Initial commit
This commit is contained in:
6
templates/client/certidude.service
Normal file
6
templates/client/certidude.service
Normal file
@@ -0,0 +1,6 @@
|
||||
[Unit]
|
||||
Description=Renew certificates and update revocation lists
|
||||
|
||||
[Service]
|
||||
Type=simple
|
||||
ExecStart={{ sys.argv[0] }} enroll
|
11
templates/client/certidude.timer
Normal file
11
templates/client/certidude.timer
Normal file
@@ -0,0 +1,11 @@
|
||||
[Unit]
|
||||
Description=Run certidude enroll daily
|
||||
|
||||
[Timer]
|
||||
OnCalendar=daily
|
||||
Persistent=true
|
||||
Unit=certidude-enroll.service
|
||||
|
||||
[Install]
|
||||
WantedBy=timers.target
|
||||
|
8
templates/client/openvpn-reconnect.service
Normal file
8
templates/client/openvpn-reconnect.service
Normal file
@@ -0,0 +1,8 @@
|
||||
[Unit]
|
||||
Description=Restart OpenVPN after suspend
|
||||
|
||||
[Service]
|
||||
ExecStart=/usr/bin/pkill --signal SIGHUP --exact openvpn
|
||||
|
||||
[Install]
|
||||
WantedBy=sleep.target
|
57
templates/openvpn-client.conf
Normal file
57
templates/openvpn-client.conf
Normal file
@@ -0,0 +1,57 @@
|
||||
# Copy this file to /etc/certidude/template.ovpn and customize as you see fit
|
||||
|
||||
# Note: don't append comments to lines, Ubuntu 16.04 NetworkManager importer is very picky
|
||||
# See more potential problems here:
|
||||
# https://askubuntu.com/questions/761684/error-the-plugin-does-not-support-import-capability-when-attempting-to-import
|
||||
|
||||
# Run as OpenVPN client, pull routes, DNS server, DNS suffix from gateway
|
||||
client
|
||||
|
||||
# OpenVPN gateway(s)
|
||||
nobind
|
||||
;proto udp
|
||||
;port 1194
|
||||
{% if servers %}
|
||||
remote-random
|
||||
{% for server in servers %}
|
||||
remote {{ server }}
|
||||
{% endfor %}
|
||||
{% else %}
|
||||
remote 1.2.3.4
|
||||
{% endif %}
|
||||
|
||||
# Virtual network interface settings
|
||||
dev tun
|
||||
persist-tun
|
||||
|
||||
# Customize crypto settings
|
||||
;tls-version-min 1.2
|
||||
;tls-cipher TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
|
||||
;cipher AES-256-CBC
|
||||
;auth SHA384
|
||||
|
||||
# Check that server presented certificate has TLS Server flag present
|
||||
remote-cert-tls server
|
||||
|
||||
# X.509 business
|
||||
persist-key
|
||||
<ca>
|
||||
{{ca}}
|
||||
</ca>
|
||||
<key>
|
||||
{{key}}
|
||||
</key>
|
||||
<cert>
|
||||
{{cert}}
|
||||
</cert>
|
||||
|
||||
# Revocation list
|
||||
# Tunnelblick doens't handle inlined CRL
|
||||
# hard to update as well
|
||||
;<crl-verify>
|
||||
;</crl-verify>
|
||||
|
||||
# Pre-shared key for extra layer of security
|
||||
;<ta>
|
||||
;</ta>
|
||||
|
2
templates/snippets/certidude-client.sh
Normal file
2
templates/snippets/certidude-client.sh
Normal file
@@ -0,0 +1,2 @@
|
||||
pip3 install --upgrade git+http://git.k-space.ee/pinecrypt/pinecrypt-client.git
|
||||
certidude provision {{ authority.namespace }}
|
98
templates/snippets/ios.mobileconfig
Normal file
98
templates/snippets/ios.mobileconfig
Normal file
@@ -0,0 +1,98 @@
|
||||
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||
<plist version="1.0">
|
||||
<dict>
|
||||
<!-- https://developer.apple.com/library/content/featuredarticles/iPhoneConfigurationProfileRef/Introduction/Introduction.html -->
|
||||
<key>PayloadDisplayName</key>
|
||||
<string>{{ gateway }}</string>
|
||||
<key>PayloadDescription</key>
|
||||
<string>IPSec IKEv2 VPN connection via {{ gateway }}</string>
|
||||
<!-- This is a reverse-DNS style unique identifier used to detect duplicate profiles -->
|
||||
<key>PayloadIdentifier</key>
|
||||
<string>{{ gateway }}</string>
|
||||
<key>PayloadUUID</key>
|
||||
<string>{{ service_uuid }}</string>
|
||||
<key>PayloadType</key>
|
||||
<string>Configuration</string>
|
||||
<key>PayloadVersion</key>
|
||||
<integer>1</integer>
|
||||
<key>PayloadContent</key>
|
||||
<array>
|
||||
<dict>
|
||||
<key>PayloadIdentifier</key>
|
||||
<string>{{ gateway }}.conf1</string>
|
||||
<key>PayloadUUID</key>
|
||||
<string>{{ conf_uuid }}</string>
|
||||
<key>PayloadType</key>
|
||||
<string>com.apple.vpn.managed</string>
|
||||
<key>PayloadVersion</key>
|
||||
<integer>1</integer>
|
||||
<key>UserDefinedName</key>
|
||||
<string>{{ gateway }}</string>
|
||||
<key>VPNType</key>
|
||||
<string>IKEv2</string>
|
||||
<key>IKEv2</key>
|
||||
<dict>
|
||||
<key>RemoteAddress</key>
|
||||
<string>{{ gateway }}</string>
|
||||
<key>RemoteIdentifier</key>
|
||||
<string>{{ gateway }}</string>
|
||||
<key>LocalIdentifier</key>
|
||||
<string>{{ common_name }}</string>
|
||||
<key>ServerCertificateIssuerCommonName</key>
|
||||
<string>{{ authority.certificate.common_name }}</string>
|
||||
<key>ServerCertificateCommonName</key>
|
||||
<string>{{ gateway }}</string>
|
||||
<key>AuthenticationMethod</key>
|
||||
<string>Certificate</string>
|
||||
<key>IKESecurityAssociationParameters</key>
|
||||
<dict>
|
||||
<key>EncryptionAlgorithm</key>
|
||||
<string>AES-256</string>
|
||||
<key>IntegrityAlgorithm</key>
|
||||
<string>SHA2-384</string>
|
||||
<key>DiffieHellmanGroup</key>
|
||||
<integer>14</integer>
|
||||
</dict>
|
||||
<key>ChildSecurityAssociationParameters</key>
|
||||
<dict>
|
||||
<key>EncryptionAlgorithm</key>
|
||||
<string>AES-128-GCM</string>
|
||||
<key>IntegrityAlgorithm</key>
|
||||
<string>SHA2-256</string>
|
||||
<key>DiffieHellmanGroup</key>
|
||||
<integer>14</integer>
|
||||
</dict>
|
||||
<key>EnablePFS</key>
|
||||
<integer>1</integer>
|
||||
<key>PayloadCertificateUUID</key>
|
||||
<string>{{ p12_uuid }}</string>
|
||||
</dict>
|
||||
</dict>
|
||||
<dict>
|
||||
<key>PayloadIdentifier</key>
|
||||
<string>{{ common_name }}</string>
|
||||
<key>PayloadUUID</key>
|
||||
<string>{{ p12_uuid }}</string>
|
||||
<key>PayloadType</key>
|
||||
<string>com.apple.security.pkcs12</string>
|
||||
<key>PayloadVersion</key>
|
||||
<integer>1</integer>
|
||||
<key>PayloadContent</key>
|
||||
<data>{{ p12 }}</data>
|
||||
</dict>
|
||||
<dict>
|
||||
<key>PayloadIdentifier</key>
|
||||
<string>{{ authority.certificate.common_name }}</string>
|
||||
<key>PayloadUUID</key>
|
||||
<string>{{ ca_uuid }}</string>
|
||||
<key>PayloadType</key>
|
||||
<string>com.apple.security.root</string>
|
||||
<key>PayloadVersion</key>
|
||||
<integer>1</integer>
|
||||
<key>PayloadContent</key>
|
||||
<data>{{ ca }}</data>
|
||||
</dict>
|
||||
</array>
|
||||
</dict>
|
||||
</plist>
|
||||
|
29
templates/snippets/networkmanager-openvpn.conf
Normal file
29
templates/snippets/networkmanager-openvpn.conf
Normal file
@@ -0,0 +1,29 @@
|
||||
[connection]
|
||||
certidude managed = true
|
||||
id = {{ session.service.title }}
|
||||
uuid = {{ uuid }}
|
||||
type = vpn
|
||||
|
||||
[vpn]
|
||||
service-type = org.freedesktop.NetworkManager.openvpn
|
||||
connection-type = tls
|
||||
cert-pass-flags 0
|
||||
tap-dev = no
|
||||
remote-cert-tls = server
|
||||
remote = {{ authority.namespace }}
|
||||
