mirror of
https://github.com/adulau/crl-monitor.git
synced 2024-11-22 18:17:07 +00:00
89 lines
3.1 KiB
Python
89 lines
3.1 KiB
Python
#!/usr/bin/env python
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
# Tool to parse output of ssldump (not compiled with OpenSSL) to dump raw certificate
|
|
#
|
|
# Software is free software released under the GNU General Public License version 3 and later
|
|
#
|
|
# Copyright (c) 2015 Alexandre Dulaunoy - a@foo.be
|
|
|
|
import fileinput
|
|
import re
|
|
import binascii
|
|
import OpenSSL
|
|
import argparse
|
|
import json
|
|
import base64
|
|
|
|
argParser = argparse.ArgumentParser(description='Extract certificate to PEM format from an ssldump output')
|
|
argParser.add_argument('-v', default=False, action='store_true', help='Verbose output')
|
|
argParser.add_argument('-f', default=False, action='store_true', help='CSV format - IP, certificate fingerprint, CN (scans.io host format)')
|
|
argParser.add_argument('-s', default=False, action='store_true', help='CSV format - certificate fingerprint, base64 DER encoded certificate (scans.io certs format)')
|
|
argParser.add_argument('-j', default=False, action='store_true', help='Dump JSON object per certificate')
|
|
argParser.add_argument('-r', default='-', help='Read from a file, default is stdin')
|
|
args = argParser.parse_args()
|
|
|
|
cert = None
|
|
certstring = ""
|
|
c = {}
|
|
certtag = re.compile('^\s+Certificate\s*$')
|
|
certtagend = re.compile('^\S+')
|
|
ipv4re = '\d+\.\d+\.\d+\.\d+'
|
|
flowre = 'New TCP connection #(\d+): ('+ipv4re+')\(\d+\) <-> ('+ipv4re+')\((\d+)\)'
|
|
flow = re.compile(flowre)
|
|
for l in fileinput.input(args.r):
|
|
if certtag.match(l):
|
|
cert = True
|
|
continue
|
|
elif certtagend.match(l):
|
|
cert = None
|
|
if flow.search(l):
|
|
m = flow.match(l)
|
|
if m is not None:
|
|
c['session'] = m.group(1)
|
|
c['srcip'] = m.group(2)
|
|
c['dstip'] = m.group(3)
|
|
c['dstport'] = m.group(4)
|
|
|
|
if (cert is True):
|
|
certstring += l.rstrip('\n')
|
|
|
|
if ((cert is None) and (len(certstring) > 0)):
|
|
y = re.sub(" ", "", certstring).split('=')
|
|
a = y[1].split('certificate')[0]
|
|
try:
|
|
dercert = binascii.unhexlify(a)
|
|
except TypeError:
|
|
continue
|
|
try:
|
|
x509 = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_ASN1, dercert)
|
|
except OpenSSL.crypto.Error:
|
|
continue
|
|
|
|
c['fp'] = x509.digest('sha1').replace(':','').lower()
|
|
if args.v:
|
|
print "("+c['session']+") "+c['srcip']+"<->"+c['dstip']+":"+c['dstport']
|
|
Issuer = x509.get_issuer().CN
|
|
if Issuer is not None:
|
|
print "Issuer: "+ Issuer
|
|
else:
|
|
print "Issuer: None"
|
|
CN = x509.get_subject().CN
|
|
if CN is not None:
|
|
print "CN: "+ CN
|
|
else:
|
|
print "Issuer: None"
|
|
c['pem'] = OpenSSL.crypto.dump_certificate(OpenSSL.crypto.FILETYPE_PEM, x509)
|
|
if args.j:
|
|
print (json.dumps(c))
|
|
elif args.f:
|
|
subject = x509.get_subject().CN
|
|
if subject is None:
|
|
subject = ""
|
|
print (c['dstip']+","+c['fp']+","+subject)
|
|
elif args.s:
|
|
print (c['fp']+","+base64.standard_b64encode(dercert))
|
|
else:
|
|
print (c['pem'])
|
|
certstring = ""
|
|
y = ""
|