Initialize Commit
This commit is contained in:
commit
132eee8091
145
.gitignore
vendored
Normal file
145
.gitignore
vendored
Normal file
@ -0,0 +1,145 @@
|
||||
# Created by https://www.toptal.com/developers/gitignore/api/rust-analyzer,rust,certificates,visualstudiocode,jetbrains+all
|
||||
# Edit at https://www.toptal.com/developers/gitignore?templates=rust-analyzer,rust,certificates,visualstudiocode,jetbrains+all
|
||||
|
||||
### certificates ###
|
||||
*.pem
|
||||
*.key
|
||||
*.crt
|
||||
*.cer
|
||||
*.der
|
||||
*.priv
|
||||
|
||||
# add jay
|
||||
*.csr
|
||||
*.pub
|
||||
*.srl
|
||||
|
||||
### JetBrains+all ###
|
||||
# Covers JetBrains IDEs: IntelliJ, RubyMine, PhpStorm, AppCode, PyCharm, CLion, Android Studio, WebStorm and Rider
|
||||
# Reference: https://intellij-support.jetbrains.com/hc/en-us/articles/206544839
|
||||
|
||||
# User-specific stuff
|
||||
.idea/**/workspace.xml
|
||||
.idea/**/tasks.xml
|
||||
.idea/**/usage.statistics.xml
|
||||
.idea/**/dictionaries
|
||||
.idea/**/shelf
|
||||
|
||||
# AWS User-specific
|
||||
.idea/**/aws.xml
|
||||
|
||||
# Generated files
|
||||
.idea/**/contentModel.xml
|
||||
|
||||
# Sensitive or high-churn files
|
||||
.idea/**/dataSources/
|
||||
.idea/**/dataSources.ids
|
||||
.idea/**/dataSources.local.xml
|
||||
.idea/**/sqlDataSources.xml
|
||||
.idea/**/dynamic.xml
|
||||
.idea/**/uiDesigner.xml
|
||||
.idea/**/dbnavigator.xml
|
||||
|
||||
# Gradle
|
||||
.idea/**/gradle.xml
|
||||
.idea/**/libraries
|
||||
|
||||
# Gradle and Maven with auto-import
|
||||
# When using Gradle or Maven with auto-import, you should exclude module files,
|
||||
# since they will be recreated, and may cause churn. Uncomment if using
|
||||
# auto-import.
|
||||
# .idea/artifacts
|
||||
# .idea/compiler.xml
|
||||
# .idea/jarRepositories.xml
|
||||
# .idea/modules.xml
|
||||
# .idea/*.iml
|
||||
# .idea/modules
|
||||
# *.iml
|
||||
# *.ipr
|
||||
|
||||
# CMake
|
||||
cmake-build-*/
|
||||
|
||||
# Mongo Explorer plugin
|
||||
.idea/**/mongoSettings.xml
|
||||
|
||||
# File-based project format
|
||||
*.iws
|
||||
|
||||
# IntelliJ
|
||||
out/
|
||||
|
||||
# mpeltonen/sbt-idea plugin
|
||||
.idea_modules/
|
||||
|
||||
# JIRA plugin
|
||||
atlassian-ide-plugin.xml
|
||||
|
||||
# Cursive Clojure plugin
|
||||
.idea/replstate.xml
|
||||
|
||||
# SonarLint plugin
|
||||
.idea/sonarlint/
|
||||
|
||||
# Crashlytics plugin (for Android Studio and IntelliJ)
|
||||
com_crashlytics_export_strings.xml
|
||||
crashlytics.properties
|
||||
crashlytics-build.properties
|
||||
fabric.properties
|
||||
|
||||
# Editor-based Rest Client
|
||||
.idea/httpRequests
|
||||
|
||||
# Android studio 3.1+ serialized cache file
|
||||
.idea/caches/build_file_checksums.ser
|
||||
|
||||
### JetBrains+all Patch ###
|
||||
# Ignore everything but code style settings and run configurations
|
||||
# that are supposed to be shared within teams.
|
||||
|
||||
.idea/*
|
||||
|
||||
!.idea/codeStyles
|
||||
!.idea/runConfigurations
|
||||
|
||||
### Rust ###
|
||||
# Generated by Cargo
|
||||
# will have compiled files and executables
|
||||
debug/
|
||||
target/
|
||||
|
||||
# Remove Cargo.lock from gitignore if creating an executable, leave it for libraries
|