key = {% if key_path %}{{ key_path }}{% else %}/etc/certidude/authority/{{ authority.namespace }}/host_key.pem{% endif %}
|
||||
cert = {% if certificate_path %}{{ certificate_path }}{% else %}/etc/certidude/authority/{{ authority.namespace }}/host_cert.pem{% endif %}
|
||||
ca = {% if authority_path %}{{ authority_path }}{% else %}/etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem{% endif %}
|
||||
tls-cipher = {{ authority.openvpn.tls_cipher }}
|
||||
cipher = {{ authority.openvpn.cipher }}
|
||||
auth = {{ authority.openvpn.auth }}
|
||||
{% if port %};port = {{ port }}{% else %};port = 1194{% endif %}
|
||||
{% if not proto or not proto.startswith('tcp') %};{% endif %}proto-tcp = yes
|
||||
|
||||
[ipv4]
|
||||
# Route only pushed subnets to tunnel
|
||||
never-default = true
|
||||
method = auto
|
||||
|
||||
[ipv6]
|
||||
method = auto
|
23
templates/snippets/networkmanager-strongswan.conf
Normal file
23
templates/snippets/networkmanager-strongswan.conf
Normal file
@@ -0,0 +1,23 @@
|
||||
[connection]
|
||||
certidude managed = true
|
||||
id = {{ session.service.title }}
|
||||
uuid = {{ uuid }}
|
||||
type = {{ vpn }}
|
||||
|
||||
[vpn]
|
||||
service-type = org.freedesktop.NetworkManager.strongswan
|
||||
encap = no
|
||||
virtual = yes
|
||||
method = key
|
||||
ipcomp = no
|
||||
address = {{ authority.namespace }}
|
||||
userkey = {% if key_path %}{{ key_path }}{% else %}/etc/certidude/authority/{{ authority.namespace }}/host_key.pem{% endif %}
|
||||
usercert = {% if certificate_path %}{{ certificate_path }}{% else %}/etc/certidude/authority/{{ authority.namespace }}/host_cert.pem{% endif %}
|
||||
certificate = {% if authority_path %}{{ authority_path }}{% else %}/etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem{% endif %}
|
||||
ike = {{ authority.strongswan.ike }}
|
||||
esp = {{ authority.strongswan.esp }}
|
||||
proposal = yes
|
||||
|
||||
[ipv4]
|
||||
method = auto
|
||||
;route1 = 0.0.0.0/0
|
31
templates/snippets/nginx-https-site.conf
Normal file
31
templates/snippets/nginx-https-site.conf
Normal file
@@ -0,0 +1,31 @@
|
||||
|
||||
server {
|
||||
listen 80;
|
||||
server_name {{ common_name }};
|
||||
rewrite ^ https://{{ common_name }}\$request_uri?;
|
||||
}
|
||||
|
||||
server {
|
||||
root /var/www/html;
|
||||
add_header X-Frame-Options "DENY";
|
||||
add_header Strict-Transport-Security "max-age=63072000; includeSubdomains; preload";
|
||||
listen 443 ssl;
|
||||
server_name $NAME;
|
||||
client_max_body_size 10G;
|
||||
ssl_certificate {{certificate_path}};
|
||||
ssl_certificate_key {{key_path}};
|
||||
ssl_client_certificate {{authority_path}};
|
||||
|
||||
# Uncomment following to enable mutual authentication with certificates
|
||||
#ssl_crl {{revocations_path}};
|
||||
#ssl_verify_client on;
|
||||
|
||||
location ~ \.php\$ {
|
||||
fastcgi_split_path_info ^(.+\.php)(/.+)$;
|
||||
fastcgi_pass unix:/run/php5-fpm.sock;
|
||||
fastcgi_index index.php;
|
||||
fastcgi_param REMOTE_USER \$ssl_client_s_dn_cn;
|
||||
include fastcgi_params;
|
||||
}
|
||||
}
|
||||
|
3
templates/snippets/nginx-ocsp-cache.timer
Normal file
3
templates/snippets/nginx-ocsp-cache.timer
Normal file
@@ -0,0 +1,3 @@
|
||||
[Timer]
|
||||
OnCalendar=*:0/15
|
||||
Persistent=true
|
31
templates/snippets/openvpn-client.conf
Normal file
31
templates/snippets/openvpn-client.conf
Normal file
@@ -0,0 +1,31 @@
|
||||
client
|
||||
nobind
|
||||
remote {{ authority.namespace }} 1194 udp
|
||||
remote {{ authority.namespace }} 443 tcp
|
||||
proto udp
|
||||
port 1194
|
||||
tls-version-min {{ authority.openvpn.tls_version_min }}
|
||||
tls-cipher {{ authority.openvpn.tls_cipher }}
|
||||
cipher {{ authority.openvpn.cipher }}
|
||||
auth {{authority.openvpn.auth }}
|
||||
mute-replay-warnings
|
||||
reneg-sec 0
|
||||
remote-cert-tls server
|
||||
dev tun
|
||||
persist-tun
|
||||
persist-key
|
||||
{% if ca %}
|
||||
<ca>
|
||||
{{ ca }}
|
||||
</ca>
|
||||
{% else %}ca /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem{% endif %}
|
||||
{% if key %}
|
||||
<key>
|
||||
{{ key }}
|
||||
</key>
|
||||
{% else %}key /etc/certidude/authority/{{ authority.namespace }}/host_key.pem{% endif %}
|
||||
{% if cert %}
|
||||
<cert>
|
||||
{{ cert }}
|
||||
</cert>
|
||||
{% else %}cert /etc/certidude/authority/{{ authority.namespace }}/host_cert.pem{% endif %}
|
20
templates/snippets/openvpn-client.sh
Normal file
20
templates/snippets/openvpn-client.sh
Normal file
@@ -0,0 +1,20 @@
|
||||
# Install packages on Ubuntu & Fedora
|
||||
which apt && apt install openvpn
|
||||
which dnf && dnf install openvpn
|
||||
|
||||
# Create OpenVPN configuration file
|
||||
cat > /etc/openvpn/{{ session.authority.namespace }}.conf << EOF
|
||||
{% include "snippets/openvpn-client.conf" %}
|
||||
EOF
|
||||
|
||||
# Restart OpenVPN service
|
||||
systemctl restart openvpn
|
||||
{#
|
||||
|
||||
Some notes:
|
||||
|
||||
- Ubuntu 16.04 ships OpenVPN 2.3 which doesn't support AES-128-GCM
|
||||
- NetworkManager's OpenVPN profile importer doesn't understand multiple remotes
|
||||
- Tunnelblick and OpenVPN Connect apps don't have a method to update CRL
|
||||
|
||||
#}
|
47
templates/snippets/request-client.ps1
Normal file
47
templates/snippets/request-client.ps1
Normal file
@@ -0,0 +1,47 @@
|
||||
# Generate keypair and submit CSR
|
||||
{% if common_name %}$NAME = "{{ common_name }}"
|
||||
{% else %}$NAME = $env:computername.toLower()
|
||||
{% endif %}
|
||||
@"
|
||||
[NewRequest]
|
||||
Subject = "CN=$NAME"
|
||||
Exportable = FALSE
|
||||
KeySpec = 1
|
||||
KeyUsage = 0xA0
|
||||
MachineKeySet = True
|
||||
ProviderType = 12
|
||||
RequestType = PKCS10
|
||||
{% if authority.certificate.algorithm == "ec" %}ProviderName = "Microsoft Software Key Storage Provider"
|
||||
KeyAlgorithm = ECDSA_P384
|
||||
{% else %}ProviderName = "Microsoft RSA SChannel Cryptographic Provider"
|
||||
KeyLength = 2048
|
||||
{% endif %}"@ | Out-File req.inf
|
||||
C:\Windows\system32\certreq.exe -new -f -q req.inf host_csr.pem
|
||||
Invoke-WebRequest `{% if token %}
|
||||
-Uri 'https://{{ authority.namespace }}:8443/api/token/?token={{ token }}' `
|
||||
-Method PUT `{% else %}
|
||||
-Uri 'https://{{ authority.namespace }}:8443/api/request/?wait=yes&autosign=yes' `
|
||||
-Method POST `{% endif %}
|
||||
-TimeoutSec 900 `
|
||||
-InFile host_csr.pem `
|
||||
-ContentType application/pkcs10 `
|
||||
-MaximumRedirection 3 -OutFile host_cert.pem
|
||||
|
||||
# Import certificate
|
||||
Import-Certificate -FilePath host_cert.pem -CertStoreLocation Cert:\LocalMachine\My
|
||||
{#
|
||||
|
||||
On Windows 7 the Import-Certificate cmdlet is missing,
|
||||
but certutil.exe can be used instead:
|
||||
|
||||
C:\Windows\system32\certutil.exe -addstore My host_cert.pem
|
||||
|
||||
Everything seems to work except after importing the certificate
|
||||
it is not properly associated with the private key,
|
||||
that means "You have private key that corresponds to this certificate" is not
|
||||
shown under "Valid from ... to ..." in MMC.
