2024-02-23 08:09:14 +00:00
|
|
|
#!python3
|
|
|
|
"""
|
|
|
|
Return the Akamai property and version for a given site
|
|
|
|
"""
|
|
|
|
import argparse
|
|
|
|
import socket
|
|
|
|
import ssl
|
|
|
|
import sys
|
2024-02-27 15:43:51 +00:00
|
|
|
import urllib.error
|
2024-02-23 08:09:14 +00:00
|
|
|
from typing import Any
|
|
|
|
from urllib.parse import urlparse
|
|
|
|
|
2024-02-27 15:43:51 +00:00
|
|
|
from cert_chain_resolver.api import CertificateChain, resolve
|
2024-02-23 08:09:14 +00:00
|
|
|
from cryptography import x509
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
2024-02-27 11:17:49 +00:00
|
|
|
from cryptography.hazmat.primitives import hashes
|
2024-02-23 08:09:14 +00:00
|
|
|
from tabulate import tabulate
|
|
|
|
|
|
|
|
SAN_GROUPING = 4
|
|
|
|
|
|
|
|
|
2024-02-27 15:43:51 +00:00
|
|
|
def format_fingerprint(fingerprint: bytes | str) -> str:
|
|
|
|
"""
|
|
|
|
Print a fingerprint as a colon-separated hex string
|
|
|
|
|
|
|
|
Args:
|
|
|
|
fingerprint (bytes | str): fingerprint to format
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
str: formatted fingerprint
|
|
|
|
"""
|
|
|
|
if isinstance(fingerprint, str):
|
|
|
|
fingerprint = bytearray.fromhex(fingerprint)
|
|
|
|
return ":".join([format(i, "02x") for i in fingerprint])
|
|
|
|
|
|
|
|
|
2024-02-23 08:09:14 +00:00
|
|
|
def display_error(
|
|
|
|
site: str,
|
|
|
|
error: Any = None,
|
|
|
|
) -> None:
|
|
|
|
"""
|
|
|
|
Print a generic error
|
|
|
|
"""
|
|
|
|
print(f"ERROR: Could not find a certificate for {site}")
|
|
|
|
if error:
|
|
|
|
print(str(error))
|
|
|
|
|
|
|
|
|
|
|
|
if __name__ == "__main__":
|
|
|
|
|
|
|
|
def parseargs() -> argparse.Namespace:
|
|
|
|
"""
|
|
|
|
Parse the CLI
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
argparse.Namespace: parsed arguments
|
|
|
|
"""
|
|
|
|
parser = argparse.ArgumentParser()
|
|
|
|
|
|
|
|
parser.add_argument("site", help="site to lookup")
|
|
|
|
|
|
|
|
return parser.parse_args()
|
|
|
|
|
|
|
|
def main() -> int:
|
|
|
|
"""
|
|
|
|
Main entrypoint
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
int: return value
|
|
|
|
"""
|
|
|
|
args = parseargs()
|
|
|
|
|
2024-02-27 15:43:51 +00:00
|
|
|
url = args.site
|
|
|
|
if "://" not in url:
|
|
|
|
url = f"https://{url}"
|
|
|
|
|
2024-02-23 08:09:14 +00:00
|
|
|
parts = urlparse(args.site, scheme="https")
|
|
|
|
|
|
|
|
if not parts.netloc:
|
|
|
|
parts = parts._replace(netloc=args.site)
|
|
|
|
|
|
|
|
if not parts.port:
|
|
|
|
parts = parts._replace(netloc=f"{parts.netloc}:443")
|
|
|
|
|
|
|
|
if not parts.hostname or not parts.port:
|
|
|
|
display_error(args.site, "Cannot parse hostname")
|
|
|
|
