%PDF- %PDF-
| Direktori : /proc/self/root/backups/router/usr/local/opnsense/mvc/app/models/OPNsense/IPsec/ |
| Current File : //proc/self/root/backups/router/usr/local/opnsense/mvc/app/models/OPNsense/IPsec/IPsec.php |
<?php
/*
* Copyright (C) 2022 Deciso B.V.
* Copyright (C) 2019 Pascal Mathis <mail@pascalmathis.com>
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions are met:
*
* 1. Redistributions of source code must retain the above copyright notice,
* this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
* INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY
* AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
* AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
* OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
* POSSIBILITY OF SUCH DAMAGE.
*/
namespace OPNsense\IPsec;
use OPNsense\Base\Messages\Message;
use OPNsense\Base\BaseModel;
/**
* Class IPsec
* @package OPNsense\IPsec
*/
class IPsec extends BaseModel
{
/**
* {@inheritdoc}
*/
public function performValidation($validateFullModel = false)
{
$messages = parent::performValidation($validateFullModel);
$keyPairs = [];
foreach ($this->getFlatNodes() as $key => $node) {
if ($validateFullModel || $node->isFieldChanged()) {
$tagName = $node->getInternalXMLTagName();
$parentNode = $node->getParentNode();
$parentTagName = $parentNode->getInternalXMLTagName();
if ($parentTagName === 'keyPair' && in_array($tagName, ['keyType', 'privateKey', 'publicKey'])) {
$keyPairs[$parentNode->__reference] = $parentNode;
}
}
}
// for all changed keypairs, validate contents in full (prevent pub-key update not matching priv key anymore)
foreach ($keyPairs as $key => $node) {
if (!empty((string)$node->keyType)) {
$props = $this->validateKeyPair($key, $node, $messages);
// XXX: although it's a bit obscure to update the model on validation, these two fields are
// contain data collected during the validation process.
$node->keySize = $props['keySize'];
$node->keyFingerprint = $props['keyFingerprint'];
}
}
return $messages;
}
/**
* {@inheritdoc}
*/
private function validateKeyPair($nodeKey, $keyPair, $messages)
{
$Keys = ['public' => null, 'private' => null];
foreach (['public', 'private'] as $type) {
// Validate $type key
if (!empty((string)$keyPair->{$type . 'Key'})) {
try {
$Keys[$type] = $this->parseCryptographicKey(
(string)$keyPair->{$type . 'Key'},
$type
);
} catch (\Exception $e) {
$messages->appendMessage(new Message($e->getMessage(), $nodeKey . ".{$type}Key"));
}
}
}
// Compare SHA1 fingerprint of public and private keys to check if they belong to each other
if ($Keys['public'] && $Keys['private']) {
if ($Keys['public']['fingerprint'] !== $Keys['private']['fingerprint']) {
$messages->appendMessage(new Message(
gettext('This private key does not belong to the given public key.'),
$nodeKey . '.privateKey'
));
}
}
return [
'keySize' => $Keys['public'] ? $Keys['public']['size'] : 0,
'keyFingerprint' => $Keys['public'] ? $Keys['public']['fingerprint'] : ''
];
}
/**
* Parse a cryptographic key of a given type using OpenSSL and return an array of informational data.
* @param $keyString string
* @param $keyType string
* @return array
*/
public function parseCryptographicKey($keyString, $keyType)
{
// Attempt to load key with correct type
if ($keyType == 'public') {
$key = openssl_pkey_get_public($keyString);
} elseif ($keyType === 'private') {
$key = openssl_pkey_get_private($keyString);
} else {
throw new \InvalidArgumentException(sprintf(
gettext('Unsupported key type: %s'),
$keyType
));
}
// Ensure that key has been successfully loaded
if ($key === false) {
throw new \InvalidArgumentException(sprintf(
gettext('Could not load potentially invalid %s key: %s'),
$keyType,
openssl_error_string()
));
}
// Attempt to fetch key details
$keyDetails = openssl_pkey_get_details($key);
if ($keyDetails === false) {
throw new \RuntimeException(sprintf(
gettext('Could not fetch details for %s key: %s'),
$keyType,
openssl_error_string()
));
}
// Verify given public key is valid for usage with Strongswan
if (!in_array($keyDetails['type'], [OPENSSL_KEYTYPE_RSA, OPENSSL_KEYTYPE_EC])) {
throw new \InvalidArgumentException(sprintf(
gettext('Unsupported OpenSSL key type [%d] for %s key, expected RSA or EC.'),
$keyDetails['type'],
$keyType
));
}
// Fetch sanitized PEM representation of key
if ($keyType === 'private') {
if (!openssl_pkey_export($key, $keySanitized, null)) {
throw new \RuntimeException(sprintf(
gettext('Could not generate sanitized %s key in PEM format: %s'),
$keyType,
openssl_error_string()
));
}
} else {
$keySanitized = $keyDetails['key'];
}
// Calculate fingerprint for the public key (when a private key was given, its public key is calculated)
$keyUnwrapped = trim(preg_replace('/\\+s/', '', preg_replace(
'~^-----BEGIN(?:[A-Z]+ )? PUBLIC KEY-----([A-Za-z0-9+/=\\s]+)-----END(?:[A-Z]+ )? PUBLIC KEY-----$~m',
'\\1',
$keyDetails['key']
)));
$keyFingerprint = substr(chunk_split(hash('sha1', base64_decode($keyUnwrapped)), 2, ':'), 0, -1);
return [
'resource' => $key,
'size' => $keyDetails['bits'],
'fingerprint' => $keyFingerprint,
'type' => $keyType
];
}
private function traverseItems($node)
{
$result = [];
foreach ($node->iterateItems() as $key => $item) {
if ($item->isContainer()) {
$result[$key] = $this->traverseItems($item);
} elseif (is_a($item, "OPNsense\\Base\\FieldTypes\\BooleanField")) {
$result[$key] = !empty((string)$item) ? 'yes' : 'no';
} elseif ((string)$item != '') {
$result[$key] = (string)$item;
}
}
return $result;
}
public function strongswanTree()
{
$result = [
'# Automatically generated, please do not modify' => '',
'starter' => [
'load_warning' => 'no'
],
'charon' => $this->traverseItems($this->charon)
];
return $result;
}
}