|
||||
This results in error code 13806 during IKEv2 handshake and error message
|
||||
"IKE failed to find valid machine certificate"
|
||||
|
||||
#}
|
||||
|
11
templates/snippets/request-client.sh
Normal file
11
templates/snippets/request-client.sh
Normal file
@@ -0,0 +1,11 @@
|
||||
# Use short hostname as common name
|
||||
test -e /sbin/uci && NAME=$(uci get system.@system[0].hostname)
|
||||
test -e /bin/hostname && NAME=$(hostname)
|
||||
test -n "$NAME" || NAME=$(cat /proc/sys/kernel/hostname)
|
||||
|
||||
{% include "snippets/request-common.sh" %}
|
||||
# Submit CSR and save signed certificate
|
||||
curl --cert-status -f -L -H "Content-type: application/pkcs10" \
|
||||
--data-binary @/etc/certidude/authority/{{ authority.namespace }}/host_req.pem \
|
||||
-o /etc/certidude/authority/{{ authority.namespace }}/host_cert.pem \
|
||||
'http://{{ authority.namespace }}/api/request/?wait=yes&autosign=yes'
|
19
templates/snippets/request-common.sh
Normal file
19
templates/snippets/request-common.sh
Normal file
@@ -0,0 +1,19 @@
|
||||
# Create directories
|
||||
mkdir -p /etc/certidude/authority/{{ authority.namespace }}
|
||||
|
||||
# Delete CA certificate if checksum doesn't match
|
||||
echo {{ authority.certificate.md5sum }} /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem | md5sum -c \
|
||||
|| rm -fv /etc/certidude/authority/{{ authority.namespace }}/*.pem
|
||||
{% include "snippets/store-authority.sh" %}
|
||||
{% include "snippets/update-trust.sh" %}
|
||||
# Generate private key
|
||||
test -e /etc/certidude/authority/{{ authority.namespace }}/host_key.pem \
|
||||
|| {% if authority.certificate.algorithm == "ec" %}openssl ecparam -name secp384r1 -genkey -noout \
|
||||
-out /etc/certidude/authority/{{ authority.namespace }}/host_key.pem{% else %}openssl genrsa \
|
||||
-out /etc/certidude/authority/{{ authority.namespace }}/host_key.pem 2048{% endif %}
|
||||
test -e /etc/certidude/authority/{{ authority.namespace }}/host_req.pem \
|
||||
|| openssl req -new -sha384 -subj "/CN=$NAME" \
|
||||
-key /etc/certidude/authority/{{ authority.namespace }}/host_key.pem \
|
||||
-out /etc/certidude/authority/{{ authority.namespace }}/host_req.pem
|
||||
echo "If CSR submission fails, you can copy paste it to Certidude:"
|
||||
cat /etc/certidude/authority/{{ authority.namespace }}/host_req.pem
|
7
templates/snippets/request-server.sh
Normal file
7
templates/snippets/request-server.sh
Normal file
@@ -0,0 +1,7 @@
|
||||
# Use fully qualified name
|
||||
test -e /sbin/uci && NAME=$(nslookup $(uci get network.wan.ipaddr) | grep "name =" | head -n1 | cut -d "=" -f 2 | xargs)
|
||||
test -e /bin/hostname && NAME=$(hostname -f)
|
||||
test -n "$NAME" || NAME=$(cat /proc/sys/kernel/hostname)
|
||||
|
||||
{% include "snippets/request-common.sh" %}
|
||||
{% include "snippets/submit-request-wait.sh" %}
|
11
templates/snippets/setup-ocsp-caching.sh
Normal file
11
templates/snippets/setup-ocsp-caching.sh
Normal file
@@ -0,0 +1,11 @@
|
||||
# See more on http://unmitigatedrisk.com/?p=241 why we're doing this
|
||||
cat << EOF > /etc/systemd/system/nginx-ocsp-cache.service
|
||||
{% include "snippets/nginx-ocsp-cache.service" %}EOF
|
||||
|
||||
cat << EOF > /etc/systemd/system/nginx-ocsp-cache.timer
|
||||
{% include "snippets/nginx-ocsp-cache.timer" %}EOF
|
||||
|
||||
systemctl enable nginx-ocsp-cache.service
|
||||
systemctl enable nginx-ocsp-cache.timer
|
||||
systemctl start nginx-ocsp-cache.service
|
||||
systemctl start nginx-ocsp-cache.timer
|
5
templates/snippets/store-authority.sh
Normal file
5
templates/snippets/store-authority.sh
Normal file
@@ -0,0 +1,5 @@
|
||||
# Save CA certificate
|
||||
mkdir -p /etc/certidude/authority/{{ authority.namespace }}/
|
||||
test -e /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem \
|
||||
|| cat << EOF > /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem
|
||||
{{ authority.certificate.blob }}EOF
|
28
templates/snippets/strongswan-client.sh
Normal file
28
templates/snippets/strongswan-client.sh
Normal file
@@ -0,0 +1,28 @@
|
||||
cat > /etc/ipsec.conf << EOF
|
||||
config setup
|
||||
strictcrlpolicy=yes
|
||||
|
||||
ca {{ authority.namespace }}
|
||||
auto=add
|
||||
cacert=/etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem
|
||||
|
||||
conn client-to-site
|
||||
auto=start
|
||||
right={{ authority.namespace }}
|
||||
rightsubnet=0.0.0.0/0
|
||||
rightca="{{ session.authority.certificate.distinguished_name }}"
|
||||
left=%defaultroute
|
||||
leftcert=/etc/certidude/authority/{{ authority.namespace }}/host_cert.pem
|
||||
leftsourceip=%config
|
||||
leftca="{{ session.authority.certificate.distinguished_name }}"
|
||||
keyexchange=ikev2
|
||||
keyingtries=%forever
|
||||
dpdaction=restart
|
||||
closeaction=restart
|
||||
ike=aes256-sha384-{% if session.authority.certificate.algorithm == "ec" %}ecp384{% else %}modp2048{% endif %}!
|
||||
esp=aes128gcm16-aes128gmac-{% if session.authority.certificate.algorithm == "ec" %}ecp384{% else %}modp2048{% endif %}!
|
||||
EOF
|
||||
|
||||
echo ": {% if session.authority.certificate.algorithm == "ec" %}ECDSA{% else %}RSA{% endif %} {{ authority.namespace }}.pem" > /etc/ipsec.secrets
|
||||
|
||||
ipsec restart
|
17
templates/snippets/strongswan-patching.sh
Normal file
17
templates/snippets/strongswan-patching.sh
Normal file
@@ -0,0 +1,17 @@
|
||||
# Install packages on Ubuntu & Fedora, patch Fedora paths
|
||||
which apt && apt install strongswan
|
||||
which dnf && dnf install strongswan
|
||||
test -e /etc/strongswan && test -e /etc/ipsec.conf || ln -s strongswan/ipsec.conf /etc/ipsec.conf
|
||||
test -e /etc/strongswan && test -e /etc/ipsec.d || ln -s strongswan/ipsec.d /etc/ipsec.d
|
||||
test -e /etc/strongswan && test -e /etc/ipsec.secrets || ln -s strongswan/ipsec.secrets /etc/ipsec.secrets
|
||||
|
||||
# Set SELinux context
|
||||
chcon --type=home_cert_t /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem /etc/ipsec.d/cacerts/{{ authority.namespace }}.pem
|
||||
chcon --type=home_cert_t /etc/certidude/authority/{{ authority.namespace }}/host_cert.pem /etc/ipsec.d/certs/{{ authority.namespace }}.pem
|
||||
chcon --type=home_cert_t /etc/certidude/authority/{{ authority.namespace }}/host_key.pem /etc/ipsec.d/private/{{ authority.namespace }}.pem
|
||||
|
||||
# Patch AppArmor
|
||||
cat << EOF > /etc/apparmor.d/local/usr.lib.ipsec.charon
|
||||
/etc/certidude/authority/** r,
|
||||
EOF
|
||||
systemctl restart apparmor
|
6
templates/snippets/submit-request-wait.sh
Normal file
6
templates/snippets/submit-request-wait.sh
Normal file
@@ -0,0 +1,6 @@
|
||||
# Submit CSR and save signed certificate
|
||||
curl --cert-status -f -L -H "Content-type: application/pkcs10" \
|
||||
--cacert /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem \
|
||||
--data-binary @/etc/certidude/authority/{{ authority.namespace }}/host_req.pem \
|
||||
-o /etc/certidude/authority/{{ authority.namespace }}/host_cert.pem \
|
||||
'https://{{ authority.namespace }}:8443/api/request/?wait=yes'
|
4
templates/snippets/update-trust.ps1
Normal file
4
templates/snippets/update-trust.ps1
Normal file
@@ -0,0 +1,4 @@
|
||||
# Install CA certificate
|
||||
@"
|
||||
{{ authority.certificate.blob }}"@ | Out-File ca_cert.pem
|
||||
Import-Certificate -FilePath ca_cert.pem -CertStoreLocation Cert:\LocalMachine\Root
|
18
templates/snippets/update-trust.sh
Normal file
18
templates/snippets/update-trust.sh
Normal file
@@ -0,0 +1,18 @@
|
||||
# Insert into Fedora trust store. Applies to curl, Firefox, Chrome, Chromium
|
||||
test -e /etc/pki/ca-trust/source/anchors \
|
||||
&& ln -s /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem /etc/pki/ca-trust/source/anchors/{{ authority.namespace }} \
|
||||
&& update-ca-trust
|
||||
|
||||
# Insert into Ubuntu trust store, only applies to curl
|
||||
test -e /usr/local/share/ca-certificates/ \
|
||||
&& ln -f -s /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem /usr/local/share/ca-certificates/{{ authority.namespace }}.crt \
|
||||
&& update-ca-certificates
|
||||
|
||||
# Patch Firefox trust store on Ubuntu
|
||||
if [ -d /usr/lib/firefox ]; then
|
||||
if [ ! -h /usr/lib/firefox/libnssckbi.so ]; then
|
||||
apt install -y p11-kit p11-kit-modules
|
||||
mv /usr/lib/firefox/libnssckbi.so /usr/lib/firefox/libnssckbi.so.bak
|
||||
ln -s /usr/lib/x86_64-linux-gnu/pkcs11/p11-kit-trust.so /usr/lib/firefox/libnssckbi.so
|
||||
fi
|
||||
fi
|
36
templates/snippets/windows.ps1
Normal file
36
templates/snippets/windows.ps1
Normal file
@@ -0,0 +1,36 @@
|
||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12
|
||||
|
||||
{% include "snippets/update-trust.ps1" %}
|
||||
|
||||
{% include "snippets/request-client.ps1" %}
|
||||
|
||||
# Set up IPSec VPN tunnel to {{ authority.namespace }}
|
||||
Remove-VpnConnection -AllUserConnection -Force "IPSec to {{ authority.namespace }}"
|
||||
