diff --git a/bin/parseMetadata.php b/bin/parseMetadata.php index bb9ec9ac13c6fe234f7117f5151d9cdecf3529fd..afc60401350982d83d3b82ea484c4d069d663897 100755 --- a/bin/parseMetadata.php +++ b/bin/parseMetadata.php @@ -28,6 +28,10 @@ $toStdOut = FALSE; */ $validateFingerprint = NULL; +/* $CA contains a path to a PEM file with certificates which are trusted, + * or NULL if we don't want to verify certificates this way. + */ +$ca = NULL; /* This variable contains the files we will parse. */ $files = array(); @@ -74,6 +78,14 @@ foreach($argv as $a) { } $validateFingerprint = $v; break; + case '--ca': + if($v === NULL || strlen($v) === 0) { + echo('The --ca option requires an parameter.' . "\n"); + echo('Please run `' . $progName . ' --help` for usage information.' . "\n"); + exit(1); + } + $ca = $v; + break; case '--help': printHelp(); exit(0); @@ -137,6 +149,8 @@ function printHelp() { echo(' Check the signature of the metadata,' . "\n"); echo(' and check the fingerprint of the' . "\n"); echo(' certificate against <FINGERPRINT>.' . "\n"); + echo(' --ca=<PEM file> Use the given PEM file as a source of' . "\n"); + echo(' trusted root certificates.' . "\n"); echo(' -h, --help Print this help.' . "\n"); echo(' -o=<DIR>, --out-dir=<DIR> Write the output to this directory. The' . "\n"); echo(' default directory is metadata-generated/' . "\n"); @@ -146,6 +160,60 @@ function printHelp() { } +/** + * This function checks the given certificate against the CA root. + * + * @param $certificate The certificate which should be checked, as a string with a PEM-encoded certificate. + */ +function verifyCertificate($certificate) { + static $verifiedCertificates = array(); + if(array_key_exists($certificate, $verifiedCertificates)) { + return $verifiedCertificates[$certificate]; + } + + $command = array( + 'openssl', 'verify', + '-CAfile', $GLOBALS['ca'], + '-purpose', 'any', + ); + + $cmdline = ''; + foreach($command as $c) { + $cmdline .= escapeshellarg($c) . ' '; + } + + $cmdline .= '2>&1'; + $descSpec = array( + 0 => array('pipe', 'r'), + 1 => array('pipe', 'w'), + ); + $process = proc_open($cmdline, $descSpec, $pipes); + if(!is_resource($process)) { + echo('Failed to execute verification command: ' . $cmdline . "\n"); + exit(1); + } + + if(fwrite($pipes[0], $certificate) === FALSE) { + echo('Failed to write certificate for verification.' . "\n"); + exit(1); + } + fclose($pipes[0]); + + $out = trim(fgets($pipes[1])); + fclose($pipes[1]); + + $status = proc_close($process); + if($status !== 0 || $out !== 'stdin: OK') { + $ok = FALSE; + } else { + $ok = TRUE; + } + + $verifiedCertificates[$certificate] = $ok; + return $ok; +} + + /** * This function writes the metadata to to separate files in the output directory. */ @@ -230,6 +298,7 @@ function processFile($filename) { $entities = SimpleSAML_Metadata_SAMLParser::parseDescriptorsFile($filename); global $validateFingerprint; + global $ca; foreach($entities as $entity) { if($validateFingerprint !== NULL) { @@ -239,6 +308,20 @@ function processFile($filename) { } } + if($ca !== NULL) { + $ok = FALSE; + foreach($entity->getX509Certificates() as $cert) { + if(verifyCertificate($cert)) { + $ok = TRUE; + break; + } + } + if(!$ok) { + echo('Skipping "' . $entity->getEntityId() . '" - could not verify certificate.' . "\n"); + continue; + } + } + addMetadata($filename, $entity->getMetadata1xSP(), 'shib13-sp-remote'); addMetadata($filename, $entity->getMetadata1xIdP(), 'shib13-idp-remote'); addMetadata($filename, $entity->getMetadata20SP(), 'saml20-sp-remote');