Skip to content

Commit aa10faf

Browse files
FiloSottilerolandshoemaker
authored andcommitted
acme/autocert: renew Let's Encrypt certificates likely to get revoked
Let's Encrypt is revoking all certificates verified with TLS-ALPN-01 beofre January 26th due to a compliance issue. Detect them and force a renewal. Also, fix the tests which were not testing if expired certificates were renewed anymore, as the test certificates were always invalid due to not having SANs. Change-Id: If9d0632b2edfe0b7fb70f6cfd7e65e46e2d047dc Reviewed-on: https://go-review.googlesource.com/c/crypto/+/381114 Trust: Filippo Valsorda <filippo@golang.org> Run-TryBot: Filippo Valsorda <filippo@golang.org> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Roland Shoemaker <roland@golang.org>
1 parent e04a857 commit aa10faf

File tree

2 files changed

+152
-6
lines changed

2 files changed

+152
-6
lines changed

acme/autocert/autocert.go

+16
Original file line numberDiff line numberDiff line change
@@ -1200,6 +1200,10 @@ func validCert(ck certKey, der [][]byte, key crypto.Signer, now time.Time) (leaf
12001200
if err := leaf.VerifyHostname(ck.domain); err != nil {
12011201
return nil, err
12021202
}
1203+
// renew certificates revoked by Let's Encrypt in January 2022
1204+
if isRevokedLetsEncrypt(leaf) {
1205+
return nil, errors.New("acme/autocert: certificate was probably revoked by Let's Encrypt")
1206+
}
12031207
// ensure the leaf corresponds to the private key and matches the certKey type
12041208
switch pub := leaf.PublicKey.(type) {
12051209
case *rsa.PublicKey:
@@ -1230,6 +1234,18 @@ func validCert(ck certKey, der [][]byte, key crypto.Signer, now time.Time) (leaf
12301234
return leaf, nil
12311235
}
12321236

1237+
// https://community.letsencrypt.org/t/2022-01-25-issue-with-tls-alpn-01-validation-method/170450
1238+
var letsEncryptFixDeployTime = time.Date(2022, time.January, 26, 00, 48, 0, 0, time.UTC)
1239+
1240+
// isRevokedLetsEncrypt returns whether the certificate is likely to be part of
1241+
// a batch of certificates revoked by Let's Encrypt in January 2022. This check
1242+
// can be safely removed from May 2022.
1243+
func isRevokedLetsEncrypt(cert *x509.Certificate) bool {
1244+
O := cert.Issuer.Organization
1245+
return len(O) == 1 && O[0] == "Let's Encrypt" &&
1246+
cert.NotBefore.Before(letsEncryptFixDeployTime)
1247+
}
1248+
12331249
type lockedMathRand struct {
12341250
sync.Mutex
12351251
rnd *mathrand.Rand

acme/autocert/autocert_test.go

+136-6
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ func dateDummyCert(pub interface{}, start, end time.Time, san ...string) ([]byte
154154
return nil, err
155155
}
156156
t := &x509.Certificate{
157-
SerialNumber: big.NewInt(1),
157+
SerialNumber: randomSerial(),
158158
NotBefore: start,
159159
NotAfter: end,
160160
BasicConstraintsValid: true,
@@ -167,6 +167,14 @@ func dateDummyCert(pub interface{}, start, end time.Time, san ...string) ([]byte
167167
return x509.CreateCertificate(rand.Reader, t, t, pub, key)
168168
}
169169

170+
func randomSerial() *big.Int {
171+
serial, err := rand.Int(rand.Reader, new(big.Int).Lsh(big.NewInt(1), 32))
172+
if err != nil {
173+
panic(err)
174+
}
175+
return serial
176+
}
177+
170178
func decodePayload(v interface{}, r io.Reader) error {
171179
var req struct{ Payload string }
172180
if err := json.NewDecoder(r).Decode(&req); err != nil {
@@ -276,15 +284,54 @@ func TestGetCertificate_nilPrompt(t *testing.T) {
276284
}
277285
}
278286

