restish
restish copied to clipboard
Make it possible to use a client certificate stored in hardware
This has been tested with a Yubikey and the OpenSC PKCS#11 interface on Linux.
Hello @danielgtaylor . This is something we need at Exoscale, and we wanted to show it to you and see what you think. The fact that it pulls in code that needs cgo is unfortunate but more or less unavoidable for how PKCS#11 plugins work.
If that's a deal breaker we'll see what we can do about it. One possibility is to put the pkcs11 stuff into a separate binary (in a separate repo) called "pkcs11-interface", which would talk to restish (and other systems) via i/o on stdio.
I plan to send in some kind of fix for the Windows build failure. The proposed pkcs11-interface would fix Windows as well.
@jeffallen thanks for the PR. I have to admit I'm not familiar with this plugin system and how it works. Given most users install from homebrew or binaries I'm not too worried about adding cgo, but I do like the idea of a plugin similar to how we can currently shell out for custom auth scripts. I'll have to read up on this a bit and figure out how I can test it out.
Codecov Report
Attention: Patch coverage is 0% with 33 lines in your changes are missing coverage. Please review.
Project coverage is 76.18%. Comparing base (
d16bdd7) to head (4875cdb).
:exclamation: Current head 4875cdb differs from pull request most recent head 4c2b845. Consider uploading reports for the commit 4c2b845 to get more accurate results
Additional details and impacted files
@@ Coverage Diff @@
## main #246 +/- ##
==========================================
- Coverage 76.86% 76.18% -0.69%
==========================================
Files 26 26
Lines 3679 3712 +33
==========================================
Hits 2828 2828
- Misses 643 675 +32
- Partials 208 209 +1
| Files | Coverage Δ | |
|---|---|---|
| cli/apiconfig.go | 83.87% <ø> (ø) |
|
| cli/request.go | 60.53% <0.00%> (-7.51%) |
:arrow_down: |
Continue to review full report in Codecov by Sentry.
Legend - Click here to learn more
Δ = absolute <relative> (impact),ø = not affected,? = missing dataPowered by Codecov. Last update d16bdd7...4c2b845. Read the comment docs.
FYI, the upgrade to Go 1.22.2 fixed the Windows build error: https://github.com/exoscale/restish/actions/runs/8784557557
@jeffallen sorry for the delay! This was not the easiest change to test! I finally had a chance to get this working locally and test it out. Here are the steps for anyone who is interested (and probably my future self if we're being honest):
- Get a hardware security dongle like a Yubikey (thank you to Exoscale for sending me one). Install & open the Yubikey Manager. Generate a certificate via Applications → PIV → Certificates → Authentication (Slot 9a) → Generate, then export & save as
client-pub.pem. Issuer and subject can just betest. The default pin is 123456. - Install OpenSC: https://github.com/OpenSC/OpenSC/wiki/macOS-Quick-Start. This will provide the required library to talk to the Yubikey to sign requests with the private on-device key.
- Run OpenSSL to generate a self-signed server certificate for SSL. We don't really care about this but it's required to run the server via TLS.
$ openssl req -newkey rsa:2048 \ -new -nodes -x509 \ -days 3650 \ -out cert.pem \ -keyout key.pem \ -subj "/C=US/ST=California/L=Mountain View/O=Your Organization/OU=Your Unit/CN=localhost" - Write a simple Go server with TLS that requires a client cert. Something like this saved in
main.go:package main import ( "crypto/tls" "crypto/x509" "io" "io/ioutil" "log" "net/http" ) func helloHandler(w http.ResponseWriter, r *http.Request) { // Write "Hello, world!" to the response body io.WriteString(w, "Hello, world!\n") } func main() { // Set up a /hello resource handler http.HandleFunc("/hello", helloHandler) // Create a CA certificate pool and add the client's public key to it. caCert, err := ioutil.ReadFile("client-pub.pem") if err != nil { log.Fatal(err) } caCertPool := x509.NewCertPool() caCertPool.AppendCertsFromPEM(caCert) // Create the TLS Config with the CA pool and enable Client certificate validation tlsConfig := &tls.Config{ ClientCAs: caCertPool, ClientAuth: tls.RequireAndVerifyClientCert, } tlsConfig.BuildNameToCertificate() // Create a Server instance to listen on port 8443 with the TLS config server := &http.Server{ Addr: ":8443", TLSConfig: tlsConfig, } // Listen to HTTPS connections with the server certificate and wait log.Fatal(server.ListenAndServeTLS("cert.pem", "key.pem")) } - Run the server:
go run . - Set up a config in Restish for testing so that it loads the
opensc-pkcs11.so(userestish api edit):"local8443": { "base": "https://localhost:8443", "profiles": { "default": {} }, "tls": { "ca_cert": "", "cert": "", "insecure": false, "key": "", "pkcs11": { "path": "/Library/OpenSC/lib/opensc-pkcs11.so", "label": "test" } } }, - Check out this PR (or a future release of Restish), then run the following. Note we'll use
--rsh-insecureto ignore the fact that the server's certificate is self-signed, otherwise Restish would refuse to continue because it doesn't trust the server. This option has no impact on client certs.$ cd src/restish $ gh pr checkout 246 $ go install $ export PKCS11_PIN=123456 $ restish --rsh-insecure https://localhost:8443/hello
Here are the results:
- Without any Restish config (i.e. no PKCS11 client cert set up)
ERROR: Caught error: Get "https://localhost:8443/hello": remote error: tls: certificate required - With the config, but without the Yubikey inserted:
ERROR: Caught error: Get "https://localhost:8443/hello": could not find PKCS#11 token - With the config, with the Yubikey:
WARN: Disabling TLS security checks HTTP/2.0 200 OK Content-Length: 14 Content-Type: text/plain; charset=utf-8 Date: Wed, 29 May 2024 05:31:56 GMT Hello, world!
Success! Thanks for the work on this. :+1: