Skip to content

Commit fd8c79d

Browse files
Hannes-Magnusson-CKtargos
authored andcommitted
crypto: add docs & tests for cert.pubkey & cert.fingerprint256
Include example on how to pin certificate and/or public key PR-URL: #17690 Reviewed-By: James M Snell <[email protected]> Reviewed-By: Ben Noordhuis <[email protected]> Reviewed-By: Ruben Bridgewater <[email protected]>
1 parent 2331267 commit fd8c79d

File tree

3 files changed

+125
-2
lines changed

3 files changed

+125
-2
lines changed

doc/api/https.md

+93
Original file line numberDiff line numberDiff line change
@@ -253,6 +253,99 @@ const req = https.request(options, (res) => {
253253
});
254254
```
255255

256+
Example pinning on certificate fingerprint, or the public key (similar to
257+
`pin-sha256`):
258+
259+
```js
260+
const tls = require('tls');
261+
const https = require('https');
262+
const crypto = require('crypto');
263+
264+
function sha256(s) {
265+
return crypto.createHash('sha256').update(s).digest('base64');
266+
}
267+
const options = {
268+
hostname: 'github.com',
269+
port: 443,
270+
path: '/',
271+
method: 'GET',
272+
checkServerIdentity: function(host, cert) {
273+
// Make sure the certificate is issued to the host we are connected to
274+
const err = tls.checkServerIdentity(host, cert);
275+
if (err) {
276+
return err;
277+
}
278+
279+
// Pin the public key, similar to HPKP pin-sha25 pinning
280+
const pubkey256 = 'pL1+qb9HTMRZJmuC/bB/ZI9d302BYrrqiVuRyW+DGrU=';
281+
if (sha256(cert.pubkey) !== pubkey256) {
282+
const msg = 'Certificate verification error: ' +
283+
`The public key of '${cert.subject.CN}' ` +
284+
'does not match our pinned fingerprint';
285+
return new Error(msg);
286+
}
287+
288+
// Pin the exact certificate, rather then the pub key
289+
const cert256 = '25:FE:39:32:D9:63:8C:8A:FC:A1:9A:29:87:' +
290+
'D8:3E:4C:1D:98:DB:71:E4:1A:48:03:98:EA:22:6A:BD:8B:93:16';
291+
if (cert.fingerprint256 !== cert256) {
292+
const msg = 'Certificate verification error: ' +
293+
`The certificate of '${cert.subject.CN}' ` +
294+
'does not match our pinned fingerprint';
295+
return new Error(msg);
296+
}
297+
298+
// This loop is informational only.
299+
// Print the certificate and public key fingerprints of all certs in the
300+
// chain. Its common to pin the public key of the issuer on the public
301+
// internet, while pinning the public key of the service in sensitive
302+
// environments.
303+
do {
304+
console.log('Subject Common Name:', cert.subject.CN);
305+
console.log(' Certificate SHA256 fingerprint:', cert.fingerprint256);
306+
307+
hash = crypto.createHash('sha256');
308+
console.log(' Public key ping-sha256:', sha256(cert.pubkey));
309+
310+
lastprint256 = cert.fingerprint256;
311+
cert = cert.issuerCertificate;
312+
} while (cert.fingerprint256 !== lastprint256);
313+
314+
},
315+
};
316+
317+
options.agent = new https.Agent(options);
318+
const req = https.request(options, (res) => {
319+
console.log('All OK. Server matched our pinned cert or public key');
320+
console.log('statusCode:', res.statusCode);
321+
// Print the HPKP values
322+
console.log('headers:', res.headers['public-key-pins']);
323+
324+
res.on('data', (d) => {});
325+
});
326+
327+
req.on('error', (e) => {
328+
console.error(e.message);
329+
});
330+
req.end();
331+
332+
```
333+
Outputs for example:
334+
```text
335+
Subject Common Name: github.com
336+
Certificate SHA256 fingerprint: 25:FE:39:32:D9:63:8C:8A:FC:A1:9A:29:87:D8:3E:4C:1D:98:DB:71:E4:1A:48:03:98:EA:22:6A:BD:8B:93:16
337+
Public key ping-sha256: pL1+qb9HTMRZJmuC/bB/ZI9d302BYrrqiVuRyW+DGrU=
338+
Subject Common Name: DigiCert SHA2 Extended Validation Server CA
339+
Certificate SHA256 fingerprint: 40:3E:06:2A:26:53:05:91:13:28:5B:AF:80:A0:D4:AE:42:2C:84:8C:9F:78:FA:D0:1F:C9:4B:C5:B8:7F:EF:1A
340+
Public key ping-sha256: RRM1dGqnDFsCJXBTHky16vi1obOlCgFFn/yOhI/y+ho=
341+
Subject Common Name: DigiCert High Assurance EV Root CA
342+
Certificate SHA256 fingerprint: 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF
343+
Public key ping-sha256: WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18=
344+
All OK. Server matched our pinned cert or public key
345+
statusCode: 200
346+
headers: max-age=0; pin-sha256="WoiWRyIOVNa9ihaBciRSC7XHjliYS9VwUGOIud4PB18="; pin-sha256="RRM1dGqnDFsCJXBTHky16vi1obOlCgFFn/yOhI/y+ho="; pin-sha256="k2v657xBsOVe1PQRwOsHsw3bsGT2VzIqz5K+59sNQws="; pin-sha256="K87oWBWM9UZfyddvDfoxL+8lpNyoUB2ptGtn0fv6G2Q="; pin-sha256="IQBnNBEiFuhj+8x6X8XLgh01V9Ic5/V3IRQLNFFc7v4="; pin-sha256="iie1VXtL7HzAMF+/PVPR9xzT80kQxdZeJ+zduCB3uj0="; pin-sha256="LvRiGEjRqfzurezaWuj8Wie2gyHMrW5Q06LspMnox7A="; includeSubDomains
347+
```
348+
256349
[`Agent`]: #https_class_https_agent
257350
[`URL`]: url.html#url_the_whatwg_url_api
258351
[`http.Agent`]: http.html#http_class_http_agent

doc/api/tls.md

+5-1
Original file line numberDiff line numberDiff line change
@@ -635,9 +635,11 @@ For example:
635635
issuerCertificate:
636636
{ ... another certificate, possibly with a .issuerCertificate ... },
637637
raw: < RAW DER buffer >,
638+
pubkey: < RAW DER buffer >,
638639
valid_from: 'Nov 11 09:52:22 2009 GMT',
639640
valid_to: 'Nov 6 09:52:22 2029 GMT',
640641
fingerprint: '2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF',
642+
fingerprint256: '2A:7A:C2:DD:E5:F9:CC:53:72:35:99:7A:02:5A:71:38:52:EC:8A:DF:00:11:22:33:44:55:66:77:88:99:AA:BB',
641643
serialNumber: 'B9B0D332A1AA5635' }
642644
```
643645