287+
func TestGetCertificate_goodCache(t *testing.T) {
288+
// Make a valid cert and cache it.
289+
pk, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
290+
if err != nil {
291+
t.Fatal(err)
292+
}
293+
serial := randomSerial()
294+
tmpl := &x509.Certificate{
295+
SerialNumber: serial,
296+
DNSNames: []string{exampleDomain},
297+
// Use a time before the Let's Encrypt revocation cutoff to also test
298+
// that non-Let's Encrypt certificates are not renewed.
299+
NotBefore: time.Date(2022, time.January, 1, 0, 0, 0, 0, time.UTC),
300+
NotAfter: time.Date(2122, time.January, 1, 0, 0, 0, 0, time.UTC),
301+
}
302+
pub, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, &pk.PublicKey, pk)
303+
if err != nil {
304+
t.Fatal(err)
305+
}
306+
tlscert := &tls.Certificate{
307+
Certificate: [][]byte{pub},
308+
PrivateKey: pk,
309+
}
310+
311+
man := &Manager{Prompt: AcceptTOS, Cache: newMemCache(t)}
312+
defer man.stopRenew()
313+
if err := man.cachePut(context.Background(), exampleCertKey, tlscert); err != nil {
314+
t.Fatalf("man.cachePut: %v", err)
315+
}
316+
317+
hello := clientHelloInfo(exampleDomain, algECDSA)
318+
gotCert := testGetCertificate(t, man, exampleDomain, hello)
319+
if gotCert.SerialNumber.Cmp(serial) != 0 {
320+
t.Error("good certificate was replaced")
321+
}
322+
}
323+
279324
func TestGetCertificate_expiredCache(t *testing.T) {
280325
// Make an expired cert and cache it.
281326
pk, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
282327
if err != nil {
283328
t.Fatal(err)
284329
}
330+
serial := randomSerial()
285331
tmpl := &x509.Certificate{
286-
SerialNumber: big.NewInt(1),
287-
Subject: pkix.Name{CommonName: exampleDomain},
332+
SerialNumber: serial,
333+
DNSNames: []string{exampleDomain},
334+
NotBefore: time.Now().Add(-1 * time.Minute),
288335
NotAfter: time.Now(),
289336
}
290337
pub, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, &pk.PublicKey, pk)
@@ -305,7 +352,89 @@ func TestGetCertificate_expiredCache(t *testing.T) {
305352
// The expired cached cert should trigger a new cert issuance
306353
// and return without an error.
307354
hello := clientHelloInfo(exampleDomain, algECDSA)
308-
testGetCertificate(t, man, exampleDomain, hello)
355+
gotCert := testGetCertificate(t, man, exampleDomain, hello)
356+
if gotCert.SerialNumber.Cmp(serial) == 0 {
357+
t.Error("expired certificate was not replaced")
358+
}
359+
}
360+
361+
func TestGetCertificate_goodLetsEncrypt(t *testing.T) {
362+
pk, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
363+
if err != nil {
364+
t.Fatal(err)
365+
}
366+
issuer := &x509.Certificate{
367+
Subject: pkix.Name{Country: []string{"US"},
368+
Organization: []string{"Let's Encrypt"}, CommonName: "R3"},
369+
}
370+
serial := randomSerial()
371+
tmpl := &x509.Certificate{
372+
SerialNumber: serial,
373+
DNSNames: []string{exampleDomain},
374+
NotBefore: time.Date(2022, time.January, 26, 12, 0, 0, 0, time.UTC),
375+
NotAfter: time.Date(2122, time.January, 1, 0, 0, 0, 0, time.UTC),
376+
}
377+
pub, err := x509.CreateCertificate(rand.Reader, tmpl, issuer, &pk.PublicKey, pk)
378+
if err != nil {
379+
t.Fatal(err)
380+
}
381+
tlscert := &tls.Certificate{
382+
Certificate: [][]byte{pub},
383+
PrivateKey: pk,
384+
}
385+
386+
man := &Manager{Prompt: AcceptTOS, Cache: newMemCache(t)}
387+
defer man.stopRenew()
388+
if err := man.cachePut(context.Background(), exampleCertKey, tlscert); err != nil {
389+
t.Fatalf("man.cachePut: %v", err)
390+
}
391+
392+
hello := clientHelloInfo(exampleDomain, algECDSA)
393+
gotCert := testGetCertificate(t, man, exampleDomain, hello)
394+
if gotCert.SerialNumber.Cmp(serial) != 0 {
395+
t.Error("good certificate was replaced")
396+
}
397+
}
398+
399+
func TestGetCertificate_revokedLetsEncrypt(t *testing.T) {
400+
// Make a presumably revoked Let's Encrypt cert and cache it.
401+
pk, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
402+
if err != nil {
403+
t.Fatal(err)
404+
}
405+
issuer := &x509.Certificate{
406+
Subject: pkix.Name{Country: []string{"US"},
407+
Organization: []string{"Let's Encrypt"}, CommonName: "R3"},
408+
}
409+
serial := randomSerial()
410+
tmpl := &x509.Certificate{
411+
SerialNumber: serial,
412+
DNSNames: []string{exampleDomain},
413+
NotBefore: time.Date(2022, time.January, 1, 0, 0, 0, 0, time.UTC),
414+
NotAfter: time.Date(2122, time.January, 1, 0, 0, 0, 0, time.UTC),
415+
}
416+
pub, err := x509.CreateCertificate(rand.Reader, tmpl, issuer, &pk.PublicKey, pk)
417+
if err != nil {
418+
t.Fatal(err)
419+
}
420+
tlscert := &tls.Certificate{
421+
Certificate: [][]byte{pub},
422+
PrivateKey: pk,
423+
}
424+
425+
man := &Manager{Prompt: AcceptTOS, Cache: newMemCache(t)}
426+
defer man.stopRenew()
427+
if err := man.cachePut(context.Background(), exampleCertKey, tlscert); err != nil {
428+
t.Fatalf("man.cachePut: %v", err)
429+
}
430+
431+
// The presumably revoked cached cert should trigger a new cert issuance
432+
// and return without an error.
433+
hello := clientHelloInfo(exampleDomain, algECDSA)
434+
gotCert := testGetCertificate(t, man, exampleDomain, hello)
435+
if gotCert.SerialNumber.Cmp(serial) == 0 {
436+
t.Error("certificate was not replaced")
437+
}
309438
}
310439

