diff options
author | Guilhem Moulin <guilhem@fripost.org> | 2014-06-28 22:37:14 +0200 |
---|---|---|
committer | Guilhem Moulin <guilhem@fripost.org> | 2015-06-07 02:52:05 +0200 |
commit | 9692d409658ce552ab3e0d9f41aadca1c7bcb407 (patch) | |
tree | c4bbed5b3f7023c7fcdc464e11d571668dc5290c | |
parent | a0b0b6de279d37641dd1eeb374e52d6fce73ab1d (diff) |
Make genkeypair.sh able to display TXT record for DKIM signatures.
-rwxr-xr-x | roles/common/files/usr/local/bin/genkeypair.sh | 82 | ||||
-rw-r--r-- | roles/common/tasks/ipsec.yml | 5 | ||||
-rw-r--r-- | roles/common/tasks/main.yml | 2 |
3 files changed, 61 insertions, 28 deletions
diff --git a/roles/common/files/usr/local/bin/genkeypair.sh b/roles/common/files/usr/local/bin/genkeypair.sh index 6c75fa4..16f9658 100755 --- a/roles/common/files/usr/local/bin/genkeypair.sh +++ b/roles/common/files/usr/local/bin/genkeypair.sh @@ -1,152 +1,182 @@ #!/bin/sh -# Generate self-signed server certificates. Inspired from -# make-ssl-cert(8). -# XXX: add support for DKIM and OpenSSH +# Wrapper around openssl to generate self-signed X.509 server +# certificates or Certificate Signing Requests, or DKIM private keys. +# Inspired from make-ssl-cert(8) and opendkim-genkey(8). # # Copyright © 2014 Guilhem Moulin <guilhem@fripost.org> # # This program is free software: you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation, either version 3 of the License, or # (at your option) any later version. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. set -ue PATH=/usr/bin:/bin # Default values type=rsa bits= hash= force= -x509=-x509 config= pubkey=pubkey.pem privkey=privkey.pem dns= usage() { cat >&2 <<- EOF - Usage: $0 [OPTIONS] - Generate self-signed server certificates + Usage: $0 command [OPTIONS] + + Command: + x509: generate a self-signed X.509 server certificate + csr: generate a Certificate Signing Request + dkim: generate a DKIM private key Options: -t type: key type (default: rsa) -b bits: key length or EC curve (default: 2048 for RSA, 1024 for DSA, secp224r1 for ECDSA) -h digest: digest algorithm --dns CN: common name (default: \$(hostname --fqdn); can be repeated -f force: overwrite key files if they exist - --csr: generate a Certificate Signing Request instead --config: configuration file --pubkey: public key file (default: pubkey.pem) --privkey: private key file (default: privkey.pem; created with og-rwx) Return values: 0 The key pair was successfully generated 1 The public or private key file exists, and -f is not set 2 The key generation failed EOF } +[ $# -gt 0 ] || { usage; exit 2; } +cmd="$1"; shift +case "$cmd" in + x509|csr|dkim) ;; + *) echo "Unrecognized command: $cmd" >&2; exit 2 +esac + while [ $# -gt 0 ]; do case "$1" in -t) shift; type="$1";; -t*) type="${1#-t}";; -b) shift; bits="$1";; -b*) bits="${1#-b}";; -h) shift; hash="$1";; -h*) hash="${1#-h}";; -f) force=1;; --pubkey=?*) pubkey="${1#--pubkey=}";; --privkey=?*) privkey="${1#--privkey=}";; - --csr) x509=;; --dns=?*) dns="${dns:+$dns,}${1#--dns=}";; --config=?*) dns="${1#--config=}";; --help) usage; exit;; *) echo "Unrecognized argument: $1" >&2; exit 2 esac shift; done rand=/dev/urandom case "$type" in # XXX: genrsa and dsaparam have been deprecated in favor of genpkey. # genpkey can also create explicit EC parameters, but not named. rsa) genkey=genrsa; genkeyargs="-f4 ${bits:-2048}";; dsa) genkey=dsaparam; genkeyargs="-noout -genkey ${bits:-1024}";; # See 'openssl ecparam -list_curves' for the list of supported # curves. StrongSwan doesn't support explicit curve parameters # (however explicit parameters might be required to make exotic # curves work with some clients.) ecdsa) genkey=ecparam genkeyargs="-noout -name ${bits:-secp224r1} -param_enc named_curve -genkey";; *) echo "Unrecognized key type: $type" >&2; exit 2 esac -case "$hash" in - md5|rmd160|sha1|sha224|sha256|sha384|sha512|'') ;; - *) echo "Invalid digest algorithm: $hash" >&2; exit 2; -esac +cn= +if [ "$cmd" = x509 -o "$cmd" = csr ]; then + case "$hash" in + md5|rmd160|sha1|sha224|sha256|sha384|sha512|'') ;; + *) echo "Invalid digest algorithm: $hash" >&2; exit 2; + esac -[ "$dns" ] || dns="$(hostname --fqdn)" -cn="${dns%%,*}" -[ ${#cn} -le 64 ] || { echo "CommonName too long: $cn" >&2; exit 2; } + [ "$dns" ] || dns="$(hostname --fqdn)" + cn="${dns%%,*}" + [ ${#cn} -le 64 ] || { echo "CommonName too long: $cn" >&2; exit 2; } +fi -for file