Add-VpnConnection `
|
||||
-Name "IPSec to {{ authority.namespace }}" `
|
||||
-ServerAddress {{ authority.namespace }} `
|
||||
-AuthenticationMethod MachineCertificate `
|
||||
-EncryptionLevel Maximum `
|
||||
-SplitTunneling `
|
||||
-TunnelType ikev2 `
|
||||
-PassThru -AllUserConnection
|
||||
|
||||
# Harden VPN configuration
|
||||
Set-VpnConnectionIPsecConfiguration `
|
||||
-ConnectionName "IPSec to {{ authority.namespace }}" `
|
||||
-AuthenticationTransformConstants GCMAES128 `
|
||||
-CipherTransformConstants GCMAES128 `
|
||||
-EncryptionMethod AES256 `
|
||||
-IntegrityCheckMethod SHA384 `
|
||||
-DHGroup {% if authority.certificate.algorithm == "ec" %}ECP384{% else %}Group14{% endif %} `
|
||||
-PfsGroup {% if authority.certificate.algorithm == "ec" %}ECP384{% else %}PFS2048{% endif %} `
|
||||
-PassThru -AllUserConnection -Force
|
||||
|
||||
{#
|
||||
AuthenticationTransformConstants - ESP integrity algorithm, one of: None MD596 SHA196 SHA256128 GCMAES128 GCMAES192 GCMAES256
|
||||
CipherTransformConstants - ESP symmetric cipher, one of: DES DES3 AES128 AES192 AES256 GCMAES128 GCMAES192 GCMAES256
|
||||
EncryptionMethod - IKE symmetric cipher, one of: DES DES3 AES128 AES192 AES256
|
||||
IntegrityCheckMethod - IKE hash algorithm, one of: MD5 SHA196 SHA256 SHA384
|
||||
DHGroup = IKE key exchange, one of: None Group1 Group2 Group14 ECP256 ECP384 Group24
|
||||
PfsGroup = ESP key exchange, one of: None PFS1 PFS2 PFS2048 ECP256 ECP384 PFSMM PFS24
|
||||
#}
|
3
templates/views/attributes.html
Normal file
3
templates/views/attributes.html
Normal file
@@ -0,0 +1,3 @@
|
||||
{% for key, value in certificate.attributes %}
|
||||
<span class="badge badge-info" title="{{ key }}={{ value }}">{{ value }}</span>
|
||||
{% endfor %}
|
270
templates/views/authority.html
Normal file
270
templates/views/authority.html
Normal file
@@ -0,0 +1,270 @@
|
||||
<div class="modal fade" id="request_submission_modal" role="dialog">
|
||||
<div class="modal-dialog modal-lg">
|
||||
<div class="modal-content">
|
||||
<div class="modal-header">
|
||||
<button type="button" class="close" data-dismiss="modal">×</button>
|
||||
<h4 class="modal-title">Request submission</h4>
|
||||
</div>
|
||||
<div class="modal-body">
|
||||
<ul class="nav nav-pills" id="myTab" role="tablist">
|
||||
<li class="nav-item">
|
||||
<a class="nav-link active" id="home-tab" data-toggle="tab" href="#snippet-certidude" role="tab" aria-controls="certidude" aria-selected="true">Certidude</a>
|
||||
</li>
|
||||
|
||||
<li class="nav-item">
|
||||
<a class="nav-link" id="profile-tab" data-toggle="tab" href="#snippet-windows" role="tab" aria-controls="windows" aria-selected="false">Windows</a>
|
||||
</li>
|
||||
|
||||
<li class="nav-item">
|
||||
<a class="nav-link" id="contact-tab" data-toggle="tab" href="#snippet-unix" role="tab" aria-controls="unix" aria-selected="false">UNIX</a>
|
||||
</li>
|
||||
|
||||
{% if "openvpn" in session.service.protocols %}
|
||||
<li class="nav-item">
|
||||
<a class="nav-link" id="contact-tab" data-toggle="tab" href="#snippet-openvpn" role="tab" aria-controls="openvpn" aria-selected="false">OpenVPN</a>
|
||||
</li>
|
||||
{% endif %}
|
||||
|
||||
{% if "ikev2" in session.service.protocols %}
|
||||
<li class="nav-item">
|
||||
<a class="nav-link" id="contact-tab" data-toggle="tab" href="#snippet-strongswan" role="tab" aria-controls="strongswan" aria-selected="false">StrongSwan</a>
|
||||
</li>
|
||||
{% endif %}
|
||||
|
||||
<li class="nav-item">
|
||||
<a class="nav-link" id="contact-tab" data-toggle="tab" href="#snippet-lede" role="tab" aria-controls="lede" aria-selected="false">LEDE</a>
|
||||
</li>
|
||||
|
||||
<li class="nav-item">
|
||||
<a class="nav-link" id="contact-tab" data-toggle="tab" href="#snippet-copypaste" role="tab" aria-controls="copypaste" aria-selected="false">Copypasta</a>
|
||||
</li>
|
||||
|
||||
</ul>
|
||||
<div class="tab-content" id="myTabContent">
|
||||
<!-- Certidude client -->
|
||||
<div class="tab-pane fade show active" id="snippet-certidude" role="tabpanel" aria-labelledby="certidude">
|
||||
<p>On Ubuntu or Fedora:</p>
|
||||
<div class="highlight">
|
||||
<pre class="code"><code>{% include "snippets/certidude-client.sh" %}</code></pre>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- Windows -->
|
||||
<div class="tab-pane fade" id="snippet-windows" role="tabpanel" aria-labelledby="windows">
|
||||
<p>On Windows execute following PowerShell script</p>
|
||||
{% if "ikev2" in session.service.protocols %}
|
||||
<div class="highlight"><pre class="code"><code>{% include "snippets/windows.ps1" %}</code></pre></div>
|
||||
{% endif %}
|
||||
</div>
|
||||
|
||||
<!-- UNIX-like -->
|
||||
<div class="tab-pane fade" id="snippet-unix" role="tabpanel" aria-labelledby="unix">
|
||||
<p>For client certificates generate key pair and submit the signing request with common name set to short hostname:</p>
|
||||
<div class="highlight">
|
||||
<pre class="code"><code>{% include "snippets/request-client.sh" %}</code></pre>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<!-- OpenVPN as client -->
|
||||
<div class="tab-pane fade" id="snippet-openvpn" role="tabpanel" aria-labelledby="openvpn">
|
||||
<p>First acquire certificates using the snippet above.</p>
|
||||
<p>Then install software:</p>
|
||||
<div class="highlight"><pre class="code"><code>{% include "snippets/openvpn-client.sh" %}</code></pre></div>
|
||||
</div>
|
||||
|
||||
<!-- StrongSwan as client -->
|
||||
<div class="tab-pane fade" id="snippet-strongswan" role="tabpanel" aria-labelledby="strongswan">
|
||||
<p>First acquire certificates using the snippet above.</p>
|
||||
|
||||
<p>Then install software:</p>
|
||||
<div class="highlight">
|
||||
<pre class="code"><code>{% include "snippets/strongswan-patching.sh" %}</code></pre>
|
||||
</div>
|
||||
|
||||
<p>To configure StrongSwan as roadwarrior:</p>
|
||||
<div class="highlight"><pre class="code"><code>{% include "snippets/strongswan-client.sh" %}</code></pre></div>
|
||||
</div>
|
||||
|
||||
<!-- Copy & paste -->
|
||||
<div class="tab-pane fade" id="snippet-copypaste" role="tabpanel" aria-labelledby="copypaste">
|
||||
<p>Use whatever tools you have available on your platform to generate
|
||||
keypair and just paste ASCII armored PEM file contents here and hit submit:</p>
|
||||
|
||||
<form action="/api/request/" method="post">
|
||||
<textarea id="request_body" style="width:100%; min-height: 10em;"
|
||||
placeholder="-----BEGIN CERTIFICATE REQUEST-----"></textarea>
|
||||
<div class="modal-footer">
|
||||
<div class="btn-group">
|
||||
<button type="button" onclick="onSubmitRequest();" class="btn btn-primary"><i class="fa fa-upload"></i> Submit</button>
|
||||
<button type="button" class="btn btn-secondary" data-dismiss="modal"><i class="fa fa-ban"></i> Close</button>
|
||||
</div>
|
||||
</div>
|
||||
</form>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="modal fade" id="revocation_list_modal" role="dialog">
|
||||
<div class="modal-dialog modal-lg">
|
||||
<div class="modal-content">
|
||||
<div class="modal-header">
|
||||
<button type="button" class="close" data-dismiss="modal">×</button>
|
||||
<h4 class="modal-title">Revocation lists</h4>
|
||||
</div>
|
||||
<div class="modal-body">
|
||||
<p>To fetch <a href="http://{{ authority.namespace }}/api/revoked/">certificate revocation list</a>:</p>
|
||||
<pre><code>curl http://{{ authority.namespace }}/api/revoked/ > crl.der
|
||||
curl http://{{ authority.namespace }}/api/revoked/ -L -H "Accept: application/x-pem-file"
|
||||
curl http://{{ authority.namespace }}/api/revoked/?wait=yes -L -H "Accept: application/x-pem-file" > crl.pem</code></pre>
|
||||
</div>
|
||||
<div class="modal-footer">
|
||||
<button type="button" class="btn" data-dismiss="modal">Close</button>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="row">
|
||||
<div class="col-sm-6 col-lg-4 col-xl-3">
|
||||
<h3>Signed certificates</h3>
|
||||
|
||||
<p>Authority administration
|
||||
{% if authority.certificate.organization %}of {{ authority.certificate.organization }}{% endif %}
|
||||
allowed for
|
||||
{% for user in session.authorization.admin_users %}<a href="mailto:{{ user.mail}}">{{ user.given_name }} {{user.surname }}</a>{% if not loop.last %}, {% endif %}{% endfor %} from {% if "0.0.0.0/0" in session.authorization.admin_subnets %}anywhere{% else %}
|
||||
{% for subnet in session.authorization.admin_subnets %}{{ subnet }}{% if not loop.last %}, {% endif %}{% endfor %}{% endif %}.
|
||||
Authority valid from
|
||||
<time class="timeago" datetime="{{ authority.certificate.signed }}">{{ authority.certificate.signed }}</time>
|
||||
until
|
||||
<time class="timeago" datetime="{{ authority.certificate.expires }}">{{ authority.certificate.expires }}</time>.
|
||||
Authority certificate can be downloaded from <a href="/api/certificate/">here</a>.