||||
# More information here https://doc.rust-lang.org/cargo/guide/cargo-toml-vs-cargo-lock.html
|
||||
Cargo.lock
|
||||
|
||||
# These are backup files generated by rustfmt
|
||||
**/*.rs.bk
|
||||
|
||||
# MSVC Windows builds of rustc generate these, which store debugging information
|
||||
*.pdb
|
||||
|
||||
### rust-analyzer ###
|
||||
# Can be generated by other build systems other than cargo (ex: bazelbuild/rust_rules)
|
||||
rust-project.json
|
||||
|
||||
|
||||
### VisualStudioCode ###
|
||||
.vscode/*
|
||||
!.vscode/settings.json
|
||||
!.vscode/tasks.json
|
||||
!.vscode/launch.json
|
||||
!.vscode/extensions.json
|
||||
!.vscode/*.code-snippets
|
||||
|
||||
# Local History for Visual Studio Code
|
||||
.history/
|
||||
|
||||
# Built Visual Studio Code Extensions
|
||||
*.vsix
|
||||
|
||||
### VisualStudioCode Patch ###
|
||||
# Ignore all local history of files
|
||||
.history
|
||||
.ionide
|
||||
|
||||
# End of https://www.toptal.com/developers/gitignore/api/rust-analyzer,rust,certificates,visualstudiocode,jetbrains+all
|
16
Cargo.toml
Normal file
16
Cargo.toml
Normal file
@ -0,0 +1,16 @@
|
||||
[package]
|
||||
name = "TcpExample"
|
||||
version = "0.1.0"
|
||||
edition = "2021"
|
||||
|
||||
[dependencies]
|
||||
log = "0.4.22"
|
||||
pretty_env_logger = "0.5.0"
|
||||
rustls = "0.23.12"
|
||||
rustls-native-certs = "0.7.1"
|
||||
rustls-pemfile = "2.1.2"
|
||||
tokio = "1.39.2"
|
||||
tokio-rustls = "0.26.0"
|
||||
webpki = "0.22.4"
|
||||
webpki-roots = "0.26.3"
|
||||
x509-parser = "0.16.0"
|
40
README.md
Normal file
40
README.md
Normal file
@ -0,0 +1,40 @@
|
||||
# TLS on Rust and PKI
|
||||
|
||||
## How to Build
|
||||
```bash
|
||||
$ cargo build
|
||||
```
|
||||
|
||||
## Run TLS Server
|
||||
```bash
|
||||
$ cargo run --bin TcpExample certs/host/fullchain.pem certs/host/server.key
|
||||
```
|
||||
|
||||
## Run TLS Client
|
||||
```bash
|
||||
# EXEC_TARGET=client
|
||||
$ EXEC_TARGET=allow_any_cert_client
|
||||
$ cargo run --bin $EXEC_TARGET certs/rootca/rootCA.crt
|
||||
```
|
||||
|
||||
## Make rootCA Certificate
|
||||
```bash
|
||||
$ cd certs/rootca
|
||||
# edit rootca.conf
|
||||
$ ./bootstrap cert_name
|
||||
```
|
||||
|
||||
## Make ICA Certificate
|
||||
```bash
|
||||
$ cd certs/ica
|
||||
# edit ica.conf
|
||||
$ ./bootstrap cert_name
|
||||
```
|
||||
|
||||
## Make Server Certificate
|
||||
```bash
|
||||
$ cd certs/host
|
||||
# edit host.conf
|
||||
$ ./bootstrap cert_name
|
||||
```
|
||||
|
18
certs/host/bootstrap.sh
Executable file
18
certs/host/bootstrap.sh
Executable file
@ -0,0 +1,18 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo "Create $1 Server"
|
||||
openssl genpkey -algorithm EC -out $1.key -pkeyopt ec_paramgen_curve:P-384 -pkeyopt ec_param_enc:named_curve
|
||||
|
||||
openssl req -new -config host.conf -key $1.key -out $1.csr
|
||||
|
||||
openssl x509 -req -days 730 -in $1.csr -out $1.crt -extfile host.conf -extensions v3_ext \
|
||||
-CAkey $2 -CA $3 -CAcreateserial
|
||||
|
||||
openssl ec -in $1.key -pubout -out $1.pub
|
||||
|
||||
openssl x509 -in $1.crt -text -pubkey -noout
|
||||
|
||||
cat $1.pub
|
||||
|
||||
cat $1.crt $3 > fullchain.pem
|
||||
|
43
certs/host/host.conf
Normal file
43
certs/host/host.conf
Normal file
@ -0,0 +1,43 @@
|
||||
# Modify this files to your needs
|
||||
|
||||
[req]
|
||||
default_bits = 384
|
||||
distinguished_name = dn
|
||||
default_md = sha256
|
||||
prompt = no
|
||||
req_extensions = req_ext
|
||||
|
||||
[dn]
|
||||
C="KR"
|
||||
ST="Seoul"
|
||||
L="Seoul"
|
||||
O="SCOPE.Inc"
|
||||
OU="SCOPE Lab"
|
||||
emailAddress="jay3920@scope.co.kr"
|
||||
CN="Invalid Test"
|
||||
|
||||
[req_ext]
|
||||
subjectAltName = @alt_names
|
||||
|
||||
[ v3_ext]
|
||||
authorityKeyIdentifier = keyid,issuer:always
|
||||
basicConstraints = CA:FALSE
|
||||
subjectKeyIdentifier = hash
|
||||
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
|
||||
extendedKeyUsage = serverAuth
|
||||
subjectAltName = @alt_names
|
||||
|
||||
[ v3_ext_client]
|
||||
authorityKeyIdentifier = keyid,issuer:always
|
||||
basicConstraints = CA:FALSE
|
||||
subjectKeyIdentifier = hash
|
||||
keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
|
||||
extendedKeyUsage = clientAuth
|
||||
subjectAltName = @alt_names
|
||||
|
||||
[alt_names]
|
||||
DNS.1 = www.scope.co.kr
|
||||
DNS.2 = *.scope.co.kr
|
||||
IP.1 = 10.1.3.63
|
||||
IP.2 = 10.1.3.69
|
||||
IP.3 = 10.1.3.80
|
16
certs/ica/bootstrap.sh
Executable file
16
certs/ica/bootstrap.sh
Executable file
@ -0,0 +1,16 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo "Create $1 ICA"
|
||||
openssl genpkey -algorithm EC -out $1.key -pkeyopt ec_paramgen_curve:P-384 -pkeyopt ec_param_enc:named_curve
|
||||
|
||||
openssl req -new -config ica.conf -key $1.key -out $1.csr
|
||||
|
||||
openssl x509 -req -days 730 -in $1.csr -out $1.crt -extfile ../rootca/rootca.conf -extensions v3_intermediate_ca \
|
||||
-CAkey $2 -CA $3 -CAcreateserial
|
||||
|
||||
openssl ec -in $1.key -pubout -out $1.pub
|
||||
|
||||
openssl x509 -in $1.crt -text -pubkey -noout
|
||||
|
||||
cat $1.pub
|
||||
|
132
certs/ica/ica.conf
Normal file
132
certs/ica/ica.conf
Normal file
@ -0,0 +1,132 @@
|
||||
[ ca ]
|
||||
# `man ca`
|
||||
default_ca = CA_default
|
||||
|
||||
[ CA_default ]
|
||||
# # Directory and file locations.
|
||||
# dir = /root/ca/intermediate
|
||||
# certs = $dir/certs
|
||||
# crl_dir = $dir/crl
|
||||
# new_certs_dir = $dir/newcerts
|
||||
# database = $dir/index.txt
|
||||
# serial = $dir/serial
|
||||
# RANDFILE = $dir/private/.rand
|
||||
|
||||
# # The root key and root certificate.
|
||||
# private_key = $dir/private/intermediate.key.pem
|
||||
# certificate = $dir/certs/intermediate.cert.pem
|
||||
|
||||
# # For certificate revocation lists.
|
||||
# crlnumber = $dir/crlnumber
|
||||
# crl = $dir/crl/intermediate.crl.pem
|
||||
# crl_extensions = crl_ext
|
||||
# default_crl_days = 30
|
||||
|
||||
# SHA-1 is deprecated, so use SHA-2 instead.
|
||||
default_md = sha256
|
||||
|
||||
name_opt = ca_default
|
||||
cert_opt = ca_default
|
||||
default_days = 375
|
||||
preserve = no
|
||||
policy = policy_loose
|
||||
|
||||
[ policy_strict ]
|
||||
# The root CA should only sign intermediate certificates that match.
|
||||
# See the POLICY FORMAT section of `man ca`.
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
[ policy_loose ]