return 1
|
|
|
|
|
|
|
|
endpoint = f"{parts.hostname}:{parts.port}"
|
|
|
|
|
|
|
|
try:
|
|
|
|
pem_data = ssl.get_server_certificate(
|
|
|
|
(parts.hostname, parts.port),
|
2024-02-27 15:43:51 +00:00
|
|
|
timeout=10,
|
2024-02-23 08:09:14 +00:00
|
|
|
).encode("utf-8")
|
2024-02-27 15:43:51 +00:00
|
|
|
|
|
|
|
cert_chain = CertificateChain()
|
|
|
|
try:
|
|
|
|
cert_chain = resolve(pem_data)
|
|
|
|
except urllib.error.URLError:
|
|
|
|
pass
|
|
|
|
|
2024-02-23 08:09:14 +00:00
|
|
|
except (
|
|
|
|
ConnectionRefusedError,
|
|
|
|
ssl.CertificateError,
|
|
|
|
ssl.SSLError,
|
|
|
|
socket.gaierror,
|
2024-02-28 10:39:39 +00:00
|
|
|
TimeoutError,
|
2024-02-23 08:09:14 +00:00
|
|
|
) as error:
|
|
|
|
display_error(endpoint, error)
|
|
|
|
return 2
|
|
|
|
|
|
|
|
if not pem_data:
|
|
|
|
display_error(endpoint, "Cannot fetch PEM data")
|
|
|
|
return 3
|
|
|
|
|
|
|
|
cert = x509.load_pem_x509_certificate(pem_data, default_backend())
|
|
|
|
|
|
|
|
sans = [
|
|
|
|
f"DNS:{dns}"
|
|
|
|
for dns in cert.extensions.get_extension_for_class(
|
|
|
|
x509.SubjectAlternativeName
|
|
|
|
).value.get_values_for_type(x509.DNSName)
|
|
|
|
]
|
|
|
|
sans.extend(
|
|
|
|
[
|
|
|
|
f"IP:{ip}"
|
|
|
|
for ip in cert.extensions.get_extension_for_class(
|
|
|
|
x509.SubjectAlternativeName
|
|
|
|
).value.get_values_for_type(x509.IPAddress)
|
|
|
|
]
|
|
|
|
)
|
|
|
|
|
|
|
|
sangroups = [
|
|
|
|
sans[group : group + SAN_GROUPING]
|
|
|
|
for group in range(0, len(sans), SAN_GROUPING)
|
|
|
|
]
|
|
|
|
|
|
|
|
table = [
|
|
|
|
["Common name", cert.subject.rfc4514_string()],
|
|
|
|
["SANs", tabulate(sangroups, tablefmt="plain")],
|
|
|
|
["Valid from", cert.not_valid_before_utc],
|
|
|
|
["Valid to", cert.not_valid_after_utc],
|
|
|
|
["Issuer", cert.issuer.rfc4514_string()],
|
2024-02-27 11:17:49 +00:00
|
|
|
[
|
2024-02-27 15:43:51 +00:00
|
|
|
"Fingerprint",
|
|
|
|
f"{format_fingerprint(cert.fingerprint(hashes.SHA1()))} (SHA1)",
|
2024-02-27 11:17:49 +00:00
|
|
|
],
|
2024-02-23 08:09:14 +00:00
|
|
|
]
|
|
|
|
|
2024-02-27 15:43:51 +00:00
|
|
|
if cert_chain:
|
|
|
|
table.append(
|
|
|
|
[
|
|
|
|
"CA chain",
|
|
|
|
"\n".join(
|
|
|
|
[
|
|
|
|
f"{cert.common_name} "
|
|
|
|
f"(Issuer: {cert.issuer})\n"
|
|
|
|
"Fingerprint: "
|
|
|
|
f"{format_fingerprint(cert.get_fingerprint(hashes.SHA1))} (SHA1)"
|
|
|
|
for cert in list(cert_chain.intermediates)
|
|
|
|
+ [cert_chain.root]
|
2024-06-05 14:29:46 +01:00
|
|
|
if cert
|
2024-02-27 15:43:51 +00:00
|
|
|
]
|
|
|
|
),
|
|
|
|
]
|
|
|
|
)
|
|
|
|
|
2024-02-23 08:09:14 +00:00
|
|
|
print(tabulate(table, tablefmt="plain"))
|
|
|
|
|
|
|
|
return 0
|
|
|
|
|
|
|
|
sys.exit(main())
|