|
||||
Following certificates have been signed:</p>
|
||||
|
||||
<div id="signed-filter" class="btn-group-toggle" data-toggle="buttons">
|
||||
<label class="btn btn-primary"><input id="signed-filter-new" type="checkbox" autocomplete="off">New</label>
|
||||
<label class="btn btn-primary active"><input id="signed-filter-online" type="checkbox" autocomplete="off" checked>Online</label>
|
||||
<label class="btn btn-primary"><input id="signed-filter-offline" type="checkbox" autocomplete="off">Lately seen</label>
|
||||
<label class="btn btn-primary"><input id="signed-filter-dead" type="checkbox" autocomplete="off">Gone</label>
|
||||
</div>
|
||||
|
||||
<div id="signed_certificates">
|
||||
{% for certificate in session.signed | sort(attribute="signed", reverse=true) %}
|
||||
{% include "views/signed.html" %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
|
||||
<p>Showing <span id="signed-filter-counter">-</span> of total <span id="signed-total">-</span> certificates</p>
|
||||
</div>
|
||||
<div class="col-sm-6 col-lg-4 col-xl-3">
|
||||
{% if session.features.token %}
|
||||
<h3>Tokens</h3>
|
||||
<p>Tokens allow enrolling smartphones and third party devices.</p>
|
||||
<ul>
|
||||
<li>You can issue yourself a token to be used on a mobile device</li>
|
||||
<li>Enter username to issue a token to issue a token for another user</li>
|
||||
<li>Enter e-mail address to issue a token to guest users outside domain</li>
|
||||
</ul>
|
||||
<p>
|
||||
<div class="input-group">
|
||||
<input id="token_username" name="username" type="text" class="form-control" placeholder="Username" aria-describedby="sizing-addon2">
|
||||
<input id="token_mail" name="mail" type="mail" class="form-control" placeholder="Optional e-mail" aria-describedby="sizing-addon2">
|
||||
<span class="input-group-btn">
|
||||
<button class="btn btn-secondary" type="button" onClick="onIssueToken();"><i class="fa fa-send"></i> Send token</button>
|
||||
</span>
|
||||
</div>
|
||||
</p>
|
||||
|
||||
<p>Issued tokens:</p>
|
||||
<ul class="list-group">
|
||||
{% for token in session.tokens %}
|
||||
{% include "views/token.html" %}
|
||||
{% endfor %}
|
||||
</ul>
|
||||
|
||||
<div id="token_qrcode"></div>
|
||||
{% endif %}
|
||||
|
||||
{% if session.authorization.request_subnets %}
|
||||
<p> </p>
|
||||
<h3>Pending requests</h3>
|
||||
|
||||
<p>Use Certidude client to apply for a certificate.
|
||||
|
||||
{% if not session.authorization.request_subnets %}
|
||||
Request submission disabled.
|
||||
{% elif "0.0.0.0/0" in session.authorization.request_subnets %}
|
||||
Request submission is enabled.
|
||||
{% else %}
|
||||
Request submission allowed from
|
||||
{% for subnet in session.authorization.request_subnets %}
|
||||
{{ subnet }}{% if not loop.last %}, {% endif %}
|
||||
{% endfor %}.
|
||||
{% endif %}
|
||||
|
||||
See <a href="#request_submission_modal" data-toggle="modal">here</a> for more information on manual signing request upload.
|
||||
|
||||
{% if session.authorization.autosign_subnets %}
|
||||
{% if "0.0.0.0/0" in session.authorization.autosign_subnets %}
|
||||
All requests are automatically signed.
|
||||
{% else %}
|
||||
Requests from
|
||||
{% for subnet in session.authorization.autosign_subnets %}
|
||||
{{ subnet }}{% if not loop.last %}, {% endif %}
|
||||
{% endfor %}
|
||||
are automatically signed.
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
</p>
|
||||
<div id="pending_requests">
|
||||
{% for request in session.requests | sort(attribute="submitted", reverse=true) %}
|
||||
{% include "views/request.html" %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
{% endif %}
|
||||
|
||||
{% if session.builder.profiles %}
|
||||
<h3>LEDE imagebuilder</h3>
|
||||
<p>Hit a link to generate machine specific image. Note that this might take couple minutes to finish.</p>
|
||||
<ul>
|
||||
{% for name, title, filename in session.builder.profiles %}
|
||||
<li><a href="/api/builder/{{ name }}/{{ filename }}">{{ title }}</a></li>
|
||||
{% endfor %}
|
||||
</ul>
|
||||
{% endif %}
|
||||
|
||||
</div>
|
||||
<div class="col-sm-6 col-lg-4 col-xl-3">
|
||||
|
||||
<h3>Revoked certificates</h3>
|
||||
<p>Following certificates have been revoked{% if session.features.crl %}, for more information click
|
||||
<a href="#revocation_list_modal" data-toggle="modal">here</a>{% endif %}.</p>
|
||||
|
||||
{% for certificate in session.revoked | sort(attribute="revoked", reverse=true) %}
|
||||
{% include "views/revoked.html" %}
|
||||
{% endfor %}
|
||||
</div>
|
||||
<div id="column-log" class="col-sm-6 col-lg-4 col-xl-3 hidden-lg-down">
|
||||
<div class="loader-container">
|
||||
<div class="loader"></div>
|
||||
<p>Loading logs, this might take a while...</p>
|
||||
</div>
|
||||
<div class="content" style="display:none;">
|
||||
<h3>Log</h3>
|
||||
<div class="btn-group-toggle" data-toggle="buttons">
|
||||
<label class="btn btn-primary active"><input id="log-level-critical" type="checkbox" autocomplete="off" checked>Critical</label>
|
||||
<label class="btn btn-primary active"><input id="log-level-error" type="checkbox" autocomplete="off" checked>Error</label>
|
||||
<label class="btn btn-primary active"><input id="log-level-warning" type="checkbox" autocomplete="off" checked>Warn</label>
|
||||
<label class="btn btn-primary active"><input id="log-level-info" type="checkbox" autocomplete="off" checked>Info</label>
|
||||
<label class="btn btn-primary"><input id="log-level-debug" type="checkbox" autocomplete="off">Debug</label>
|
||||
</div>
|
||||
<ul id="log-entries" class="list-group">
|
||||
</ul>
|
||||
<p>Click here to load more entries</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
31
templates/views/configuration.html
Normal file
31
templates/views/configuration.html
Normal file
@@ -0,0 +1,31 @@
|
||||
|
||||
<h1>Create a rule</h1>
|
||||
<p>
|
||||
|
||||
<datalist id="tag_autocomplete">
|
||||
|
||||
</datalist>
|
||||
|
||||
<span>Filter</span>
|
||||
<select id="tags_autocomplete"></select>
|
||||
attaches attribute
|
||||
<select>
|
||||
{% include 'views/tagtypes.html' %}
|
||||
</select>
|
||||
<span contenteditable>something</span>
|
||||
<button>Add rule</button>
|
||||
</p>
|
||||
|
||||
{% for grouper, items in configuration | groupby('tag_id') %}
|
||||
|
||||
<h1>Filter {{ items[0].match_key }} is {{ items[0].match_value }}</h1>
|
||||
<ul>
|
||||
|
||||
{% for item in items %}
|
||||
<li>Attach {{ item.key }} attribute {{ item.value }}</li>
|
||||
{% endfor %}
|
||||
</ul>
|
||||
|
||||
{% endfor %}
|
||||
|
||||
|
278
templates/views/enroll.html
Normal file
278
templates/views/enroll.html
Normal file
@@ -0,0 +1,278 @@
|
||||
<!-- https://wiki.strongswan.org/projects/strongswan/wiki/AppleIKEv2Profile#Certificate-authentication -->
|
||||
|
||||
<!--
|
||||
|
||||
Browser status
|
||||
|
||||
- Edge doesn't work because they think data: urls are insecure
|
||||
- iphone QR code scanner's webview is constrained, cant download data: links
|
||||
- outlook.com via iphone mail client works
|
||||
- android gmail app works
|
||||
- chrome works
|
||||
- firefox works
|
||||
|
||||
OS/soft status
|
||||
|
||||
- OpenVPN works on everything
|
||||
- StrongSwan app works on Android
|
||||
- NetworkManager doesn't support importing .sswan files yet, so no IPSec support for Ubuntu or Fedora here yet
|
||||
|
||||
-->
|
||||
|
||||
<div id="enroll" class="row">
|
||||
<div class="loader-container">
|
||||
<div class="loader"></div>
|
||||
<p>Generating RSA keypair, this will take a while...</p>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 edge-broken" style="display:none;">
|
||||
<!-- https://stackoverflow.com/questions/33154646/data-uri-link-a-href-data-doesnt-work-in-microsoft-edge?utm_medium=organic&utm_source=google_rich_qa&utm_campaign=google_rich_qa -->
|
||||
Microsoft Edge not supported, open the link with Chrome or Firefox
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option ubuntu linux openvpn">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Ubuntu 16.04+</h3>
|
||||
<p class="card-text">Install OpenVPN plugin for NetworkManager by executing following two command in the terminal:
|
||||
|
||||
<pre><code># Ubuntu 16.04 ships with older OpenVPN 2.3, to support newer ciphers add OpenVPN's repo
|
||||
if [ $(lsb_relase -cs) == "xenial" ]; then
|
||||
wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add -
|
||||
echo "deb http://build.openvpn.net/debian/openvpn/release/2.4 xenial main" > /etc/apt/sources.list.d/openvpn-aptrepo.list
|
||||
apt update
|
||||
apt install openvpn
|
||||
fi
|
||||
|
||||
sudo apt install -y network-manager-openvpn-gnome
|
||||
sudo systemctl restart network-manager
|
||||
</code></pre>
|
||||
|
||||
<p>
|
||||
<a href="javascript:onEnroll('ovpn');" class="btn btn-primary">Fetch OpenVPN profile</a>
|
||||
<button class="btn btn-secondary" type="button" data-toggle="collapse" data-target="#ubuntu-screenshots" aria-expanded="false" aria-controls="ubuntu-screenshots">
|
||||
Screenshots
|
||||
</button>
|
||||
</p>
|
||||
|
||||
<div class="collapse" id="ubuntu-screenshots">
|
||||
<p>Open up network connections:</p>
|
||||
<p><img src="/img/ubuntu-01-edit-connections.png"/></p>
|
||||
<p>Hit <i>Add button</i>:</p>
|
||||
<p><img src="/img/ubuntu-02-network-connections.png"/></p>
|
||||
<p>Select <i>Import a saved VPN configuration...</i>:</p>
|
||||
<p><img src="/img/ubuntu-03-import-saved-config.png"/></p>
|
||||
<p>Select downloaded file:</p>
|
||||
<p><img src="/img/ubuntu-04-select-file.png"/></p>
|
||||
<p>Once profile is successfully imported following dialog appears:</p>
|
||||
<p><img src="/img/ubuntu-05-profile-imported.png"/></p>
|
||||
<p>By default all traffic is routed via VPN gateway, route only intranet subnets to the gateway select <i>Routes...</i> under <i>IPv4 Settings</i>:</p>
|
||||
<p><img src="/img/ubuntu-06-ipv4-settings.png"/></p>
|
||||
<p>Check <i>Use this connection only for resources on its network</i>:</p>
|
||||
<p><img src="/img/ubuntu-07-disable-default-route.png"/></p>
|
||||
<p>To activate the connection select it under <i>VPN Connections</i>:</p>
|
||||
<p><img src="/img/ubuntu-08-activate-connection.png"/></p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option ubuntu linux openvpn advanced">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Ubuntu 18.04+ (advanced)</h3>
|
||||
<p class="card-text">Copy-paste follownig to terminal as root user:</p>
|
||||
<pre><code>{% include "snippets/request-client.sh" %}
|
||||
cat << EOF > '/etc/NetworkManager/system-connections/OpenVPN to {{ authority.namespace }}'
|
||||
{% include "snippets/networkmanager-openvpn.conf" %}EOF
|
||||
|
||||
nmcli con reload
|
||||
</code></pre>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option ubuntu linux ikev2 advanced">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Ubuntu 18.04+ (advanced)</h3>
|
||||
<p class="card-text">Copy-paste follownig to terminal as root user:</p>
|
||||
<pre><code>{% include "snippets/request-client.sh" %}
|
||||
cat << EOF > '/etc/NetworkManager/system-connections/IPSec to {{ authority.namespace }}'
|
||||
{% include "snippets/networkmanager-strongswan.conf" %}EOF
|
||||
|
||||
nmcli con reload
|
||||
</code></pre>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
|
||||
<div class="col-sm-12 mt-3 option fedora linux openvpn">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Fedora</h3>
|
||||
<p class="card-text">Install OpenVPN plugin for NetworkManager by running following two commands:</p>
|
||||
<pre><code>dnf install NetworkManager-openvpn-gnome
|
||||
systemctl restart NetworkManager</code></pre>
|
||||
Right click in the NetworkManager icon, select network settings. Hit the + button and select <i>Import from file...</i>, select the downloaded .ovpn file.