|
||||
# Allow the intermediate CA to sign a more diverse range of certificates.
|
||||
# See the POLICY FORMAT section of the `ca` man page.
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
[ req ]
|
||||
# Options for the `req` tool (`man req`).
|
||||
default_bits = 384
|
||||
distinguished_name = req_distinguished_name
|
||||
string_mask = utf8only
|
||||
prompt = no
|
||||
encrypt_key = no
|
||||
|
||||
# SHA-1 is deprecated, so use SHA-2 instead.
|
||||
default_md = sha256
|
||||
|
||||
# Extension to add when the -x509 option is used.
|
||||
x509_extensions = v3_ca
|
||||
|
||||
[ req_distinguished_name ]
|
||||
# See <https://en.wikipedia.org/wiki/Certificate_signing_request>.
|
||||
countryName = KR
|
||||
stateOrProvinceName = Seoul
|
||||
localityName = seoul
|
||||
0.organizationName = SCOPE.Inc
|
||||
organizationalUnitName = SCOPE Lab
|
||||
commonName = SCOPE ICA (Lab)
|
||||
emailAddress = scopelab@scope.co.kr
|
||||
|
||||
# Optionally, specify some defaults.
|
||||
# countryName_default = TR
|
||||
# stateOrProvinceName_default = Istanbul
|
||||
# localityName_default = Istanbul
|
||||
# 0.organizationName_default = Safderun
|
||||
# organizationalUnitName_default = Safderun Intermediate CA
|
||||
# commonName_default = Safderun Intermediate CA
|
||||
# emailAddress_default = burakberkkeskin@gmail.com
|
||||
|
||||
[ v3_ca ]
|
||||
# Extensions for a typical CA (`man x509v3_config`).
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid:always,issuer
|
||||
basicConstraints = critical, CA:true
|
||||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
||||
|
||||
[ v3_intermediate_ca ]
|
||||
# Extensions for a typical intermediate CA (`man x509v3_config`).
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid:always,issuer
|
||||
basicConstraints = critical, CA:true, pathlen:0
|
||||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
||||
|
||||
[ usr_cert ]
|
||||
# Extensions for client certificates (`man x509v3_config`).
|
||||
basicConstraints = CA:FALSE
|
||||
nsCertType = client, email
|
||||
nsComment = "OpenSSL Generated Client Certificate"
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid,issuer
|
||||
keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
|
||||
extendedKeyUsage = clientAuth, emailProtection
|
||||
|
||||
[ server_cert ]
|
||||
# Extensions for server certificates (`man x509v3_config`).
|
||||
basicConstraints = CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "OpenSSL Generated Server Certificate"
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid,issuer:always
|
||||
keyUsage = critical, digitalSignature, keyEncipherment
|
||||
extendedKeyUsage = serverAuth
|
||||
|
||||
[ crl_ext ]
|
||||
# Extension for CRLs (`man x509v3_config`).
|
||||
authorityKeyIdentifier=keyid:always
|
||||
|
||||
[ ocsp ]
|
||||
# Extension for OCSP signing certificates (`man ocsp`).
|
||||
basicConstraints = CA:FALSE
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid,issuer
|
||||
keyUsage = critical, digitalSignature
|
||||
extendedKeyUsage = critical, OCSPSigning
|
16
certs/rootca/bootstrap.sh
Executable file
16
certs/rootca/bootstrap.sh
Executable file
@ -0,0 +1,16 @@
|
||||
#!/bin/bash
|
||||
|
||||
echo "Create $1 Host"
|
||||
|
||||
openssl genpkey -algorithm EC -out $1.key -pkeyopt ec_paramgen_curve:P-384 -pkeyopt ec_param_enc:named_curve
|
||||
|
||||
openssl req -x509 -new -days 730 -key $1.key -out $1.crt -config rootca.conf
|
||||
|
||||
openssl ec -in $1.key -pubout -out $1.pub
|
||||
|
||||
openssl x509 -in $1.crt -text -pubkey -noout
|
||||
|
||||
cat $1.pub
|
||||
|
||||
|
||||
# openssl req -x509 -days 3650 -new -key ${CANAME}.key -out ${CANAME}.crt -config rootca_openssl.conf
|
132
certs/rootca/rootca.conf
Normal file
132
certs/rootca/rootca.conf
Normal file
@ -0,0 +1,132 @@
|
||||
[ ca ]
|
||||
# `man ca`
|
||||
default_ca = CA_default
|
||||
|
||||
[ CA_default ]