311440
func TestGetCertificate_failedAttempt(t *testing.T) {
@@ -441,7 +570,7 @@ func TestGetCertificate_wrongCacheKeyType(t *testing.T) {
441570
}
442571
tmpl := &x509.Certificate{
443572
SerialNumber: big.NewInt(1),
444-
Subject: pkix.Name{CommonName: exampleDomain},
573+
DNSNames: []string{exampleDomain},
445574
NotAfter: time.Now().Add(90 * 24 * time.Hour),
446575
}
447576
pub, err := x509.CreateCertificate(rand.Reader, tmpl, tmpl, &pk.PublicKey, pk)
@@ -599,7 +728,7 @@ func startACMEServerStub(t *testing.T, tokenCert getCertificateFunc, domain stri
599728

600729
// tests man.GetCertificate flow using the provided hello argument.
601730
// The domain argument is the expected domain name of a certificate request.
602-
func testGetCertificate(t *testing.T, man *Manager, domain string, hello *tls.ClientHelloInfo) {
731+
func testGetCertificate(t *testing.T, man *Manager, domain string, hello *tls.ClientHelloInfo) *x509.Certificate {
603732
url, finish := startACMEServerStub(t, tokenCertFn(man, algECDSA), domain)
604733
defer finish()
605734
man.Client = &acme.Client{DirectoryURL: url}
@@ -633,6 +762,7 @@ func testGetCertificate(t *testing.T, man *Manager, domain string, hello *tls.Cl
633762
t.Errorf("cert.DNSNames = %v; want %q", cert.DNSNames, domain)
634763
}
635764

765+
return cert
636766
}
637767

638768
func TestVerifyHTTP01(t *testing.T) {

0 commit comments

Comments
 (0)