version 1.9, 2016/07/25 19:49:45
|
version 1.12, 2018/08/18 22:07:48
|
Line 38 use LONCAPA;
|
Line 38 use LONCAPA;
|
use Apache::lonnet; |
use Apache::lonnet; |
use GDBM_File; |
use GDBM_File; |
use Crypt::OpenSSL::X509; |
use Crypt::OpenSSL::X509; |
|
use Crypt::PKCS10; |
|
|
sub dump_with_regexp { |
sub dump_with_regexp { |
my ( $tail, $clientversion ) = @_; |
my ( $tail, $clientversion ) = @_; |
Line 783 sub dump_profile_database {
|
Line 783 sub dump_profile_database {
|
return $qresult; |
return $qresult; |
} |
} |
|
|
|
sub is_course { |
|
my ($cdom,$cnum) = @_; |
|
|
|
return unless (($cdom =~ /^$LONCAPA::match_domain$/) && |
|
($cnum =~ /^$LONCAPA::match_courseid$/)); |
|
my $hashid = $cdom.':'.$cnum; |
|
my ($iscourse,$cached) = |
|
&Apache::lonnet::is_cached_new('iscourse',$hashid); |
|
unless (defined($cached)) { |
|
my $hashref = |
|
&tie_domain_hash($cdom, "nohist_courseids", &GDBM_WRCREAT()); |
|
if (ref($hashref) eq 'HASH') { |
|
my $esc_key = &escape($cdom.'_'.$cnum); |
|
if (exists($hashref->{$esc_key})) { |
|
$iscourse = 1; |
|
} else { |
|
$iscourse = 0; |
|
} |
|
&Apache::lonnet::do_cache_new('iscourse',$hashid,$iscourse,3600); |
|
unless (&untie_domain_hash($hashref)) { |
|
&logthis("Failed to untie tied hash for nohist_courseids.db for $cdom"); |
|
} |
|
} else { |
|
&logthis("Failed to tie hash for nohist_courseids.db for $cdom"); |
|
} |
|
} |
|
return $iscourse; |
|
} |
|
|
sub server_certs { |
sub server_certs { |
my ($perlvar) = @_; |
my ($perlvar,$lonhost,$hostname) = @_; |
my %pemfiles = ( |
my %pemfiles = ( |
key => 'lonnetPrivateKey', |
key => 'lonnetPrivateKey', |
host => 'lonnetCertificate', |
host => 'lonnetCertificate', |
hostname => 'lonnetHostnameCertificate', |
hostname => 'lonnetHostnameCertificate', |
ca => 'lonnetCertificateAuthority', |
ca => 'lonnetCertificateAuthority', |
); |
); |
my (%md5hash,%info); |
my (%md5hash,%expected_cn,%expired,%revoked,%wrongcn,%info,$crlfile); |
if (ref($perlvar) eq 'HASH') { |
if (ref($perlvar) eq 'HASH') { |
|
$expected_cn{'host'} = $lonhost; |
|
$expected_cn{'hostname'} = 'internal-'.$hostname; |
my $certsdir = $perlvar->{'lonCertificateDirectory'}; |
my $certsdir = $perlvar->{'lonCertificateDirectory'}; |
if (-d $certsdir) { |
if (-d $certsdir) { |
|
$crlfile = $certsdir.'/'.$perlvar->{'lonnetCertRevocationList'}; |
foreach my $key (keys(%pemfiles)) { |
foreach my $key (keys(%pemfiles)) { |
if ($perlvar->{$pemfiles{$key}}) { |
if ($perlvar->{$pemfiles{$key}}) { |
my $file = $certsdir.'/'.$perlvar->{$pemfiles{$key}}; |
my $file = $certsdir.'/'.$perlvar->{$pemfiles{$key}}; |
Line 809 sub server_certs {
|
Line 841 sub server_certs {
|
if (open(PIPE,"openssl rsa -noout -modulus -in $file | openssl md5 |")) { |
if (open(PIPE,"openssl rsa -noout -modulus -in $file | openssl md5 |")) { |
$md5hash{$key} = <PIPE>; |
$md5hash{$key} = <PIPE>; |
close(PIPE); |
close(PIPE); |
|
chomp($md5hash{$key}); |
} |
} |
} else { |
} else { |
if ($key eq 'ca') { |
if ($key eq 'ca') { |
Line 827 sub server_certs {
|
Line 860 sub server_certs {
|
if (open(PIPE,"openssl x509 -noout -modulus -in $file | openssl md5 |")) { |
if (open(PIPE,"openssl x509 -noout -modulus -in $file | openssl md5 |")) { |
