""" Trivial RPKI up-down protocol client, for testing. Configuration file is YAML to be compatable with APNIC rpki_poke.pl tool. Usage: python testpoke.py [ { -y | --yaml } configfile ] [ { -r | --request } requestname ] [ { -d | --debug } ] [ { -h | --help } ] Default configuration file is testpoke.yaml, override with --yaml option. $Id$ Copyright (C) 2010--2012 Internet Systems Consortium ("ISC") Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND ISC DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ISC BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Portions copyright (C) 2007--2008 American Registry for Internet Numbers ("ARIN") Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED "AS IS" AND ARIN DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL ARIN BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. """ import os, time, getopt, sys, yaml import rpki.resource_set, rpki.up_down, rpki.left_right, rpki.x509 import rpki.http, rpki.config, rpki.exceptions import rpki.relaxng, rpki.oids, rpki.log, rpki.async os.environ["TZ"] = "UTC" time.tzset() def usage(code): print __doc__ sys.exit(code) yaml_file = "testpoke.yaml" yaml_cmd = None debug = False opts, argv = getopt.getopt(sys.argv[1:], "y:r:h?d", ["yaml=", "request=", "help", "debug"]) for o, a in opts: if o in ("-h", "--help", "-?"): usage(0) elif o in ("-y", "--yaml"): yaml_file = a elif o in ("-r", "--request"): yaml_cmd = a elif o in ("-d", "--debug"): debug = True if argv: usage(1) rpki.log.init("testpoke") if debug: rpki.log.set_trace(True) f = open(yaml_file) yaml_data = yaml.load(f) f.close() if yaml_cmd is None and len(yaml_data["requests"]) == 1: yaml_cmd = yaml_data["requests"].keys()[0] if yaml_cmd is None: usage(1) yaml_req = yaml_data["requests"][yaml_cmd] def get_PEM(name, cls, y = yaml_data): if name in y: return cls(PEM = y[name]) if name + "-file" in y: return cls(PEM_file = y[name + "-file"]) return None def get_PEM_chain(name, cert = None): chain = [] if cert is not None: chain.append(cert) if name in yaml_data: chain.extend([rpki.x509.X509(PEM = x) for x in yaml_data[name]]) elif name + "-file" in yaml_data: chain.extend([rpki.x509.X509(PEM_file = x) for x in yaml_data[name + "-file"]]) return chain def query_up_down(q_pdu): q_msg = rpki.up_down.message_pdu.make_query( payload = q_pdu, sender = yaml_data["sender-id"], recipient = yaml_data["recipient-id"]) q_der = rpki.up_down.cms_msg().wrap(q_msg, cms_key, cms_certs, cms_crl) def done(r_der): global last_cms_timestamp r_cms = rpki.up_down.cms_msg(DER = r_der) r_msg = r_cms.unwrap([cms_ta] + cms_ca_certs) last_cms_timestamp = r_cms.check_replay(last_cms_timestamp) print r_cms.pretty_print_content() try: r_msg.payload.check_response() except (rpki.async.ExitNow, SystemExit): raise except Exception, e: fail(e) rpki.http.want_persistent_client = False rpki.http.client( msg = q_der, url = yaml_data["posturl"], callback = done, errback = fail) def do_list(): query_up_down(rpki.up_down.list_pdu()) def do_issue(): q_pdu = rpki.up_down.issue_pdu() req_key = get_PEM("cert-request-key", rpki.x509.RSA, yaml_req) or cms_key q_pdu.class_name = yaml_req["class"] q_pdu.pkcs10 = rpki.x509.PKCS10.create( keypair = req_key, is_ca = True, caRepository = yaml_req["sia"][0], rpkiManifest = yaml_req["sia"][0] + req_key.gSKI() + ".mft") query_up_down(q_pdu) def do_revoke(): q_pdu = rpki.up_down.revoke_pdu() q_pdu.class_name = yaml_req["class"] q_pdu.ski = yaml_req["ski"] query_up_down(q_pdu) dispatch = { "list" : do_list, "issue" : do_issue, "revoke" : do_revoke } def fail(e): # pylint: disable=W0621 rpki.log.traceback(debug) sys.exit("Testpoke failed: %s" % e) cms_ta = get_PEM("cms-ca-cert", rpki.x509.X509) cms_cert = get_PEM("cms-cert", rpki.x509.X509) cms_key
# Automatically generated, do not edit.
[ ca ]
default_ca = ca_default
[ ca_default ]
certificate = ISP4.cer
serial = ISP4/serial
private_key = ISP4.key
database = ISP4/index
new_certs_dir = ISP4
name_opt = ca_default
cert_opt = ca_default
default_days = 365
default_crl_days = 30
default_md = sha256
preserve = no
copy_extensions = copy
policy = ca_policy_anything
unique_subject = no
x509_extensions = ca_x509_ext
crl_extensions = crl_x509_ext
[ ca_policy_anything ]
countryName = optional
stateOrProvinceName = optional
localityName = optional
organizationName = optional
organizationalUnitName = optional
commonName = supplied
emailAddress = optional
givenName = optional
surname = optional
[ req ]
default_bits = 2048
encrypt_key = no
distinguished_name = req_dn
req_extensions = req_x509_ext
prompt = no
[ req_dn ]
CN = TEST ENTITY ISP4
[ req_x509_ext ]
basicConstraints = critical,CA:true
subjectKeyIdentifier = hash
keyUsage = critical,keyCertSign,cRLSign
subjectInfoAccess = 1.3.6.1.5.5.7.48.5;URI:rsync://wombats-r-us.hactrn.net/ISP4/
authorityInfoAccess = caIssuers;URI:rsync://wombats-r-us.hactrn.net/LIR2.cer
sbgp-autonomousSysNum = critical,AS:64544
sbgp-ipAddrBlock = critical,IPv6:2001:db8::10:0:44/128
[ ca_x509_ext ]
basicConstraints = critical,CA:true
authorityKeyIdentifier = keyid:always
keyUsage = critical,keyCertSign,cRLSign
subjectInfoAccess = 1.3.6.1.5.5.7.48.5;URI:rsync://wombats-r-us.hactrn.net/ISP4/
authorityInfoAccess = caIssuers;URI:rsync://wombats-r-us.hactrn.net/LIR2.cer
sbgp-autonomousSysNum = critical,AS:64544
sbgp-ipAddrBlock = critical,IPv6:2001:db8::10:0:44/128
[ crl_x509_ext ]
authorityKeyIdentifier = keyid:always