mirror of
https://github.com/zeek/zeek.git
synced 2025-10-02 22:58:20 +00:00

Closes #1830. * origin/topic/johanna/ocsp-sct-validate: (82 commits) Tiny script changes for SSL. Update CT Log list SSL: Update OCSP/SCT scripts and documentation. Revert "add parameter 'status_type' to event ssl_stapled_ocsp" Revert "parse multiple OCSP stapling responses" SCT: Fix script error when mime type of file unknown. SCT: another memory leak in SCT parsing. SCT validation: fix small memory leak (public keys were not freed) Change end-of-connection handling for validation OCSP/TLS/SCT: Fix a number of test failures. SCT Validate: make caching a bit less aggressive. SSL: Fix type of ssl validation result TLS-SCT: compile on old versions of OpenSSL (1.0.1...) SCT: Add caching support for validation SCT: Add signed certificate timestamp validation script. SCT: Allow verification of SCTs in Certs. SCT: only compare correct OID/NID for Cert/OCSP. SCT: add validation of proofs for extensions and OCSP. SCT: pass timestamp as uint64 instead of time Add CT log information to Bro ...
62 lines
2.2 KiB
Text
62 lines
2.2 KiB
Text
##! Enable logging of OCSP responses.
|
|
#
|
|
# This script is in policy and not loaded by default because OCSP logging
|
|
# does not provide a lot of interesting information in most environments.
|
|
|
|
module OCSP;
|
|
|
|
export {
|
|
redef enum Log::ID += { LOG };
|
|
|
|
## The record type which contains the fields of the OCSP log.
|
|
type Info: record {
|
|
## Time when the OCSP reply was encountered.
|
|
ts: time &log;
|
|
## File id of the OCSP reply.
|
|
id: string &log;
|
|
## Hash algorithm used to generate issuerNameHash and issuerKeyHash.
|
|
hashAlgorithm: string &log;
|
|
## Hash of the issuer's distingueshed name.
|
|
issuerNameHash: string &log;
|
|
## Hash of the issuer's public key.
|
|
issuerKeyHash: string &log;
|
|
## Serial number of the affected certificate.
|
|
serialNumber: string &log;
|
|
## Status of the affected certificate.
|
|
certStatus: string &log;
|
|
## Time at which the certificate was revoked.
|
|
revoketime: time &log &optional;
|
|
## Reason for which the certificate was revoked.
|
|
revokereason: string &log &optional;
|
|
## The time at which the status being shows is known to have been correct.
|
|
thisUpdate: time &log;
|
|
## The latest time at which new information about the status of the certificate will be available.
|
|
nextUpdate: time &log &optional;
|
|
};
|
|
|
|
## Event that can be handled to access the OCSP record
|
|
## as it is sent to the logging framework.
|
|
global log_ocsp: event(rec: Info);
|
|
}
|
|
|
|
event bro_init()
|
|
{
|
|
Log::create_stream(LOG, [$columns=Info, $ev=log_ocsp, $path="ocsp"]);
|
|
Files::register_for_mime_type(Files::ANALYZER_OCSP_REPLY, "application/ocsp-response");
|
|
}
|
|
|
|
event ocsp_response_certificate(f: fa_file, hashAlgorithm: string, issuerNameHash: string, issuerKeyHash: string, serialNumber: string, certStatus: string, revoketime: time, revokereason: string, thisUpdate: time, nextUpdate: time)
|
|
{
|
|
local wr = OCSP::Info($ts=f$info$ts, $id=f$id, $hashAlgorithm=hashAlgorithm, $issuerNameHash=issuerNameHash,
|
|
$issuerKeyHash=issuerKeyHash, $serialNumber=serialNumber, $certStatus=certStatus,
|
|
$thisUpdate=thisUpdate);
|
|
|
|
if ( revokereason != "" )
|
|
wr$revokereason = revokereason;
|
|
if ( time_to_double(revoketime) != 0 )
|
|
wr$revoketime = revoketime;
|
|
if ( time_to_double(nextUpdate) != 0 )
|
|
wr$nextUpdate = nextUpdate;
|
|
|
|
Log::write(LOG, wr);
|
|
}
|