacrl = NULL;
|
|
g_autofree char *cert = NULL, *key = NULL;
|
|
bool ok = true;
|
|
const char *scope = isServer ? "SERVER" : "CLIENT";
|
|
|
|
if (system) {
|
|
virNetTLSConfigSystemTrust(&cacert,
|
|
&cacrl);
|
|
virNetTLSConfigSystemIdentity(isServer,
|
|
&cert,
|
|
&key);
|
|
|
|
FILE_REQUIRE_EXISTS(scope,
|
|
LIBVIRT_CERT_DIR,
|
|
_("Checking if system cert dir exists"),
|
|
_("The system cert dir %1$s is usually installed as part of the libvirt package"),
|
|
LIBVIRT_CERT_DIR);
|
|
|
|
FILE_REQUIRE_ACCESS(scope,
|
|
LIBVIRT_CERT_DIR,
|
|
_("Checking system cert dir access"),
|
|
0, 0, 0755,
|
|
_("The system cert dir %1$s must be accessible to all users. As root, run: chown root.root; chmod 0755 %2$s"),
|
|
LIBVIRT_CERT_DIR, LIBVIRT_CERT_DIR);
|
|
|
|
FILE_REQUIRE_EXISTS(scope,
|
|
LIBVIRT_KEY_DIR,
|
|
_("Checking if system key dir exists"),
|
|
_("The system key dir %1$s is usually installed as part of the libvirt package"),
|
|
LIBVIRT_KEY_DIR);
|
|
|
|
FILE_REQUIRE_ACCESS(scope,
|
|
LIBVIRT_KEY_DIR,
|
|
_("Checking system key dir access"),
|
|
0, 0, 0755,
|
|
_("The system key dir %1$s must be accessible to all users. As root, run: chown root.root; chmod 0755 %2$s"),
|
|
LIBVIRT_KEY_DIR, LIBVIRT_KEY_DIR);
|
|
} else if (path) {
|
|
virNetTLSConfigCustomTrust(path,
|
|
&cacert,
|
|
&cacrl);
|
|
virNetTLSConfigCustomIdentity(path,
|
|
isServer,
|
|
&cert,
|
|
&key);
|
|
} else {
|
|
virNetTLSConfigUserTrust(&cacert,
|
|
&cacrl);
|
|
virNetTLSConfigUserIdentity(isServer,
|
|
&cert,
|
|
&key);
|
|
}
|
|
|
|
FILE_REQUIRE_EXISTS(scope,
|
|
key,
|
|
_("Checking if key exists"),
|
|
isServer ?
|
|
_("The machine cannot act as a server. See https://libvirt.org/kbase/tlscerts.html#issuing-server-certificates on how to regenerate %1$s") :
|
|
_("The machine cannot act as a client. See https://libvirt.org/kbase/tlscerts.html#issuing-client-certificates on how to regenerate %1$s"),
|
|
key);
|
|
|
|
if (system) {
|
|
FILE_REQUIRE_ACCESS(scope,
|
|
key,
|
|
_("Checking key access"),
|
|
0, 0, isServer ? 0600 : 0644,
|
|
isServer ?
|
|
_("The server key %1$s must not be accessible to unprivileged users. As root run: chown root.root %2$s; chmod 0600 %3$s") :
|
|
_("The client key %1$s must be accessible to all users. As root run: chown root.root %2$s; chmod 0644 %3$s"),
|
|
key, key, key);
|
|
} else {
|
|
FILE_REQUIRE_ACCESS(scope,
|
|
key,
|
|
_("Checking key access"),
|
|
getuid(), getgid(), 0600,
|
|
isServer ?
|
|
_("The server key %1$s must be not be accessible to other users. As this user, run: chown %2$d.%3$d %4$s; chmod 0600 %5$s") :
|
|
_("The client key %1$s must be not be accessible to other users. As this user, run: chown %2$d.%3$d %4$s; chmod 0600 %5$s"),
|
|
key, getuid(), getgid(), key, key);
|
|
}
|
|
|
|
FILE_REQUIRE_EXISTS(scope,
|
|
cert,
|
|
_("Checking if cert exists"),
|
|
isServer ?
|
|
_("The machine cannot act as a server. See https://libvirt.org/kbase/tlscerts.html#issuing-server-certificates on how to regenerate %1$s") :
|
|
_("The machine cannot act as a client. See https://libvirt.org/kbase/tlscerts.html#issuing-client-certificates on how to regenerate %1$s"),
|
|
cert);
|
|
|
|
if (system) {
|
|
FILE_REQUIRE_ACCESS(scope,
|
|
cert,
|
|
_("Checking cert access"),
|
|
0, 0, 0644,
|
|
isServer ?
|
|
_("The server cert %1$s must be accessible to all users. As root run: chown root.root %2$s; chmod 0644 %3$s") :
|
|
_("The client cert %1$s must be accessible to all users. As root run: chown root.root %2$s; chmod 0644 %3$s"),
|
|
cert, cert, cert);
|
|
} else {
|
|
FILE_REQUIRE_ACCESS(scope,
|
|
cert,
|
|
_("Checking cert access"),
|
|
getuid(), getgid(), 0600,
|
|
isServer ?