$md5hash{$key} = <PIPE>; |
$md5hash{$key} = <PIPE>; |
close(PIPE); |
close(PIPE); |
|
chomp($md5hash{$key}); |
} |
} |
} |
} |
my $x509 = Crypt::OpenSSL::X509->new_from_file($file); |
my $x509 = Crypt::OpenSSL::X509->new_from_file($file); |
Line 842 sub server_certs {
|
Line 876 sub server_certs {
|
$info{$key}{'alg'} = $x509->sig_alg_name(); |
$info{$key}{'alg'} = $x509->sig_alg_name(); |
$info{$key}{'size'} = $x509->bit_length(); |
$info{$key}{'size'} = $x509->bit_length(); |
$info{$key}{'email'} = $x509->email(); |
$info{$key}{'email'} = $x509->email(); |
|
$info{$key}{'serial'} = $x509->serial(); |
|
if ($x509->checkend(0)) { |
|
$expired{$key} = 1; |
|
} |
|
if (($key eq 'host') || ($key eq 'hostname')) { |
|
if ($info{$key}{'cn'} ne $expected_cn{$key}) { |
|
$wrongcn{$key} = 1; |
|
} |
|
if ((-e $crlfile) && ($info{$key}{'serial'} =~ /^\w+$/)) { |
|
my $serial = $info{$key}{'serial'}; |
|
if (open(PIPE,"openssl crl -inform PEM -text -in $crlfile | grep $serial |")) { |
|
my $result = <PIPE>; |
|
close(PIPE); |
|
chomp($result); |
|
if ($result ne '') { |
|
$revoked{$key} = 1; |
|
} |
|
} |
|
} |
|
} |
|
} |
|
} |
|
if (($key eq 'host') || ($key eq 'hostname')) { |
|
my $csrfile = $file; |
|
$csrfile =~ s/\.pem$/.csr/; |
|
if (-e $csrfile) { |
|
if (open(PIPE,"openssl req -noout -modulus -in $csrfile |openssl md5 |")) { |
|
my $csrhash = <PIPE>; |
|
close(PIPE); |
|
chomp($csrhash); |
|
if ((!-e $file) || ($csrhash ne $md5hash{$key}) || ($expired{$key}) || |
|
($wrongcn{$key}) || ($revoked{$key})) { |
|
Crypt::PKCS10->setAPIversion(1); |
|
my $decoded = Crypt::PKCS10->new( $csrfile,(PEMonly => 1, readFile => 1)); |
|
if (ref($decoded)) { |
|
if ($decoded->commonName() eq $expected_cn{$key}) { |
|
$info{$key.'-csr'}{'cn'} = $decoded->commonName(); |
|
$info{$key.'-csr'}{'alg'} = $decoded->pkAlgorithm(); |
|
$info{$key.'-csr'}{'email'} = $decoded->emailAddress(); |
|
my $params = $decoded->subjectPublicKeyParams(); |
|
if (ref($params) eq 'HASH') { |
|
$info{$key.'-csr'}{'size'} = $params->{keylen}; |
|
} |
|
$md5hash{$key.'-csr'} = $csrhash; |
|
} |
|
} |
|
} |
|
} |
} |
} |
} |
} |
} |
} |
Line 851 sub server_certs {
|
Line 933 sub server_certs {
|
foreach my $key ('host','hostname') { |
foreach my $key ('host','hostname') { |
if ($md5hash{$key}) { |
if ($md5hash{$key}) { |
if ($md5hash{$key} eq $md5hash{'key'}) { |
if ($md5hash{$key} eq $md5hash{'key'}) { |
$info{$key}{'status'} = 'ok'; |
if ($revoked{$key}) { |
|
$info{$key}{'status'} = 'revoked'; |
|
} elsif ($expired{$key}) { |
|
$info{$key}{'status'} = 'expired'; |
|
} elsif ($wrongcn{$key}) { |
|
$info{$key}{'status'} = 'wrongcn'; |
|
} else { |
|
$info{$key}{'status'} = 'ok'; |
|
} |
|
} elsif ($info{'key'}{'status'} =~ /ok/) { |
|
$info{$key}{'status'} = 'otherkey'; |
|
} else { |
|
$info{$key}{'status'} = 'nokey'; |
|
} |
|
} |
|
if ($md5hash{$key.'-csr'}) { |
|
if ($md5hash{$key.'-csr'} eq $md5hash{'key'}) { |
|
$info{$key.'-csr'}{'status'} = 'ok'; |
|
} elsif ($info{'key'}{'status'} =~ /ok/) { |
|
$info{$key.'-csr'}{'status'} = 'otherkey'; |
|
} else { |
|
$info{$key.'-csr'}{'status'} = 'nokey'; |
} |
} |
} |
} |
} |
} |