|
||||
Remove the .ovpn file from the Downloads folder.</p>
|
||||
<a href="javascript:onEnroll('ovpn');" class="btn btn-primary">Fetch OpenVPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option windows ipsec">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Windows</h3>
|
||||
<p class="card-text">
|
||||
Import PKCS#12 container to your machine trust store.
|
||||
Import VPN connection profile by moving the downloaded .pbk file to
|
||||
<pre><code>%userprofile%\AppData\Roaming\Microsoft\Network\Connections\PBK</code></pre>
|
||||
or
|
||||
<pre><code>C:\ProgramData\Microsoft\Network\Connections\Pbk</code></pre></p>
|
||||
<a href="javascript:onEnroll('p12');" class="btn btn-primary">Fetch PKCS#12 container</a>
|
||||
<a href="#" class="btn btn-secondary">Fetch IPSec IKEv2 VPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option windows ikev2">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Windows</h3>
|
||||
<p>To configure IPSec IKEv2 tunnel on Windows, open PowerShell as administrator and copy-paste following:</p>
|
||||
<div class="highlight"><pre class="code"><code>{% include "snippets/windows.ps1" %}</code></pre></div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option windows openvpn">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Windows</h3>
|
||||
<p class="card-text">
|
||||
Install OpenVPN community edition client.
|
||||
Move the downloaded .ovpn file to C:\Program Files\OpenVPN\config and
|
||||
right click in the system tray on OpenVPN icon and select Connect from the menu.
|
||||
For finishing touch adjust the file permissions so only local
|
||||
administrator can read that file, remove regular user access to the file.
|
||||
</p>
|
||||
<a href="https://openvpn.net/index.php/download/community-downloads.html" class="btn btn-secondary">Get OpenVPN community edition</a>
|
||||
<a href="javascript:onEnroll('ovpn');" class="btn btn-primary">Fetch OpenVPN profile</a>
|
||||
<button class="btn btn-secondary" type="button" data-toggle="collapse" data-target="#windows-screenshots" aria-expanded="false" aria-controls="windows-screenshots">
|
||||
Screenshots
|
||||
</button>
|
||||
|
||||
<div class="collapse" id="windows-screenshots">
|
||||
<p>Download OpenVPN from the link supplied above:</p>
|
||||
<p><img src="/img/windows-01-download-openvpn.png"/></p>
|
||||
|
||||
<p>Install OpenVPN:</p>
|
||||
<p><img src="/img/windows-02-install-openvpn.png"/></p>
|
||||
|
||||
<p>Move the configuraiton file downloaded from the second button above:</p>
|
||||
<p><img src="/img/windows-03-move-config-file.png"/></p>
|
||||
|
||||
<p>Connect from system tray:</p>
|
||||
<p><img src="/img/windows-04-connect.png"/></p>
|
||||
|
||||
<p>Connection is successfully configured:</p>
|
||||
<p><img src="/img/windows-05-connected.png"/></p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option mac openvpn">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Mac OS X</h3>
|
||||
<p class="card-text">Download Tunnelblick. Tap on the button above and import the profile.</p>
|
||||
<a href="https://tunnelblick.net/" target="_blank" class="btn btn-secondary">Get Tunnelblick</a>
|
||||
<a href="javascript:onEnroll('ovpn');" class="btn btn-primary">Fetch OpenVPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option iphone ipad openvpn">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">iPhone/iPad</h3>
|
||||
<p class="card-text">Install OpenVPN Connect app, tap on the button below.</p>
|
||||
<a href="https://itunes.apple.com/us/app/openvpn-connect/id590379981?mt=8" target="_blank" class="btn btn-secondary">Get OpenVPN Connect app</a>
|
||||
<a href="javascript:onEnroll('ovpn');" class="btn btn-primary">Fetch OpenVPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option iphone ipad ikev2">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">iPhone/iPad</h3>
|
||||
<p class="card-text">
|
||||
Tap the button below, you'll be prompted about configuration profile, tap <i>Allow</i>.
|
||||
Hit <i>Install</i> in the top-right corner.
|
||||
Enter your passcode to unlock trust store.
|
||||
Tap <i>Install</i> and confirm by hitting <i>Install</i>.
|
||||
Where password for the certificate is prompted, enter 1234.
|
||||
Hit <i>Done</i>. Go to <i>Settings</i>, open VPN submenu and tap on the VPN profile to connect.
|
||||
</p>
|
||||
<a href="javascript:onEnroll('mobileconfig');" class="btn btn-primary">Fetch IPSec IKEv2 VPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option mac ikev2">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Mac OS X</h3>
|
||||
<p class="card-text">
|
||||
Click on the button below, you'll be prompted about configuration profile, tap <i>Allow</i>.
|
||||
Hit <i>Install</i> in the top-right corner.
|
||||
Enter your passcode to unlock trust store.
|
||||
Tap <i>Install</i> and confirm by hitting <i>Install</i>.
|
||||
Where password for the certificate is prompted, enter 1234.
|
||||
Hit <i>Done</i>. Go to <i>Settings</i>, open VPN submenu and tap on the VPN profile to connect.
|
||||
</p>
|
||||
<a href="javascript:onEnroll('mobileconfig');" class="btn btn-primary">Fetch VPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option android openvpn">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Android</h3>
|
||||
<p class="card-text">Intall OpenVPN Connect app on your device.
|
||||
Tap on the downloaded .ovpn file, OpenVPN Connect should prompt for import.
|
||||
Hit <i>Accept</i> and then <i>Connect</i>.
|
||||
Remember to delete any remaining .ovpn files under the <i>Downloads</i>.
|
||||
</p>
|
||||
<a href="https://play.google.com/store/apps/details?id=net.openvpn.openvpn" target="_blank" class="btn btn-secondary">Get OpenVPN Connect app</a>
|
||||
<a href="javascript:onEnroll('ovpn');" class="btn btn-primary">Fetch OpenVPN profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="col-sm-12 mt-3 option android ikev2">
|
||||
<div class="card">
|
||||
<div class="card-block">
|
||||
<h3 class="card-title">Android</h3>
|
||||
<p class="card-text">
|
||||
Install strongSwan Client app on your device.
|
||||
Tap on the downloaded .sswan file, StrongSwan Client should prompt for import.
|
||||
Hit <i>Import certificate from VPN profile</i> and then <i>Import</i> in the top-right corner.
|
||||
Remember to delete any remaining .sswan files under the <i>Downloads</i>.
|
||||
</p>
|
||||
<a href="https://play.google.com/store/apps/details?id=org.strongswan.android" class="btn btn-secondary">Get strongSwan VPN Client app</a>
|
||||
<a href="javascript:onEnroll('sswan');" class="btn btn-primary">Fetch StrongSwan profile</a>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
<div class="col-sm-12 mt-3 option any">
|
||||
<a href="javascript:$('.option').show();">I did't find an appropriate option for me, show all options</a>
|
||||
</div>
|
||||
|
||||
</div>
|
2
templates/views/error.html
Normal file
2
templates/views/error.html
Normal file
@@ -0,0 +1,2 @@
|
||||
<h1>{{ message.title }}</h1>
|
||||
<p>{{ message.description }}</p>
|
14
templates/views/insecure.html
Normal file
14
templates/views/insecure.html
Normal file
@@ -0,0 +1,14 @@
|
||||
<p>You're viewing this page over insecure channel.
|
||||
You can give it a try and <a href="https://{{ authority.hostname }}">connect over HTTPS</a>,
|
||||
if that succeeds all subsequents accesses of this page will go over HTTPS.
|
||||
</p>
|
||||
<p>
|
||||
Click <a href="/api/certificate">here</a> to fetch the certificate of this authority.