|
|
_("The server cert %1$s must be restricted to this user. As this user, run: chown %2$d.%3$d %4$s; chmod 0600 %5$s") :
|
|
_("The client cert %1$s must be restricted to this user. As this user, run: chown %2$d.%3$d %4$s; chmod 0600 %5$s"),
|
|
cert, getuid(), getgid(), cert, cert);
|
|
}
|
|
|
|
virValidateCheck(scope, "%s", _("Checking cert properties"));
|
|
|
|
if (virNetTLSCertSanityCheck(isServer,
|
|
cacert,
|
|
cert) < 0) {
|
|
virValidateFail(VIR_VALIDATE_FAIL, "%s",
|
|
virGetLastErrorMessage());
|
|
ok = false;
|
|
} else {
|
|
virValidatePass();
|
|
}
|
|
|
|
if (isServer) {
|
|
gnutls_x509_crt_t crt;
|
|
|
|
virValidateCheck(scope, "%s", _("Checking cert hostname match"));
|
|
|
|
if (!(crt = virNetTLSCertLoadFromFile(cert, true))) {
|
|
virValidateFail(VIR_VALIDATE_FAIL,
|
|
_("Unable to load %1$s: %2$s"),
|
|
cert, virGetLastErrorMessage());
|
|
} else {
|
|
g_autofree char *hostname = virGetHostname();
|
|
int ret = gnutls_x509_crt_check_hostname(crt, hostname);
|
|
gnutls_x509_crt_deinit(crt);
|
|
if (!ret) {
|
|
/* Only warning, since there can be valid reasons for mis-match */
|
|
virValidateFail(VIR_VALIDATE_WARN,
|
|
_("Certificate %1$s owner does not match the hostname %2$s"),
|
|
cert, hostname);
|
|
ok = false;
|
|
} else {
|
|
virValidatePass();
|
|
}
|
|
}
|
|
}
|
|
|
|
done:
|
|
return ok;
|
|
}
|
|
|
|
|
|
static void
|
|
print_usage(const char *progname,
|
|
FILE *out)
|
|
{
|
|
fprintf(out,
|
|
_("Usage:\n"
|
|
" %1$s { -v | -h } [TRUST|SERVER|CLIENT]\n"
|
|
"\n"
|
|
"Validate TLS certificate configuration\n"
|
|
"\n"
|
|
"options:\n"
|
|
" -s | --system validate system certificates (default)\n"
|
|
" -u | --user validate user certificates\n"
|
|
" -p DIR | --path DIR validate custom certificate path\n"
|
|
" -h | --help display this help and exit\n"
|
|
" -v | --version output version information and exit\n"),
|
|
progname);
|
|
}
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
const char *scope = NULL;
|
|
bool system = false;
|
|
bool user = false;
|
|
const char *path = NULL;
|
|
bool quiet = false;
|
|
int arg = 0;
|
|
bool ok = true;
|
|
const char *progname = argv[0];
|
|
struct option opt[] = {
|
|
{ "help", no_argument, NULL, 'h' },
|
|
{ "version", no_argument, NULL, 'v' },
|
|
{ "system", no_argument, NULL, 's' },
|
|
{ "user", no_argument, NULL, 'u' },
|
|
{ "path", required_argument, NULL, 'p' },
|
|
{ NULL, 0, NULL, 0 },
|
|
};
|
|
|
|
if (virGettextInitialize() < 0)
|
|
return EXIT_FAILURE;
|
|
|
|
while ((arg = getopt_long(argc, argv, "hvsup:", opt, NULL)) != -1) {
|
|
switch (arg) {
|
|
case 's':
|
|
system = true;
|
|
break;
|
|
|
|
case 'u':
|
|
user = true;
|
|
break;
|
|
|
|
case 'p':
|
|
path = optarg;
|
|
break;
|
|
|
|
case 'v':
|
|
printf("%s\n", PACKAGE_VERSION);
|
|
return EXIT_SUCCESS;
|
|
|
|
case 'h':
|
|
print_usage(progname, stdout);
|
|
return EXIT_SUCCESS;
|
|
|
|
case 'q':
|
|
quiet = true;
|
|
break;
|
|
|
|
case '?':
|
|
default:
|
|
print_usage(progname, stderr);
|
|
return EXIT_FAILURE;
|
|
}
|
|
}
|
|
|
|
if ((argc - optind) > 2) {
|
|
fprintf(stderr, _("%1$s: too many command line arguments\n"), argv[0]);
|
|
print_usage(progname, stderr);
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
if (argc > 1)
|
|
scope = argv[optind];
|
|
|
|
virValidateSetQuiet(quiet);
|
|
|
|
if ((system && user) ||
|
|
(system && path) ||
|
|
(user && path)) {
|
|
g_printerr("--system, --user & --path are mutually exclusive\n");
|
|
return EXIT_FAILURE;
|
|
}
|
|
|
|
if (!system && !user && !path)
|
|
system = true;
|
|
|
|
if ((!scope || g_str_equal(scope, "trust")) &&
|
|
!virPKIValidateTrust(system, path))
|
|
ok = false;
|
|
if ((!scope || g_str_equal(scope, "server")) &&
|
|
!virPKIValidateIdentity(true, system, path))
|
|
ok = false;
|
|
if ((!scope || g_str_equal(scope, "client")) &&
|
|
!virPKIValidateIdentity(false, system, path))
|
|
ok = false;
|
|
|
|
if (!ok)
|
|
return EXIT_FAILURE;
|
|
|
|
return EXIT_SUCCESS;
|
|
}
|