fleet/server/mdm/crypto/scep.go
Victor Lyuboslavsky e4df954b0f
Update nanomdm dependency with latest bug fixes and improvements. (#23906)
#23905 

- Update with upstream nanomdm changes up to
825f2979a2
- Removed PostgeSQL folder from our nanomdm
- Added nanomdm MySQL test job to our CI

# Checklist for submitter

- [x] Changes file added for user-visible changes in `changes/`,
`orbit/changes/` or `ee/fleetd-chrome/changes`.
See [Changes
files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/Committing-Changes.md#changes-files)
for more information.
- [x] Added/updated tests
- [x] Manual QA for all new/changed functionality
2024-11-20 11:47:11 -06:00

67 lines
1.6 KiB
Go

package mdmcrypto
import (
"context"
"crypto/x509"
"errors"
"fmt"
"github.com/fleetdm/fleet/v4/server/fleet"
"github.com/fleetdm/fleet/v4/server/mdm/assets"
"github.com/fleetdm/fleet/v4/server/mdm/nanomdm/http/mdm"
)
var _ mdm.CertVerifier = (*SCEPVerifier)(nil)
type SCEPVerifier struct {
ds fleet.MDMAssetRetriever
}
func NewSCEPVerifier(ds fleet.MDMAssetRetriever) *SCEPVerifier {
return &SCEPVerifier{
ds: ds,
}
}
func (s *SCEPVerifier) Verify(ctx context.Context, cert *x509.Certificate) error {
if cert == nil {
return errors.New("no certificate provided")
}
opts := x509.VerifyOptions{
KeyUsages: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth},
Roots: x509.NewCertPool(),
}
rootCert, err := assets.X509Cert(ctx, s.ds, fleet.MDMAssetCACert)
if err != nil {
return fmt.Errorf("loading existing assets from the database: %w", err)
}
opts.Roots.AddCert(rootCert)
// the default SCEP cert issued by fleet doesn't have any extra key
// usages, however, customers might configure the server with any
// certificate they want (generally for touchless MDM migrations)
//
// given that go verifies ext key usages on the whole chain, we relax
// the constraints when the provided certificate has any ext key usage
// that would cause a failure.
if hasOtherKeyUsages(rootCert, x509.ExtKeyUsageClientAuth) {
opts.KeyUsages = []x509.ExtKeyUsage{x509.ExtKeyUsageAny}
}
if _, err := cert.Verify(opts); err != nil {
return err
}
return nil
}
func hasOtherKeyUsages(cert *x509.Certificate, usage x509.ExtKeyUsage) bool {
for _, u := range cert.ExtKeyUsage {
if u != usage {
return true
}
}
return false
}