Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions .golangci.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -81,3 +81,5 @@ issues:
linters:
- goconst
text: 'string `Incorrect validation certificate for %s challenge. ` has \d occurrences, make it a constant'
exclude-dirs:
- ca/x509pq
38 changes: 21 additions & 17 deletions ca/ca.go
Original file line number Diff line number Diff line change
Expand Up @@ -7,8 +7,7 @@ import (
"crypto/elliptic"
"crypto/rand"
"crypto/rsa"
"crypto/sha1"
"crypto/x509"
"crypto/sha256"
"crypto/x509/pkix"
"encoding/asn1"
"encoding/hex"
Expand All @@ -21,7 +20,10 @@ import (
"strings"
"time"

"github.com/cloudflare/circl/sign/mldsa/mldsa65"

"github.com/letsencrypt/pebble/v2/acme"
"github.com/letsencrypt/pebble/v2/ca/x509pq"
"github.com/letsencrypt/pebble/v2/core"
"github.com/letsencrypt/pebble/v2/db"
)
Expand Down Expand Up @@ -79,7 +81,7 @@ func makeSerial() *big.Int {
// Taken from https://github.com/cloudflare/cfssl/blob/b94e044bb51ec8f5a7232c71b1ed05dbe4da96ce/signer/signer.go#L221-L244
func makeSubjectKeyID(key crypto.PublicKey) ([]byte, error) {
// Marshal the public key as ASN.1
pubAsDER, err := x509.MarshalPKIXPublicKey(key)
pubAsDER, err := x509pq.MarshalPKIXPublicKey(key)
if err != nil {
return nil, err
}
Expand All @@ -94,9 +96,9 @@ func makeSubjectKeyID(key crypto.PublicKey) ([]byte, error) {
return nil, err
}

// Hash it according to https://tools.ietf.org/html/rfc5280#section-4.2.1.2 Method #1:
ski := sha1.Sum(pubInfo.SubjectPublicKey.Bytes)
return ski[:], nil
// Hash it according to https://datatracker.ietf.org/doc/html/rfc7093#section-2 Method #1:
skid := sha256.Sum256(pubInfo.SubjectPublicKey.Bytes)
return skid[0:20:20], nil
}

// makeKey and makeRootCert are adapted from MiniCA:
Expand All @@ -112,6 +114,8 @@ func makeKey(keyAlg string) (crypto.Signer, []byte, error) {
key, err = rsa.GenerateKey(rand.Reader, 2048)
case "ecdsa":
key, err = ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
case "mldsa":
_, key, err = mldsa65.GenerateKey(rand.Reader)
}
if err != nil {
return nil, nil, err
Expand All @@ -130,21 +134,21 @@ func (ca *CAImpl) makeCACert(
signer *issuer,
) (*core.Certificate, error) {
serial := makeSerial()
template := &x509.Certificate{
template := &x509pq.Certificate{
Subject: subject,
SerialNumber: serial,
NotBefore: time.Now(),
NotAfter: time.Now().AddDate(30, 0, 0),

KeyUsage: x509.KeyUsageDigitalSignature | x509.KeyUsageCertSign,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
KeyUsage: x509pq.KeyUsageDigitalSignature | x509pq.KeyUsageCertSign,
ExtKeyUsage: []x509pq.ExtKeyUsage{x509pq.ExtKeyUsageServerAuth},
SubjectKeyId: subjectKeyID,
BasicConstraintsValid: true,
IsCA: true,
}

var signerKey crypto.Signer
var parent *x509.Certificate
var parent *x509pq.Certificate
if signer != nil && signer.key != nil && signer.cert != nil && signer.cert.Cert != nil {
signerKey = signer.key
parent = signer.cert.Cert
Expand All @@ -153,12 +157,12 @@ func (ca *CAImpl) makeCACert(
parent = template
}

der, err := x509.CreateCertificate(rand.Reader, template, parent, subjectKey.Public(), signerKey)
der, err := x509pq.CreateCertificate(rand.Reader, template, parent, subjectKey.Public(), signerKey)
if err != nil {
return nil, err
}

cert, err := x509.ParseCertificate(der)
cert, err := x509pq.ParseCertificate(der)
if err != nil {
return nil, err
}
Expand Down Expand Up @@ -306,15 +310,15 @@ func (ca *CAImpl) newCertificate(domains []string, ips []net.IP, key crypto.Publ
}

serial := makeSerial()
template := &x509.Certificate{
template := &x509pq.Certificate{
DNSNames: domains,
IPAddresses: ips,
SerialNumber: serial,
NotBefore: certNotBefore,
NotAfter: certNotAfter,

KeyUsage: x509.KeyUsageDigitalSignature,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageServerAuth},
KeyUsage: x509pq.KeyUsageDigitalSignature,
ExtKeyUsage: []x509pq.ExtKeyUsage{x509pq.ExtKeyUsageServerAuth},
ExtraExtensions: extensions,
BasicConstraintsValid: true,
IsCA: false,
Expand All @@ -340,11 +344,11 @@ func (ca *CAImpl) newCertificate(domains []string, ips []net.IP, key crypto.Publ
template.OCSPServer = []string{ca.ocspResponderURL}
}

der, err := x509.CreateCertificate(rand.Reader, template, issuer.cert.Cert, key, issuer.key)
der, err := x509pq.CreateCertificate(rand.Reader, template, issuer.cert.Cert, key, issuer.key)
if err != nil {
return nil, err
}
cert, err := x509.ParseCertificate(der)
cert, err := x509pq.ParseCertificate(der)
if err != nil {
return nil, err
}
Expand Down
5 changes: 3 additions & 2 deletions ca/ca_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ import (
"time"

"github.com/letsencrypt/pebble/v2/acme"
x509pq "github.com/letsencrypt/pebble/v2/ca/x509pq"
"github.com/letsencrypt/pebble/v2/core"
"github.com/letsencrypt/pebble/v2/db"
)
Expand All @@ -27,7 +28,7 @@ var (
func makeCa() *CAImpl {
logger := log.New(os.Stdout, "Pebble ", log.LstdFlags)
db := db.NewMemoryStore()
return New(logger, db, "", "ecdsa", 0, 1, map[string]Profile{"default": {}})
return New(logger, db, "", "mldsa", 0, 1, map[string]Profile{"default": {}})
}

func makeCertOrderWithExtensions(extensions []pkix.Extension) core.Order {
Expand Down Expand Up @@ -58,7 +59,7 @@ func makeCertOrderWithExtensions(extensions []pkix.Extension) core.Order {
}
}

func getOCSPMustStapleExtension(cert *x509.Certificate) *pkix.Extension {
func getOCSPMustStapleExtension(cert *x509pq.Certificate) *pkix.Extension {
for _, ext := range cert.Extensions {
if ext.Id.Equal(ocspID) && bytes.Equal(ext.Value, ocspValue) {
return &ext
Expand Down
Loading