Add a CertificateChecker class (#793)

* CertificateChecker with checks for expiration and key length

* Add validity length check

* Get rid of hard-coded constants and DSA checks

* add files that for some reason weren't included in last commit

* Rename violations and other fixes

* Add displayMessage to CertificateViolation enum

* Switch violations from an enum to a class

* small changes

* Get rid of ECDSA checks

* add checks for old validity length

* Change error message for validity length
This commit is contained in:
sarahcaseybot 2020-10-06 15:47:42 -04:00 committed by GitHub
parent 31caff9010
commit 35ebe371ba
77 changed files with 421 additions and 9 deletions

View file

@ -0,0 +1,184 @@
// Copyright 2020 The Nomulus Authors. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package google.registry.util;
import static com.google.common.truth.Truth.assertThat;
import static org.joda.time.DateTimeZone.UTC;
import com.google.common.collect.ImmutableSet;
import java.security.KeyPairGenerator;
import java.security.SecureRandom;
import java.security.cert.X509Certificate;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.joda.time.DateTime;
import org.junit.jupiter.api.Test;
/** Unit tests for {@link CertificateChecker} */
public class CertificateCheckerTest {
private static final String SSL_HOST = "www.example.tld";
private static CertificateChecker certificateChecker = new CertificateChecker(398, 30, 2048);
@Test
void test_compliantCertificate() throws Exception {
X509Certificate certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.now(UTC).minusDays(5).toDate(),
DateTime.now(UTC).plusDays(80).toDate())
.cert();
assertThat(certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate()))
.isEqualTo(ImmutableSet.of());
}
@Test
void test_certificateWithSeveralIssues() throws Exception {
KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA", new BouncyCastleProvider());
keyGen.initialize(1024, new SecureRandom());
X509Certificate certificate =
SelfSignedCaCertificate.create(
keyGen.generateKeyPair(),
SSL_HOST,
DateTime.now(UTC).plusDays(5).toDate(),
DateTime.now(UTC).plusDays(1000).toDate())
.cert();
ImmutableSet<CertificateViolation> violations =
certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations).hasSize(3);
assertThat(violations)
.isEqualTo(
ImmutableSet.of(
certificateChecker.certificateNotYetValidViolation,
certificateChecker.certificateValidityLengthViolation,
certificateChecker.certificateRsaKeyLengthViolation));
;
}
@Test
void test_expiredCertificate() throws Exception {
X509Certificate certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.now(UTC).minusDays(50).toDate(),
DateTime.now(UTC).minusDays(10).toDate())
.cert();
ImmutableSet<CertificateViolation> violations =
certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations).containsExactly(certificateChecker.certificateExpiredViolation);
}
@Test
void test_notYetValid() throws Exception {
X509Certificate certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.now(UTC).plusDays(10).toDate(),
DateTime.now(UTC).plusDays(50).toDate())
.cert();
ImmutableSet<CertificateViolation> violations =
certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations).containsExactly(certificateChecker.certificateNotYetValidViolation);
}
@Test
void test_checkValidityLength() throws Exception {
X509Certificate certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.now(UTC).minusDays(10).toDate(),
DateTime.now(UTC).plusDays(1000).toDate())
.cert();
ImmutableSet<CertificateViolation> violations =
certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations).containsExactly(certificateChecker.certificateValidityLengthViolation);
certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.parse("2020-08-01T00:00:00Z").toDate(),
DateTime.parse("2023-11-01T00:00:00Z").toDate())
.cert();
violations = certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations)
.containsExactly(certificateChecker.certificateOldValidityLengthValidViolation);
certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.parse("2020-08-01T00:00:00Z").toDate(),
DateTime.parse("2021-11-01T00:00:00Z").toDate())
.cert();
violations = certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations).isEmpty();
}
@Test
void test_nearingExpiration() throws Exception {
X509Certificate certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.now(UTC).minusDays(50).toDate(),
DateTime.now(UTC).plusDays(10).toDate())
.cert();
assertThat(certificateChecker.isNearingExpiration(certificate, DateTime.now(UTC).toDate()))
.isTrue();
certificate =
SelfSignedCaCertificate.create(
SSL_HOST,
DateTime.now(UTC).minusDays(50).toDate(),
DateTime.now(UTC).plusDays(100).toDate())
.cert();
assertThat(certificateChecker.isNearingExpiration(certificate, DateTime.now(UTC).toDate()))
.isFalse();
}
@Test
void test_checkRsaKeyLength() throws Exception {
// Key length too low
KeyPairGenerator keyGen = KeyPairGenerator.getInstance("RSA", new BouncyCastleProvider());
keyGen.initialize(1024, new SecureRandom());
X509Certificate certificate =
SelfSignedCaCertificate.create(
keyGen.generateKeyPair(),
SSL_HOST,
DateTime.now(UTC).minusDays(5).toDate(),
DateTime.now(UTC).plusDays(100).toDate())
.cert();
ImmutableSet<CertificateViolation> violations =
certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate());
assertThat(violations).containsExactly(certificateChecker.certificateRsaKeyLengthViolation);
// Key length higher than required
keyGen = KeyPairGenerator.getInstance("RSA", new BouncyCastleProvider());
keyGen.initialize(4096, new SecureRandom());
certificate =
SelfSignedCaCertificate.create(
keyGen.generateKeyPair(),
SSL_HOST,
DateTime.now(UTC).minusDays(5).toDate(),
DateTime.now(UTC).plusDays(100).toDate())
.cert();
assertThat(certificateChecker.checkCertificate(certificate, DateTime.now(UTC).toDate()))
.isEqualTo(ImmutableSet.of());
}
}