in "$pubkey" "$privkey"; do - [ -z "$force" -a -s "$file" ] || continue - echo "Error: File exists: $file" >&2 - exit 1 -done +[ -s "$privkey" -a -z "$force" ] && force=0 +if [ "$cmd" != dkim ]; then + for file in "$pubkey" "$privkey"; do + [ "$force" != 1 -a -s "$file" ] || continue + echo "Error: File exists: $file" >&2 + exit 1 + done +fi -if [ -z "$config" ]; then +if [ -z "$config" -a \( "$cmd" = x509 -o "$cmd" = csr \) ]; then config=$(mktemp) || exit 2 trap 'rm -f "$config"' EXIT names= until [ "$dns" = "${dns#*,}" ]; do names=", DNS:${dns##*,}$names" dns="${dns%,*}" done # see /usr/share/ssl-cert/ssleay.cnf cat >"$config" <<- EOF [ req ] distinguished_name = req_distinguished_name prompt = no policy = policy_anything req_extensions = v3_req x509_extensions = v3_req default_days = 3650 [ req_distinguished_name ] countryName = SE organizationName = Fripost commonName = $cn [ v3_req ] subjectAltName = email:admin@fripost.org, DNS:$cn$names basicConstraints = critical, CA:FALSE EOF fi -# Ensure "$privkey" is created with umask 0077 -mv "$(mktemp)" "$privkey" || exit 2 -chmod og-rwx "$privkey" || exit 2 +if [ "$force" != 0 ]; then + # Ensure "$privkey" is created with umask 0077 + mv "$(mktemp)" "$privkey" || exit 2 + chmod og-rwx "$privkey" || exit 2 + openssl $genkey -rand /dev/urandom $genkeyargs >"$privkey" || exit 2 +fi -openssl $genkey -rand /dev/urandom $genkeyargs >"$privkey" || exit 2 -openssl req -config "$config" -new $x509 ${hash:+-$hash} -key "$privkey" >"$pubkey" || exit 2 +if [ "$cmd" = x509 -o "$cmd" = csr ]; then + [ "$cmd" = x509 ] && x509=-x509 || x509= + openssl req -config "$config" -new $x509 ${hash:+-$hash} -key "$privkey" >"$pubkey" || exit 2 +elif [ "$cmd" = dkim ]; then + echo "Add the following TXT record to your DNS zone:" >&2 + echo "${dns:-$(date +%Y%m%d)}._domainkey\tIN\tTXT ( " + # See https://tools.ietf.org/html/rfc4871#section-3.6.1 + # t=s: the "i=" domain in signature headers MUST NOT be a subdomain of "d=" + # s=email: limit DKIM signing to email + openssl pkey -pubout <"$privkey" | sed '/^--.*--$/d' \ + | { echo -n "v=DKIM1; k=$type; t=s; s=email; p="; tr -d '\n'; } \ + | fold -w 250 \ + | { sed 's/.*/\t"&"/'; echo ' )'; } + [ "$force" != 0 ] || exit 1 +fi diff --git a/roles/common/tasks/ipsec.yml b/roles/common/tasks/ipsec.yml index 5e0115e..d773c1c 100644 --- a/roles/common/tasks/ipsec.yml +++ b/roles/common/tasks/ipsec.yml @@ -1,25 +1,26 @@ - name: Install strongSwan apt: pkg=strongswan-ikev2 -- name: Generate a key pair for IPSec - command: genkeypair.sh --pubkey=/etc/ipsec.d/certs/{{ inventory_hostname }}.pem +- name: Generate a private key and a X.509 certificate for IPSec + command: genkeypair.sh x509 + --pubkey=/etc/ipsec.d/certs/{{ inventory_hostname }}.pem --privkey=/etc/ipsec.d/private/{{ inventory_hostname }}.key --dns {{ inventory_hostname }} -t ecdsa -b secp521r1 -h sha512 register: r1 failed_when: r1.rc > 1 changed_when: r1.rc == 0 notify: - Restart IPSec - name: Fetch the public part of IPSec's host key sudo: False # Ensure we don't fetch private data fetch: src=/etc/ipsec.d/certs/{{ inventory_hostname }}.pem dest=certs/ipsec/ fail_on_missing=yes flat=yes # Don't copy our pubkey due to a possible race condition. Only the # remote machine has authority regarding its key. - name: Copy IPSec host pubkeys (except ours) diff --git a/roles/common/tasks/main.yml b/roles/common/tasks/main.yml index f24a2c9..0048443 100644 --- a/roles/common/tasks/main.yml +++ b/roles/common/tasks/main.yml @@ -1,36 +1,38 @@ --- - include: sysctl.yml tags=sysctl - include: hosts.yml - include: apt.yml tags=apt - include: firewall.yml tags=firewall,iptables - include: samhain.yml tags=samhain - include: rkhunter.yml tags=rkhunter - include: clamav.yml tags=clamav - include: fail2ban.yml tags=fail2ban - include: smart.yml tags=smartmontools,smart - include: haveged.yml tags=haveged,entropy - name: Copy genkeypair.sh copy: src=usr/local/bin/genkeypair.sh dest=/usr/local/bin/genkeypair.sh owner=root group=root mode=0755 + tags: + - genkeypair - include: ipsec.yml tags=strongswan,ipsec - include: logging.yml tags=logging - include: ntp.yml tags=ntp - include: mail.yml tags=mail,postfix - name: Install common packages apt: pkg={{ item }} with_items: - ca-certificates - daemontools - etckeeper - ethtool - git - harden-clients - harden-servers - htop - molly-guard - rsync - screen - telnet-ssl |