1 | #!/usr/bin/env python2 |
---|
2 | |
---|
3 | from OpenSSL import * |
---|
4 | |
---|
5 | PRIVATE_KEY = "/etc/pki/tls/private/scripts-2048.key" |
---|
6 | # PEM format with no passphrase |
---|
7 | |
---|
8 | SUBJECT_ATTRIBUTES = [ |
---|
9 | ("countryName", "US"), |
---|
10 | ("stateOrProvinceName", "Massachusetts"), |
---|
11 | ("localityName", "Cambridge"), |
---|
12 | ("organizationName", "Massachusetts Institute of Technology"), |
---|
13 | ("organizationalUnitName", "scripts.mit.edu web hosting service"), |
---|
14 | ("CN", None), # to be filled in below |
---|
15 | ("emailAddress", "scripts@mit.edu"), |
---|
16 | ] |
---|
17 | |
---|
18 | EXTENSIONS = [ |
---|
19 | # apparently OpenSSL marks CSR extensions as non-critical; it's not our |
---|
20 | # fault if the CA messes up and forgets CA:FALSE, right? |
---|
21 | ("basicConstraints", False, "CA:FALSE"), |
---|
22 | ("keyUsage", False, "nonRepudiation, digitalSignature, keyEncipherment"), |
---|
23 | ] |
---|
24 | |
---|
25 | def generate_csr(cn, alt_names=None): |
---|
26 | """ |
---|
27 | Generate a CSR for the given Common Name (a hostname) with the provided |
---|
28 | subjectAltName's (a list of hostnames) using the above settings. |
---|
29 | |
---|
30 | Returns a PEM string. |
---|
31 | """ |
---|
32 | req = crypto.X509Req() |
---|
33 | |
---|
34 | # set the subject fields (in the same order as OpenSSL XD) |
---|
35 | subject = req.get_subject() |
---|
36 | for attr, val in SUBJECT_ATTRIBUTES: |
---|
37 | if attr == "CN": # fills in the CN in the right place |
---|
38 | val = cn |
---|
39 | setattr(subject, attr, val) # subject.attr = val |
---|
40 | |
---|
41 | # initialize the extensions |
---|
42 | extensions = [] |
---|
43 | for type_name, critical, value in EXTENSIONS: |
---|
44 | ext = crypto.X509Extension(type_name, critical, value) |
---|
45 | extensions.append(ext) |
---|
46 | |
---|
47 | # ...including subjectAltName |
---|
48 | san_string = ", ".join("DNS:"+name for name in alt_names) |
---|
49 | ext = crypto.X509Extension("subjectAltName", False, san_string) |
---|
50 | extensions.append(ext) |
---|
51 | |
---|
52 | # and add them to the CSR |
---|
53 | req.add_extensions(extensions) |
---|
54 | |
---|
55 | # load the private key |
---|
56 | with open(PRIVATE_KEY) as f: |
---|
57 | pk_pem = f.read() |
---|
58 | private_key = crypto.load_privatekey(crypto.FILETYPE_PEM, pk_pem) |
---|
59 | |
---|
60 | # do the bit with the key! |
---|
61 | req.set_pubkey(private_key) # yeah...I know |
---|
62 | req.sign(private_key, "sha256") |
---|
63 | |
---|
64 | # dump the CSR to PEM |
---|
65 | return crypto.dump_certificate_request(crypto.FILETYPE_PEM, req) |
---|
66 | |
---|
67 | if __name__=="__main__": |
---|
68 | import sys |
---|
69 | if len(sys.argv) != 2: |
---|
70 | print "usage: %s HOSTNAME" % sys.argv[0] |
---|
71 | exit(1) |
---|
72 | |
---|
73 | hostname = sys.argv[1].lower() |
---|
74 | if not hostname.endswith(".mit.edu"): |
---|
75 | hostname += ".mit.edu" |
---|
76 | |
---|
77 | print generate_csr(hostname, [hostname]), # with subjectAltName |
---|
78 | print >> sys.stderr, "Generated a CSR for %s using %s" % ( |
---|
79 | hostname, PRIVATE_KEY) |
---|
80 | exit(0) |
---|