@@ -820,12 +822,14 @@ similar to:
820822
'OCSP - URI': [ 'http://ocsp.comodoca.com' ] },
821823
modulus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
822824
exponent: '0x10001',
825+
pubkey: <Buffer ... >,
823826
valid_from: 'Aug 14 00:00:00 2017 GMT',
824827
valid_to: 'Nov 20 23:59:59 2019 GMT',
825828
fingerprint: '01:02:59:D9:C3:D2:0D:08:F7:82:4E:44:A4:B4:53:C5:E2:3A:87:4D',
829+
fingerprint256: '69:AE:1A:6A:D4:3D:C6:C1:1B:EA:C6:23:DE:BA:2A:14:62:62:93:5C:7A:EA:06:41:9B:0B:BC:87:CE:48:4E:02',
826830
ext_key_usage: [ '1.3.6.1.5.5.7.3.1', '1.3.6.1.5.5.7.3.2' ],
827831
serialNumber: '66593D57F20CBC573E433381B5FEC280',
828-
raw: <Buffer ....> }
832+
raw: <Buffer ... > }
829833
```
830834

831835
## tls.connect(options[, callback])

test/parallel/test-tls-peer-certificate.js

+27-1
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,23 @@
2020
// USE OR OTHER DEALINGS IN THE SOFTWARE.
2121

2222
'use strict';
23-
require('../common');
23+
const common = require('../common');
2424
const fixtures = require('../common/fixtures');
25+
if (!common.hasCrypto) {
26+
common.skip('missing crypto');
27+
}
28+
const crypto = require('crypto');
2529

2630
// Verify that detailed getPeerCertificate() return value has all certs.
2731

2832
const {
2933
assert, connect, debug, keys
3034
} = require(fixtures.path('tls-connect'));
3135

36+
function sha256(s) {
37+
return crypto.createHash('sha256').update(s);
38+
}
39+
3240
connect({
3341
client: { rejectUnauthorized: false },
3442
server: keys.agent1,
@@ -49,6 +57,24 @@ connect({
4957
peerCert.fingerprint,
5058
'8D:06:3A:B3:E5:8B:85:29:72:4F:7D:1B:54:CD:95:19:3C:EF:6F:AA'
5159
);
60+
assert.strictEqual(
61+
peerCert.fingerprint256,
62+
'A1:DC:01:1A:EC:A3:7B:86:A8:C2:3E:26:9F:EB:EE:5C:A9:3B:BE:06' +
63+
':4C:A4:00:53:93:A9:66:07:A7:BC:13:32'
64+
);
65+
66+
// SHA256 fingerprint of the public key
67+
assert.strictEqual(
68+
sha256(peerCert.pubkey).digest('hex'),
69+
'fa5152e4407bad1e7537ef5bfc3f19fa9a62ee04432fd75e109b1803704c31ba'
70+
);
71+
72+
// HPKP / RFC7469 "pin-sha256" of the public key
73+
assert.strictEqual(
74+
sha256(peerCert.pubkey).digest('base64'),
75+
'+lFS5EB7rR51N+9b/D8Z+ppi7gRDL9deEJsYA3BMMbo='
76+
);
77+
5278
assert.deepStrictEqual(peerCert.infoAccess['OCSP - URI'],
5379
[ 'http://ocsp.nodejs.org/' ]);
5480

0 commit comments

Comments
 (0)