|
||||
# Directory and file locations.
|
||||
# dir = /etc/ssl/localCA/rootCA
|
||||
# certs = $dir/certs
|
||||
# crl_dir = $dir/crl
|
||||
# new_certs_dir = $dir/newcerts
|
||||
# database = $dir/index.txt
|
||||
# serial = $dir/serial
|
||||
# RANDFILE = $dir/private/.rand
|
||||
|
||||
# # The root key and root certificate.
|
||||
# private_key = $dir/rootCA.key
|
||||
# certificate = $dir/rootCA.crt
|
||||
|
||||
# # For certificate revocation lists.
|
||||
# crlnumber = $dir/crlnumber
|
||||
# crl = $dir/crl/ca.crl.pem
|
||||
# crl_extensions = crl_ext
|
||||
# default_crl_days = 30
|
||||
|
||||
# SHA-1 is deprecated, so use SHA-2 instead.
|
||||
default_md = sha256
|
||||
|
||||
name_opt = ca_default
|
||||
cert_opt = ca_default
|
||||
default_days = 3650
|
||||
preserve = no
|
||||
policy = policy_strict
|
||||
|
||||
[ policy_strict ]
|
||||
# The root CA should only sign intermediate certificates that match.
|
||||
# See the POLICY FORMAT section of `man ca`.
|
||||
countryName = match
|
||||
stateOrProvinceName = match
|
||||
organizationName = match
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
[ policy_loose ]
|
||||
# Allow the intermediate CA to sign a more diverse range of certificates.
|
||||
# See the POLICY FORMAT section of the `ca` man page.
|
||||
countryName = optional
|
||||
stateOrProvinceName = optional
|
||||
localityName = optional
|
||||
organizationName = optional
|
||||
organizationalUnitName = optional
|
||||
commonName = supplied
|
||||
emailAddress = optional
|
||||
|
||||
[ req ]
|
||||
# Options for the `req` tool (`man req`).
|
||||
default_bits = 384
|
||||
distinguished_name = req_distinguished_name
|
||||
string_mask = utf8only
|
||||
prompt = no
|
||||
encrypt_key = no
|
||||
|
||||
# SHA-1 is deprecated, so use SHA-2 instead.
|
||||
default_md = sha256
|
||||
|
||||
# Extension to add when the -x509 option is used.
|
||||
req_extensions = v3_ca
|
||||
|
||||
[ req_distinguished_name ]
|
||||
# See <https://en.wikipedia.org/wiki/Certificate_signing_request>.
|
||||
countryName = KR
|
||||
stateOrProvinceName = Seoul
|
||||
localityName = seoul
|
||||
0.organizationName = SCOPE.Inc
|
||||
organizationalUnitName = SCOPE.Inc
|
||||
commonName = SCOPE Self Sign CA
|
||||
emailAddress = sos@scope.co.kr
|
||||
|
||||
# # Optionally, specify some defaults.
|
||||
# countryName_default = KR
|
||||
# stateOrProvinceName_default = Seoul
|
||||
# localityName_default = Seoul
|
||||
# 0.organizationName_default = SCOPE.Inc
|
||||
# organizationalUnitName_default = SCOPE.Inc
|
||||
# commonName_default = SCOPE Self Sign CA
|
||||
# emailAddress_default = sos@scope.co.kr
|
||||
|
||||
[ v3_ca ]
|
||||
# Extensions for a typical CA (`man x509v3_config`).
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid:always,issuer
|
||||
basicConstraints = critical, CA:true
|
||||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
||||
|
||||
[ v3_intermediate_ca ]
|
||||
# Extensions for a typical intermediate CA (`man x509v3_config`).
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid:always,issuer
|
||||
basicConstraints = critical, CA:true, pathlen:0
|
||||
keyUsage = critical, digitalSignature, cRLSign, keyCertSign
|
||||
|
||||
[ usr_cert ]
|
||||
# Extensions for client certificates (`man x509v3_config`).
|
||||
basicConstraints = CA:FALSE
|
||||
nsCertType = client, email
|
||||
nsComment = "OpenSSL Generated Client Certificate"
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid,issuer
|
||||
keyUsage = critical, nonRepudiation, digitalSignature, keyEncipherment
|
||||
extendedKeyUsage = clientAuth, emailProtection
|
||||
|
||||
[ server_cert ]
|
||||
# Extensions for server certificates (`man x509v3_config`).
|
||||
basicConstraints = CA:FALSE
|
||||
nsCertType = server
|
||||
nsComment = "OpenSSL Generated Server Certificate"
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid,issuer:always
|
||||
keyUsage = critical, digitalSignature, keyEncipherment
|
||||
extendedKeyUsage = serverAuth
|
||||
|
||||
[ crl_ext ]
|
||||
# Extension for CRLs (`man x509v3_config`).
|
||||
authorityKeyIdentifier=keyid:always
|
||||
|
||||
[ ocsp ]
|
||||
# Extension for OCSP signing certificates (`man ocsp`).
|
||||
basicConstraints = CA:FALSE
|
||||
subjectKeyIdentifier = hash
|
||||
authorityKeyIdentifier = keyid,issuer
|
||||
keyUsage = critical, digitalSignature
|
||||
extendedKeyUsage = critical, OCSPSigning
|
Loading…
Reference in New Issue
Block a user