|
||||
Alternatively install certificate on Fedora or Ubuntu with following copy-pastable snippet:
|
||||
</p>
|
||||
|
||||
<div class="highlight">
|
||||
<pre class="code"><code>{% include "snippets/store-authority.sh" %}
|
||||
{% include "snippets/update-trust.sh" %}</code></pre>
|
||||
</div>
|
||||
|
7
templates/views/lease.html
Normal file
7
templates/views/lease.html
Normal file
@@ -0,0 +1,7 @@
|
||||
Last seen
|
||||
<time class="timeago" datetime="{{ certificate.lease.last_seen }}">{{ certificate.lease.last_seen }}</time>
|
||||
at
|
||||
<a target="_blank" href="http://{{ certificate.lease.inner_address }}">{{ certificate.lease.inner_address }}</a>{% if certificate.lease.outer_address %}
|
||||
from
|
||||
<a target="{{ certificate.lease.outer_address }}" href="https://geoiplookup.net/ip/{{ certificate.lease.outer_address }}">{{ certificate.lease.outer_address }}</a>{% endif %}.
|
||||
See some stats <a href="http://172.20.1.19:19999/host/{{ certificate.common_name }}/" target="_blank">here</a>.
|
8
templates/views/logentry.html
Normal file
8
templates/views/logentry.html
Normal file
@@ -0,0 +1,8 @@
|
||||
<li id="log_entry_{{ entry.id }}" data-keywords="{{ entry.message }}" class="list-group-item justify-content-between filterable{% if entry.fresh %} fresh{% endif %}">
|
||||
<span>
|
||||
<i class="fa fa-{{ entry.severity }}-circle"></i>
|
||||
{{ entry.message }}
|
||||
</span>
|
||||
<span class="badge badge-default badge-pill">{{ entry.created }}</span>
|
||||
</li>
|
||||
|
64
templates/views/request.html
Normal file
64
templates/views/request.html
Normal file
@@ -0,0 +1,64 @@
|
||||
<div id="request-{{ request.id }}" class="card filterable mt-3"
|
||||
data-keywords="{{ request.common_name }}|" data-id="{{request.id}}">
|
||||
<div class="card-header">
|
||||
{% if certificate.server %}
|
||||
<i class="fa fa-server"></i>
|
||||
{% else %}
|
||||
<i class="fa fa-laptop"></i>
|
||||
{% endif %}
|
||||
{{ request.common_name }}
|
||||
</div>
|
||||
<div class="card-block">
|
||||
<p class="mb-1">
|
||||
Submitted
|
||||
<time class="timeago" datetime="{{ request.submitted }}">Request was submitted {{ request.submitted }}</time>
|
||||
from
|
||||
{% if request.hostname %}{{request.hostname}} ({{request.address}}){% else %}{{request.address}}{% endif %}
|
||||
</p>
|
||||
<div class="btn-group">
|
||||
<button type="button" class="btn btn-secondary" data-toggle="collapse" data-target="#details-{{ request.sha256sum }}"><i class="fa fa-list"></i> Details</button>
|
||||
<button type="button" class="btn btn-danger"
|
||||
data-loading-text="<i class='fa fa-circle-o-notch fa-spin'></i> Rejecting..."
|
||||
onclick="onRejectRequest(event, '{{ request.common_name }}', '{{ request.sha256sum }}');">
|
||||
<i class="fa fa-trash"></i> Reject</button>
|
||||
<button type="button" class="btn btn-success"
|
||||
data-loading-text="<i class='fa fa-circle-o-notch fa-spin'></i> Processing Order"
|
||||
onclick="onSignRequest(event, '{{ request.common_name }}', '{{ request.sha256sum }}');">
|
||||
<i class="fa fa-thumbs-up"></i> Approve</button>
|
||||
<button type="button" class="btn btn-success dropdown-toggle dropdown-toggle-split" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false">
|
||||
<span class="sr-only">Toggle Dropdown</span>
|
||||
</button>
|
||||
<div class="dropdown-menu">
|
||||
{% for p in authority.signature.profiles %}
|
||||
<a class="dropdown-item{% if not request.common_name.match(p.common_name) %} disabled{% endif %}"
|
||||
{% if not request.common_name.match(p.common_name) %} title="Common name doesn't match expression {{ p.common_name }}"{% endif %}
|
||||
href="#" onclick="javascript:$.ajax({url:'/api/request/{{request.common_name}}/?sha256sum={{ request.sha256sum }}&profile={{ p.key }}',type:'post'});">
|
||||
{{ p.key }}, expires in {{ p.lifetime }} days</a>
|
||||
{% endfor %}
|
||||
</div>
|
||||
</div>
|
||||
<div class="collapse" id="details-{{ request.sha256sum }}">
|
||||
<p>Use following to fetch the signing request:</p>
|
||||
<div class="bd-example">
|
||||
<pre><code class="language-sh" data-lang="sh">wget <a href="/api/request/{{ request.common_name }}/">http://{{ authority.namespace }}/api/request/{{ request.common_name }}/</a>
|
||||
curl -L http://{{ authority.namespace }}/api/request/{{ request.common_name }}/ \
|
||||
| openssl req -text -noout</code></pre>
|
||||
</div>
|
||||
|
||||
<div style="overflow: auto; max-width: 100%;">
|
||||
<table class="table" id="signed_certificates">
|
||||
<tbody>
|
||||
<tr><th>Common name</th><td>{{ request.common_name }}</td></tr>
|
||||
<tr><th>Submitted</th><td>{{ request.submitted | datetime }}
|
||||
{% if request.address %}from {{ request.address }}
|
||||
{% if request.hostname %} ({{ request.hostname }}){% endif %}{% endif %}</td></tr>
|
||||
<tr><th>MD5</th><td>{{ request.md5sum }}</td></tr>
|
||||
<tr><th>SHA1</th><td>{{ request.sha1sum }}</td></tr>
|
||||
<tr><th>SHA256</th><td>{{ request.sha256sum }}</td></tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
69
templates/views/revoked.html
Normal file
69
templates/views/revoked.html
Normal file
@@ -0,0 +1,69 @@
|
||||
<div id="certificate-{{ certificate.common_name | replace('@', '--') | replace('.', '-') }}" class="card filterable mt-3"
|
||||
data-keywords="{{ certificate.common_name }}|">
|
||||
<div class="card-body">
|
||||
<div class="card-header">
|
||||
{% if certificate.server %}
|
||||
<i class="fa fa-server"></i>
|
||||
{% else %}
|
||||
<i class="fa fa-laptop"></i>
|
||||
{% endif %}
|
||||
{{ certificate.common_name }}
|
||||
</div>
|
||||
<div class="card-block">
|
||||
<p>
|
||||
Serial number {{ certificate.serial | serial }}.
|
||||
</p>
|
||||
<p>
|
||||
Revoked
|
||||
<time class="timeago" datetime="{{ certificate.revoked }}">Certificate revoked {{ certificate.revoked }}</time>.
|
||||
Valid from {{ certificate.signed | datetime }} to {{ certificate.expired | datetime }}.
|
||||
</p>
|
||||
|
||||
<div class="btn-group">
|
||||
<button type="button" class="btn btn-secondary" data-toggle="collapse" data-target="#details-{{ certificate.sha256sum }}"><i class="fa fa-list"></i> Details</button>
|
||||
<div class="btn-group">
|
||||
<a href="/api/signed/{{ certificate.common_name }}/" class="btn btn-secondary hidden-xs-down"><i class="fa fa-download"></i> Download</a>
|
||||
</div>
|
||||
</div>
|
||||
<div class="collapse" id="details-{{ certificate.sha256sum }}">
|
||||
<p>To fetch certificate:</p>
|
||||
|
||||
<div class="bd-example">
|
||||
<pre><code class="language-sh" data-lang="sh">wget <a href="/api/revoked/{{ certificate.serial }}/">http://{{ authority.namespace }}/api/revoked/{{ certificate.serial }}/</a>
|
||||
curl http://{{ authority.namespace }}/api/revoked/{{ certificate.serial }}/ \
|
||||
| openssl x509 -text -noout</code></pre>
|
||||
</div>
|
||||
|
||||
<p>To perform online certificate status request</p>
|
||||
<pre><code class="language-bash" data-lang="bash">curl http://{{ authority.namespace }}/api/certificate/ > session.pem
|
||||
openssl ocsp -issuer session.pem -CAfile session.pem \
|
||||
-url http://{{ authority.namespace }}/api/ocsp/ \
|
||||
-serial 0x{{ certificate.serial }}</span></code></pre>
|
||||
|
||||
<p>
|
||||
<table class="table" id="signed_certificates">
|
||||
<tbody>
|
||||
<tr><th>Common name</th><td>{{ certificate.common_name }}</td></tr>
|
||||
<tr><th>Organizational unit</th><td>{{ certificate.organizational_unit }}</td></tr>
|
||||
<tr><th>Serial number</th><td>{{ certificate.serial }}</td></tr>
|
||||
<tr><th>Signed</th><td>{{ certificate.signed | datetime }}
|
||||
{% if certificate.signer %}, by {{ certificate.signer }}{% endif %}</td></tr>
|
||||
<tr><th>Expired</th><td>{{ certificate.expired | datetime }}</td></tr>
|
||||
{% if certificate.lease %}
|
||||
<tr><th>Lease</th><td><a href="http://{{ certificate.lease.inner_address }}">{{ certificate.lease.inner_address }}</a> at {{ certificate.lease.last_seen | datetime }}
|
||||
from <a href="https://geoiptool.com/en/?ip={{ certificate.lease.outer_address }}" target="_blank">{{ certificate.lease.outer_address }}</a>
|
||||
</td></tr>
|
||||
{% endif %}
|
||||
|
||||
<!--
|
||||
<tr><th>MD5</th><td>{{ certificate.md5sum }}</td></tr>
|
||||
<tr><th>SHA1</th><td>{{ certificate.sha1sum }}</td></tr>
|
||||
-->
|
||||
<tr><th>SHA256</th><td>{{ certificate.sha256sum }}</td></tr>
|
||||
</tbody>
|
||||
</table>
|
||||
</p>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
134
templates/views/signed.html
Normal file
134
templates/views/signed.html
Normal file
@@ -0,0 +1,134 @@
|
||||
<div id="certificate-{{ certificate.id }}" class="card filterable mt-3"
|
||||
{% if certificate.lease %}data-last-seen={{ certificate.lease.last_seen }}{% endif %}
|
||||
data-keywords="{{ certificate.common_name }}|{% if session.tagging %}{% for tag in certificate.tags %}{{ tag.id }}|{% endfor %}{% endif %}{% for key, value in certificate.attributes %}{{ key }}={{ value }}|{% endfor %}" data-id="{{certificate.id}}">
|
||||
<div class="card-header">
|
||||
{% if certificate.organizational_unit %}
|
||||
<i class="fa fa-folder" aria-hidden="true"></i>
|
||||
{{ certificate.organizational_unit }} /
|
||||
{% endif %}
|
||||
{% if certificate.extensions.extended_key_usage and "server_auth" in certificate.extensions.extended_key_usage %}
|
||||
<i class="fa fa-server"></i>
|
||||
{% else %}
|
||||
<i class="fa fa-laptop"></i>
|
||||
{% endif %}
|
||||
{{ certificate.common_name }}
|
||||
</div>
|
||||
<div class="card-block">
|
||||
<p>
|
||||
<i class="fa fa-circle"></i>
|
||||
<span class="lease">
|
||||
{% if certificate.lease %}
|
||||
{% include "views/lease.html" %}
|
||||
{% endif %}
|
||||
</span>
|
||||
|
||||
Signed
|
||||
<time class="timeago" datetime="{{ certificate.signed }}">Certificate was signed {{ certificate.signed }}</time>{% if certificate.signer %} by {{ certificate.signer }}{% endif %},
|
||||
expires
|
||||
<time class="timeago" datetime="{{ certificate.expires }}">Certificate expires {{ certificate.expires }}</time>.
