ccheck

command module
v1.0.1 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Mar 19, 2020 License: GPL-2.0 Imports: 1 Imported by: 0

README

GoDoc Go Report Card Build Status

ccheck, simple X509 certificate checker with TAP output

This tool simplifies handling of PEM certificates. It allows for easy filtering of certificates based on the days until expiration. It's use is reminiscent of the grep utility.

It can produce Test Anything Protocol which makes this tool useful as part of test suites that deal with TLS certificate expiration.

Examples

Errors are sent to STDERR, the listing of certificates that satisfy the given criteria is sent to STDOUT but can be suppressed by using --quiet in the command line. TAP output is triggered by the --tap command line option.

TAP — Test Anything Protocol — support

TAP-formatted test results provide output that can be captured by more elaborate test suites:

$ ccheck --input-file certificate.list --tap --num-workers 6
1..0
not ok 1 - losmunoz.com:443 x509: certificate is valid for *.athena.pics, athena.pics, not losmunoz.com TLS
ok 2 - libertad.link:443 expires in 59 days (took 0.384 secs) TLS
ok 3 - esmtp.email:443 expires in 59 days (took 0.384 secs) TLS
ok 4 - lem.click:443 expires in 64 days (took 0.384 secs) TLS
ok 5 - lem.link:443 expires in 64 days (took 0.384 secs) TLS
ok 6 - quad.click:443 expires in 70 days (took 0.384 secs) TLS
ok 7 - google.com:443 expires in 58 days (took 0.181 secs) TLS
not ok 8 - cert/google-chain.pem certififcate is expired TLS
ok 9 - allaboutworms.com:443 expires in 39 days (took 0.291 secs) TLS
ok 10 - outlook.com:443 expires in 414 days (took 0.249 secs) TLS
ok 11 - tupsiquiatra.expert:443 expires in 59 days (took 0.276 secs) TLS
ok 12 - isipp.com:443 expires in 39 days (took 0.283 secs) TLS
ok 13 - suretymail.com:443 expires in 39 days (took 0.283 secs) TLS
1..13
JSON support

Output can be produced in JSON. Each spec provided in the command line will generate an entry in an array, with all available test information.

$ ccheck --json --starttls outlook.office365.com:110
[{"spec":"outlook.office365.com:110","result":{"success":true,"days_left":705,"cert":{"Raw":"MIIIszCCB5u⋯
⋮
Custom certificate expiration check

Check whether a given certificate will expire soon, or within 10,000 days as in this example. Also whether the certificate is valid for the DNS name provided, is applicable:

$ ccheck --min-days 10000 google.com:443 || echo The end is near
google.com:443: expires in 58 days, TLS
The end is near

Specifying 0 days with --min-days disables the expiration checking.

Certificate validation

By default, ccheck verifies that the certificate is valid for the domain name being used for testing. This can be disabled with the --skip-verify option:

$ ccheck losmunoz.com:443 || echo failed
losmunoz.com:443: x509: certificate is valid for *.athena.pics, athena.pics, not losmunoz.com, TLS
failed

$ ccheck --skip-verify losmunoz.com:443 || echo failed
losmunoz.com:443 TLS
Custom client certificate, custom Root CA processing

The --client-cert and --client-key allows for the specification of a custom client certificate pair.

$ ccheck --tap my.server:9990
1..0
not ok 1 - my.server:9990 remote error: tls: handshake failure TLS
exit status 2

$ ccheck --tap --client-cert client.crt --client-key client.pem my.server:9990
1..0
ok 1 - my.server:9990 expires in 117 days (took 0.059 secs) TLS

--root-certs allows for specifying custom root CA certificates for validation of the received server certificate.

$ ccheck --tap --root-certs my-custom-CA.crt www.google.com:443
1..0
not ok 1 - www.google.com:443 x509: certificate signed by unknown authority TLS
exit status 2
Certificates in local PEM files

Certificates can also be placed in local files:

$ ccheck ./cert/google-chain.pem && echo all is fine
./cert/google-chain.pem TLS
all is fine

The tests use a local copy of a current Google certificate chain. To quickly get an up-to-date copy, use the following command:

openssl s_client -connect google.com:443 -showcerts < /dev/null > google-chain.pem
STARTTLS certificate validation

When using the --starttls command line option, ccheck will assume a connection to an ESMTP server and fetch the TLS certificates after issuing the STARTTLS command to start a new TLS session. This is useful to test submission servers as in this example:

$ ccheck --num-workers 10 --tap --starttls smtp.outlook.com:587 smtp.gmail.com:587 mx.libertad.link:587 mail.gmx.com:587
TAP version 13
ok 1 - smtp.gmail.com:587 expires in 63 days (took 0.820 secs) TLS
ok 2 - mx.libertad.link:587 expires in 46 days (took 1.837 secs) TLS
ok 3 - mail.gmx.com:587 expires in 446 days (took 2.499 secs) TLS
ok 4 - smtp.outlook.com:587 expires in 726 days (took 5.841 secs) TLS
1..4
PostgreSQL certificate validation

The --postgres command line flag instructs ccheck to treat the connection coordinates as the hostname and port number of a PostgreSQL database server. It then attempts a connection and uses the native line protocol to start a TLS session in which the server certificates are obtained and tested:

$ ccheck --tap --postgres babar.elephantsql.com:5432
TAP version 13
not ok 1 - babar.elephantsql.com:5432 x509: certificate is valid for ip-10-164-15-12.ec2.internal, not babar.elephantsql.com Pg
1..1

In the case above, the TLS certificate does not match the host name, so normal validation fails. If you're simply interested in checking the expiration date, you can add the --skip-verify flag as follows:

$ ccheck --tap --skip-verify --postgres babar.elephantsql.com:5432
TAP version 13
ok 1 - babar.elephantsql.com:5432 expires in 1647 days (took 0.427 secs) Pg
1..1
Dump certificate chain

The chain command provides a friendly text representation of the certificate chain sent by the TLS server, helpful for auditing certificate lineage.

$ ccheck chain www.google.com:443
* spec www.google.com:443
  [chain 0]
    [cert 0.0]
      Subject: CN=www.google.com,O=Google LLC,L=Mountain View,ST=California,C=US
      Issuer: CN=Google Internet Authority G3,O=Google Trust Services,C=US
      Serial: 126424242915129058616365655790524652180
      Dates: 2019-04-16 09:58:34 +0000 UTC to 2019-07-09 09:52:00 +0000 UTC
      Signature Algorithm: SHA256-RSA
      CA: false
        DNS: www.google.com
    [cert 0.1]
      Subject: CN=Google Internet Authority G3,O=Google Trust Services,C=US
      Issuer: CN=GlobalSign,OU=GlobalSign Root CA - R2,O=GlobalSign
      Serial: 149685795415515161014990164765
      Dates: 2017-06-15 00:00:42 +0000 UTC to 2021-12-15 00:00:42 +0000 UTC
      Signature Algorithm: SHA256-RSA
      CA: true
    [cert 0.2]
      Subject: CN=GlobalSign,OU=GlobalSign Root CA - R2,O=GlobalSign
      Issuer: CN=GlobalSign,OU=GlobalSign Root CA - R2,O=GlobalSign
      Serial: 4835703278459682885658125
      Dates: 2006-12-15 08:00:00 +0000 UTC to 2021-12-15 08:00:00 +0000 UTC
      Signature Algorithm: SHA1-RSA
      CA: true
Specify list of certificates to check via a file

To ease testing, a list of certificate specs can be placed on a file:

$ ccheck --input-file certificate.list
lem.click:443 TLS
lem.link:443 TLS
losmunoz.com:443: x509: certificate is valid for *.athena.pics, athena.pics, not losmunoz.com TLS
quad.click:443 TLS
esmtp.email:443 TLS
libertad.link:443 TLS
allaboutworms.com:443 TLS
google.com:443 TLS
isipp.com:443 TLS
outlook.com:443 TLS
suretymail.com:443 TLS
tupsiquiatra.expert:443 TLS
cert/google-chain.pem TLS
Parallel checks for faster processing

Checks can be made in parallel, using the --num-workers command line option. See the difference.

$ time ccheck -i certificate.list > /dev/null

real	0m2.348s
user	0m0.092s
sys	0m0.029s

$ time ccheck -i certificate.list --num-workers 6 > /dev/null

real	0m0.595s
user	0m0.092s
sys	0m0.026s
Munin plugin mode

By simply adding a symbolic link from your /etc/munin/plugins directory to ccheck, a configuration file can take care of checking all your certificates with a handy graph and email when expiration – or an error – shows up. See the accompanying ccheck-munin.conf file for more information on how to configure your automatic tests.

ccheck detects it's being run by munin-node by looking for the MUNIN_VERSION environment variable.

Documentation

The Go Gopher

There is no documentation for this package.

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL