1 | <?php |
||
2 | |||
3 | /** |
||
4 | * This file contains functions which are used in plugin.smime.php and class.pluginsmimemodule.php and therefore |
||
5 | * exists here to avoid code-duplication. |
||
6 | * |
||
7 | * @param mixed $certificate |
||
8 | */ |
||
9 | |||
10 | /** |
||
11 | * Function which extracts the email address from a certificate, and tries to get the subjectAltName if |
||
12 | * subject/emailAddress is not set. |
||
13 | * |
||
14 | * @param mixed $certificate certificate data |
||
15 | */ |
||
16 | function getCertEmail($certificate) { |
||
17 | $certEmailAddress = ""; |
||
18 | // If subject/emailAddress is not set, try subjectAltName |
||
19 | if (isset($certificate['subject']['emailAddress'])) { |
||
20 | $certEmailAddress = $certificate['subject']['emailAddress']; |
||
21 | } |
||
22 | elseif (isset($certificate['extensions'], $certificate['extensions']['subjectAltName'])) { |
||
23 | // Example [subjectAltName] => email:[email protected] |
||
24 | $tmp = explode('email:', $certificate['extensions']['subjectAltName']); |
||
25 | // Only get the first match |
||
26 | if (isset($tmp[1]) && !empty($tmp[1])) { |
||
27 | $certEmailAddress = $tmp[1]; |
||
28 | } |
||
29 | } |
||
30 | |||
31 | return $certEmailAddress; |
||
32 | } |
||
33 | |||
34 | /** |
||
35 | * Function that will return the private certificate of the user from the user store where it is stored in pkcs#12 format. |
||
36 | * |
||
37 | * @param resource $store user's store |
||
38 | * @param string $type of message_class |
||
39 | * @param string $emailAddress emailaddress to specify |
||
40 | * |
||
41 | * @return bool|resource the mapi message containing the private certificate, returns false if no certificate is found |
||
42 | */ |
||
43 | function getMAPICert($store, $type = 'WebApp.Security.Private', $emailAddress = '') { |
||
44 | $root = mapi_msgstore_openentry($store); |
||
45 | $table = mapi_folder_getcontentstable($root, MAPI_ASSOCIATED); |
||
46 | |||
47 | $restrict = [RES_PROPERTY, |
||
48 | [ |
||
49 | RELOP => RELOP_EQ, |
||
50 | ULPROPTAG => PR_MESSAGE_CLASS, |
||
51 | VALUE => [PR_MESSAGE_CLASS => $type], |
||
52 | ], |
||
53 | ]; |
||
54 | if ($type == 'WebApp.Security.Public' && !empty($emailAddress)) { |
||
55 | $restrict = [RES_AND, [ |
||
56 | $restrict, |
||
57 | [RES_CONTENT, |
||
58 | [ |
||
59 | FUZZYLEVEL => FL_FULLSTRING | FL_IGNORECASE, |
||
60 | ULPROPTAG => PR_SUBJECT, |
||
61 | VALUE => [PR_SUBJECT => $emailAddress], |
||
62 | ], |
||
63 | ], |
||
64 | ]]; |
||
65 | } |
||
66 | |||
67 | // PR_MESSAGE_DELIVERY_TIME validTo / PR_CLIENT_SUBMIT_TIME validFrom |
||
68 | mapi_table_restrict($table, $restrict, TBL_BATCH); |
||
69 | mapi_table_sort($table, [PR_MESSAGE_DELIVERY_TIME => TABLE_SORT_DESCEND], TBL_BATCH); |
||
70 | |||
71 | $privateCerts = mapi_table_queryallrows($table, [PR_ENTRYID, PR_SUBJECT, PR_MESSAGE_DELIVERY_TIME, PR_CLIENT_SUBMIT_TIME], $restrict); |
||
72 | |||
73 | if ($privateCerts && count($privateCerts) > 0) { |
||
74 | return $privateCerts; |
||
75 | } |
||
76 | |||
77 | return false; |
||
78 | } |
||
79 | |||
80 | /** |
||
81 | * Function that will decrypt the private certificate using a supplied password |
||
82 | * If multiple private certificates can be decrypted with the supplied password, |
||
83 | * all of them will be returned, if $singleCert == false, otherwise only the first one. |
||
84 | * |
||
85 | * @param resource $store user's store |
||
86 | * @param string $passphrase passphrase for private certificate |
||
87 | * @param bool $singleCert if true, returns the first certificate, which was successfully decrypted with $passphrase |
||
88 | * |
||
89 | * @return mixed collection of certificates, empty if none if decrypting fails or stored private certificate isn't found |
||
90 | */ |
||
91 | function readPrivateCert($store, $passphrase, $singleCert = true) { |
||
92 | $unlockedCerts = []; |
||
93 | // Get all private certificates saved in the store |
||
94 | $privateCerts = getMAPICert($store); |
||
95 | if ($singleCert) { |
||
96 | $privateCerts = [$privateCerts[0]]; |
||
97 | } |
||
98 | |||
99 | // Get messages from certificates |
||
100 | foreach ($privateCerts as $privateCert) { |
||
101 | $privateCertMessage = mapi_msgstore_openentry($store, $privateCert[PR_ENTRYID]); |
||
102 | if ($privateCertMessage === false) { |
||
103 | continue; |
||
104 | } |
||
105 | $pkcs12 = ""; |
||
106 | $certs = []; |
||
107 | // Read pkcs12 cert from message |
||
108 | $stream = mapi_openproperty($privateCertMessage, PR_BODY, IID_IStream, 0, 0); |
||
109 | $stat = mapi_stream_stat($stream); |
||
110 | mapi_stream_seek($stream, 0, STREAM_SEEK_SET); |
||
111 | for ($i = 0; $i < $stat['cb']; $i += 1024) { |
||
112 | $pkcs12 .= mapi_stream_read($stream, 1024); |
||
113 | } |
||
114 | $ok = openssl_pkcs12_read(base64_decode($pkcs12), $certs, $passphrase); |
||
115 | if ($ok !== false) { |
||
116 | array_push($unlockedCerts, $certs); |
||
117 | } |
||
118 | } |
||
119 | |||
120 | return ($singleCert !== false && count($unlockedCerts) > 0) ? $unlockedCerts[0] : $unlockedCerts; |
||
121 | } |
||
122 | |||
123 | /** |
||
124 | * Converts X509 DER format string to PEM format. |
||
125 | * |
||
126 | * @param string X509 Certificate in DER format |
||
0 ignored issues
–
show
|
|||
127 | * @param mixed $certificate |
||
128 | * |
||
129 | * @return string X509 Certificate in PEM format |
||
130 | */ |
||
131 | function der2pem($certificate) { |
||
132 | return "-----BEGIN CERTIFICATE-----\n" . chunk_split(base64_encode((string) $certificate), 64, "\n") . "-----END CERTIFICATE-----\n"; |
||
133 | } |
||
134 | |||
135 | /** |
||
136 | * Function which does an OCSP/CRL check on the certificate to find out if it has been |
||
137 | * revoked. |
||
138 | * |
||
139 | * For an OCSP request we need the following items: |
||
140 | * - Client certificate which we need to verify |
||
141 | * - Issuer certificate (Authority Information Access: Ca Issuers) openssl x509 -in certificate.crt -text |
||
142 | * - OCSP URL (Authority Information Access: OCSP Url) |
||
143 | * |
||
144 | * The issuer certificate is fetched once and stored in /var/lib/grommunio-web/tmp/smime |
||
145 | * We create the directory if it does not exists, check if the certificate is already stored. If it is already |
||
146 | * stored we, use stat() to determine if it is not very old (> 1 Month) and otherwise fetch the certificate and store it. |
||
147 | * |
||
148 | * @param string $certificate |
||
149 | * @param array $extracerts an array of intermediate certificates |
||
150 | * @param mixed $message |
||
151 | * |
||
152 | * @return bool true is OCSP verification has succeeded or when there is no OCSP support, false if it hasn't |
||
153 | */ |
||
154 | function verifyOCSP($certificate, $extracerts, &$message) { |
||
155 | if (!PLUGIN_SMIME_ENABLE_OCSP) { |
||
156 | $message['success'] = SMIME_STATUS_SUCCESS; |
||
157 | $message['info'] = SMIME_OCSP_DISABLED; |
||
158 | |||
159 | return true; |
||
160 | } |
||
161 | |||
162 | $pubcert = new Certificate($certificate); |
||
163 | |||
164 | /* |
||
165 | * Walk over the provided extra intermediate certificates and setup the issuer |
||
166 | * chain. |
||
167 | */ |
||
168 | $parent = $pubcert; |
||
169 | if (!isset($extracerts) || !is_array($extracerts)) { |
||
170 | $extracerts = []; |
||
171 | } |
||
172 | while ($cert = array_shift($extracerts)) { |
||
173 | $cert = new Certificate($cert); |
||
174 | |||
175 | if ($cert->getName() === $pubcert->getName()) { |
||
176 | continue; |
||
177 | } |
||
178 | |||
179 | if ($cert->getName() === $parent->getIssuerName()) { |
||
180 | $parent->setIssuer($cert); |
||
181 | $parent = $cert; |
||
182 | } |
||
183 | } |
||
184 | |||
185 | try { |
||
186 | $pubcert->verify(); |
||
187 | $issuer = $pubcert->issuer(); |
||
188 | if ($issuer->issuer()) { |
||
189 | $issuer->verify(); |
||
190 | } |
||
191 | } |
||
192 | catch (OCSPException $e) { |
||
193 | if ($e->getCode() === OCSP_CERT_STATUS && $e->getCertStatus() == OCSP_CERT_STATUS_REVOKED) { |
||
0 ignored issues
–
show
Are you sure the usage of
$e->getCertStatus() targeting OCSPException::getCertStatus() seems to always return null.
This check looks for function or method calls that always return null and whose return value is used. class A
{
function getObject()
{
return null;
}
}
$a = new A();
if ($a->getObject()) {
The method The reason is most likely that a function or method is imcomplete or has been reduced for debug purposes. ![]() |
|||
194 | $message['info'] = SMIME_REVOKED; |
||
195 | $message['success'] = SMIME_STATUS_PARTIAL; |
||
196 | |||
197 | return false; |
||
198 | } |
||
199 | error_log(sprintf("[SMIME] OCSP verification warning: '%s'", $e->getMessage())); |
||
200 | } |
||
201 | |||
202 | // Certificate does not support OCSP |
||
203 | $message['info'] = SMIME_SUCCESS; |
||
204 | $message['success'] = SMIME_STATUS_SUCCESS; |
||
205 | |||
206 | return true; |
||
207 | } |
||
208 | |||
209 | /* Validate the certificate of a user, set an error message. |
||
210 | * |
||
211 | * @param string $certificate the pkcs#12 cert |
||
212 | * @param string $passphrase the pkcs#12 passphrase |
||
213 | * @param string $emailAddres the users email address (must match certificate email) |
||
214 | */ |
||
215 | function validateUploadedPKCS($certificate, $passphrase, $emailAddress) { |
||
216 | if (!openssl_pkcs12_read($certificate, $certs, $passphrase)) { |
||
217 | return [_('Unable to decrypt certificate'), '', '']; |
||
218 | } |
||
219 | |||
220 | $message = ''; |
||
221 | $data = []; |
||
222 | $privatekey = $certs['pkey']; |
||
223 | $publickey = $certs['cert']; |
||
224 | $extracerts = $certs['extracerts'] ?? []; |
||
225 | $publickeyData = openssl_x509_parse($publickey); |
||
226 | $imported = false; |
||
227 | |||
228 | if ($publickeyData) { |
||
0 ignored issues
–
show
The expression
$publickeyData of type array is implicitly converted to a boolean; are you sure this is intended? If so, consider using ! empty($expr) instead to make it clear that you intend to check for an array without elements.
This check marks implicit conversions of arrays to boolean values in a comparison. While in PHP an empty array is considered to be equal (but not identical) to false, this is not always apparent. Consider making the comparison explicit by using ![]() |
|||
229 | $certEmailAddress = getCertEmail($publickeyData); |
||
230 | $validFrom = $publickeyData['validFrom_time_t']; |
||
231 | $validTo = $publickeyData['validTo_time_t']; |
||
232 | |||
233 | // Check priv key for signing capabilities |
||
234 | if (!openssl_x509_checkpurpose($privatekey, X509_PURPOSE_SMIME_SIGN)) { |
||
235 | $message = _('Private key can\'t be used to sign email'); |
||
236 | } |
||
237 | // Check if the certificate owner matches the grommunio Web users email address |
||
238 | elseif (strcasecmp((string) $certEmailAddress, (string) $emailAddress) !== 0) { |
||
239 | $message = _('Certificate email address doesn\'t match grommunio Web account ') . $certEmailAddress; |
||
240 | } |
||
241 | // Check if certificate is not expired, still import the certificate since a user wants to decrypt his old email |
||
242 | elseif ($validTo < time()) { |
||
243 | $message = _('Certificate was expired on ') . date('Y-m-d', $validTo) . '. ' . _('Certificate was imported.'); |
||
244 | $imported = true; |
||
245 | } |
||
246 | // Check if the certificate is validFrom date is not in the future |
||
247 | elseif ($validFrom > time()) { |
||
248 | $message = _('Certificate is not yet valid ') . date('Y-m-d', $validFrom) . '. ' . _('Certificate has not been imported'); |
||
249 | } |
||
250 | // We allow users to import private certificate which have no OCSP support |
||
251 | elseif (!verifyOCSP($certs['cert'], $extracerts, $data)) { |
||
252 | $message = _('Certificate is revoked, but was imported.'); |
||
253 | $imported = true; |
||
254 | } |
||
255 | else { |
||
256 | $imported = true; |
||
257 | $message = _('Certificate was imported.'); |
||
258 | } |
||
259 | } |
||
260 | else { // Can't parse public certificate pkcs#12 file might be corrupt |
||
261 | $message = _('Unable to read public certificate'); |
||
262 | } |
||
263 | |||
264 | return [$message, $publickey, $publickeyData, $imported]; |
||
265 | } |
||
266 | |||
267 | /** |
||
268 | * Detect if the encryptionstore has a third parameter which sets the expiration. |
||
269 | * |
||
270 | * @return {boolean} true is expiration is supported |
||
0 ignored issues
–
show
|
|||
271 | */ |
||
272 | function encryptionStoreExpirationSupport() { |
||
273 | $refClass = new ReflectionClass('EncryptionStore'); |
||
274 | |||
275 | return count($refClass->getMethod('add')->getParameters()) === 3; |
||
276 | } |
||
277 | |||
278 | /** |
||
279 | * Open PHP session if it not open closed. Returns if the session was opened. |
||
280 | * |
||
281 | * @param mixed $func |
||
282 | * @param mixed $sessionOpened |
||
283 | */ |
||
284 | function withPHPSession($func, $sessionOpened = false) { |
||
285 | if (session_status() === PHP_SESSION_NONE) { |
||
286 | session_start(); |
||
287 | $sessionOpened = true; |
||
288 | } |
||
289 | |||
290 | $func(); |
||
291 | |||
292 | if ($sessionOpened) { |
||
293 | session_write_close(); |
||
294 | } |
||
295 | } |
||
296 |
The issue could also be caused by a filter entry in the build configuration. If the path has been excluded in your configuration, e.g.
excluded_paths: ["lib/*"]
, you can move it to the dependency path list as follows:For further information see https://scrutinizer-ci.com/docs/tools/php/php-scrutinizer/#list-dependency-paths