|
||||
</p>
|
||||
<p>
|
||||
{% if session.tagging %}
|
||||
<span class="tags" data-cn="{{ certificate.common_name }}">
|
||||
{% include "views/tags.html" %}
|
||||
</span>
|
||||
{% endif %}
|
||||
<span class="attributes" data-cn="{{ certificate.common_name }}">
|
||||
{% include "views/attributes.html" %}
|
||||
</span>
|
||||
</p>
|
||||
|
||||
<div class="btn-group">
|
||||
<button type="button" class="btn btn-secondary" data-toggle="collapse" data-target="#details-{{ certificate.sha256sum }}"><i class="fa fa-list"></i> Details</button>
|
||||
<button type="button" class="btn btn-danger"
|
||||
onclick="javascript:$(this).button('loading');$.ajax({url:'/api/signed/{{certificate.common_name}}/?sha256sum={{ certificate.sha256sum }}',type:'delete'});">
|
||||
<i class="fa fa-ban"></i> Revoke</button>
|
||||
<button type="button" class="btn btn-danger dropdown-toggle dropdown-toggle-split" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false">
|
||||
<span class="sr-only">Toggle Dropdown</span>
|
||||
</button>
|
||||
<div class="dropdown-menu">
|
||||
<a class="dropdown-item" href="#"
|
||||
onclick="javascript:$(this).button('loading');$.ajax({url:'/api/signed/{{certificate.common_name}}/?sha256sum={{ certificate.sha256sum }}&reason=key_compromise',type:'delete'});">Revoke due to key compromise</a>
|
||||
<a class="dropdown-item" href="#"
|
||||
onclick="javascript:$(this).button('loading');$.ajax({url:'/api/signed/{{certificate.common_name}}/?sha256sum={{ certificate.sha256sum }}&reason=cessation_of_operation',type:'delete'});">Revoke due to cessation of operation</a>
|
||||
<a class="dropdown-item" href="#"
|
||||
onclick="javascript:$(this).button('loading');$.ajax({url:'/api/signed/{{certificate.common_name}}/?sha256sum={{ certificate.sha256sum }}&reason=privilege_withdrawn',type:'delete'});">Revoke due to withdrawn privilege</a>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div class="btn-group">
|
||||
{% if session.tagging %}
|
||||
<button type="button" class="btn btn-default" onclick="onNewTagClicked(event);" data-key="other" data-cn="{{ certificate.common_name }}">
|
||||
<i class="fa fa-tag"></i> Tag</button>
|
||||
<button type="button" class="btn btn-default dropdown-toggle dropdown-toggle-split" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false">
|
||||
<span class="sr-only">Toggle Dropdown</span>
|
||||
</button>
|
||||
<div class="dropdown-menu">
|
||||
{% for tag_category in session.tagging %}
|
||||
<a class="dropdown-item" href="#" data-key="{{ tag_category.name }}" data-cn="{{ certificate.common_name }}"
|
||||
onclick="onNewTagClicked(event);">{{ tag_category.title }}</a>
|
||||
{% endfor %}
|
||||
</div>
|
||||
{% endif %}
|
||||
</div>
|
||||
|
||||
<div class="collapse" id="details-{{ certificate.sha256sum }}">
|
||||
<p>To launch shell for this device, click <a href="#" onclick="onLaunchShell('{{ certificate.common_name }}')">here</a>
|
||||
<p>To fetch certificate:</p>
|
||||
|
||||
<div class="bd-example">
|
||||
<pre><code class="language-sh" data-lang="sh">wget <a href="/api/signed/{{ certificate.common_name }}/">http://{{ authority.namespace }}/api/signed/{{ certificate.common_name }}</a>
|
||||
curl -L http://{{ authority.namespace }}/api/signed/{{ certificate.common_name }}/ \
|
||||
| openssl x509 -text -noout</code></pre>
|
||||
</div>
|
||||
|
||||
{% if session.authorization.ocsp_subnets %}
|
||||
{% if certificate.responder_url %}
|
||||
<p>To perform online certificate status request{% if "0.0.0.0/0" not in session.authorization.ocsp_subnets %}
|
||||
from whitelisted {{ session.authorization.ocsp_subnets }} subnets{% endif %}:</p>
|
||||
<pre><code class="language-bash" data-lang="bash">curl http://{{ authority.namespace }}/api/certificate > session.pem
|
||||
openssl ocsp -issuer session.pem -CAfile session.pem \
|
||||
-url {{ certificate.responder_url }} \
|
||||
-serial 0x{{ certificate.serial }}</code></pre>
|
||||
{% else %}
|
||||
<p>Querying OCSP responder disabled for this certificate, see /etc/certidude/profile.conf how to enable if that's desired</p>
|
||||
{% endif %}
|
||||
{% endif %}
|
||||
|
||||
<p>To fetch script:</p>
|
||||
<pre><code class="language-bash" data-lang="bash">curl -L --cert-status https://{{ authority.namespace }}:8443/api/signed/{{ certificate.common_name }}/script/ \
|
||||
--cacert /etc/certidude/authority/{{ authority.namespace }}/ca_cert.pem \
|
||||
--key /etc/certidude/authority/{{ authority.namespace }}/host_key.pem \
|
||||
--cert /etc/certidude/authority/{{ authority.namespace }}/host_cert.pem</pre></code>
|
||||
|
||||
<div style="overflow: auto; max-width: 100%;">
|
||||
<table class="table" id="signed_certificates">
|
||||
<tbody>
|
||||
<tr><th>Common name</th><td>{{ certificate.common_name }}</td></tr>
|
||||
<tr><th>Organizational unit</th><td>{% if certificate.organizational_unit %}{{ certificate.organizational_unit }}{% else %}-{% endif %}</td></tr>
|
||||
<tr><th>Serial number</th><td style="word-wrap:break-word;">{{ certificate.serial | serial }}</td></tr>
|
||||
<tr><th>Signed</th><td>{{ certificate.signed | datetime }}{% if certificate.signer %} by {{ certificate.signer }}{% endif %}</td></tr>
|
||||
<tr><th>Expires</th><td>{{ certificate.expires | datetime }}</td></tr>
|
||||
{% if certificate.lease %}
|
||||
<tr><th>Lease</th><td><a href="http://{{ certificate.lease.inner_address }}">{{ certificate.lease.inner_address }}</a> at {{ certificate.lease.last_seen | datetime }}
|
||||
from <a href="https://geoiptool.com/en/?ip={{ certificate.lease.outer_address }}" target="_blank">{{ certificate.lease.outer_address }}</a>
|
||||
</td></tr>
|
||||
{% endif %}
|
||||
|
||||
<!--
|
||||
<tr><th>MD5</th><td>{{ certificate.md5sum }}</td></tr>
|
||||
<tr><th>SHA1</th><td>{{ certificate.sha1sum }}</td></tr>
|
||||
-->
|
||||
<tr><th>SHA256</th><td style="word-wrap:break-word; overflow-wrap: break-word; ">{{ certificate.sha256sum }}</td></tr>
|
||||
{% if certificate.key_usage %}
|
||||
<tr><th>Key usage</th><td>{{ certificate.key_usage | join(", ") | replace("_", " ") }}</td></tr>
|
||||
{% endif %}
|
||||
{% if certificate.extended_key_usage %}
|
||||
<tr><th>Extended key usage</th><td>{{ certificate.extended_key_usage | join(", ") | replace("_", " ") }}</td></tr>
|
||||
{% endif %}
|
||||
</tbody>
|
||||
</table>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
||||
</div>
|
6
templates/views/tags.html
Normal file
6
templates/views/tags.html
Normal file
@@ -0,0 +1,6 @@
|
||||
{% for tag in certificate.tags %}
|
||||
<span data-cn="{{ certificate.common_name }}"
|
||||
title="{{ tag }}"
|
||||
class="badge badge-default"
|
||||
onClick="onTagClicked(event);">{{ tag }}</span>
|
||||
{% endfor %}
|
10
templates/views/token.html
Normal file
10
templates/views/token.html
Normal file
@@ -0,0 +1,10 @@
|
||||
<li id="token-{{ token.subject }}-{{ token.uuid }}" class="list-group-item filterable" data-keywords="">
|
||||
<span>
|
||||
<i class="fas fa-ticket-alt"></i>
|
||||
{{ token.uuid }}...
|
||||
<a href="mailto:{{ token.mail }}">{{ token.subject }}</a>
|
||||
{% if token.issuer %}{% if token.issuer != token.subject %}by {{ token.issuer }}{% else %}by himself{% endif %}{% else %}via shell{% endif %},
|
||||
expires
|
||||
<time class="timeago" datetime="{{ token.expires }}">{{ token.expires }}</time>
|
||||
</span>
|
||||
</li>
|
Reference in New Issue
Block a user