Skip to content

Instantly share code, notes, and snippets.

@AfroThundr3007730
Last active April 12, 2024 21:03
Show Gist options
  • Star 20 You must be signed in to star a gist
  • Fork 5 You must be signed in to fork a gist
  • Save AfroThundr3007730/ba99753dda66fc4abaf30fb5c0e5d012 to your computer and use it in GitHub Desktop.
Save AfroThundr3007730/ba99753dda66fc4abaf30fb5c0e5d012 to your computer and use it in GitHub Desktop.
Import DoD root certificates into linux CA store
#!/bin/bash
# Import DoD root certificates into linux CA store
# Version 0.3.0 updated 20240304
# SPDX-License-Identifier: GPL-3.0-or-later
add_dod_certs() {
local bundle cert certdir file form tmpdir url update
# Location of bundle from DISA site
url='https://public.cyber.mil/pki-pke/pkipke-document-library/'
bundle=$(curl -s $url | awk -F '"' 'tolower($2) ~ /dod.zip/ {print $2}')
#bundle=https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/unclass-certificates_pkcs7_DoD.zip
# Set cert directory and update command based on OS
# shellcheck disable=SC1091
source /etc/os-release
if [[ $ID =~ (fedora|rhel|centos) ||
$ID_LIKE =~ (fedora|rhel|centos) ]]; then
certdir=/etc/pki/ca-trust/source/anchors
update='update-ca-trust'
elif [[ $ID =~ (debian|ubuntu|mint) ||
$ID_LIKE =~ (debian|ubuntu|mint) ]]; then
certdir=/usr/local/share/ca-certificates
update='update-ca-certificates'
else
certdir=$1
update=$2
fi
if [[ -z $certdir || -z $update ]]; then
printf 'Unable to autodetect OS using /etc/os-release.\n'
printf 'Please provide CA certificate directory and update command.\n'
printf 'Example: %s /cert/store/location update-cmd\n' "${0##*/}"
exit 1
fi
# Extract the bundle
tmpdir=$(mktemp -d)
wget -qP "$tmpdir" "$bundle"
unzip -qj "$tmpdir"/"${bundle##*/}" -d "$tmpdir"
# Check for existence of PEM or DER format p7b.
for file in "$tmpdir"/*_dod_{pem,der}.p7b; do
# Iterate over glob instead of testing directly (SC2144)
if [[ -f $file ]]; then form=${file%.*}; form=${form##*_}; break; fi
done
# Convert the PKCS#7 bundle into individual PEM files
openssl pkcs7 -print_certs -inform "$form" -in "$file" |
awk -v d="$tmpdir" 'BEGIN {c=0} /subject=/ {c++} {print > d "/cert." c ".pem"}'
# Rename the files based on the CA name
for cert in "$tmpdir"/cert.*.pem; do
mv "$cert" "$certdir"/"$(openssl x509 -noout -subject -in "$cert" |
awk -F '(=|= )' '{gsub(/ /, "_", $NF); print $NF}')".crt
done
# Remove temp files and update certificate stores
rm -fr "$tmpdir"
$update
}
# Only execute if not being sourced
[[ ${BASH_SOURCE[0]} == "$0" ]] && add_dod_certs "$@"
@Kurlee
Copy link

Kurlee commented Dec 18, 2020

Script is broken due to a reconfiguration on DISA's part related to where the files are downloaded from. The new URL is
https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/certificates_pkcs7_v5-6_dod.zip

Copy link

ghost commented Jul 8, 2021

The updated URL from Kurlee is no longer working. Things have changed once again.

wget tmp https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/certificates_pkcs7_v5-6_dod.zip --2021-07-08 16:17:13-- http://tmp/ Resolving tmp (tmp)... failed: Name or service not known. wget: unable to resolve host address ‘tmp’ --2021-07-08 16:17:15-- https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/certificates_pkcs7_v5-6_dod.zip Resolving dl.dod.cyber.mil (dl.dod.cyber.mil)... 65.8.239.129, 65.8.239.4, 65.8.239.13, ... Connecting to dl.dod.cyber.mil (dl.dod.cyber.mil)|65.8.239.129|:443... connected. HTTP request sent, awaiting response... 403 Forbidden 2021-07-08 16:17:16 ERROR 403: Forbidden.

@AfroThundr3007730
Copy link
Author

Fixed them changing the case of the filename.

@rac3rx
Copy link

rac3rx commented Apr 13, 2022

Clever script; should change the awk regex expression within the url variable to a literal dot by escaping the period with a forward slash /dod.zip/

For some reason my escaped period doesn't show-up (unless you click edit)

@lorengordon
Copy link

Looks like an unversioned url that is updated to point at the latest version is available here: https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/certificates_pkcs7_DoD.zip

@emucker
Copy link

emucker commented Mar 16, 2023

The format of the pem.7b file has changed with the latest PKI certificates. Update line 38 to
openssl pkcs7 -print_certs -in tmp/*pem.p7b | and script will execute without issue. For newer dev environments, it might be good to check for unzip as well.
Thanks for the script. Makes life nice and easy.

@BennieCopeland
Copy link

Broken for Ubuntu. I had to make the following changes.

Replace

# Convert the PKCS#7 bundle into individual PEM files
openssl pkcs7 -print_certs -in tmp/*.pem.p7b |
    awk 'BEGIN {c=0} /subject=/ {c++} {print > "cert." c ".pem"}'

with

for i in tmp/*_der.p7b; do
    openssl pkcs7 -print_certs -inform DER -in $i >> certs.txt
done

for i in tmp/*_pem.p7b; do
    openssl pkcs7 -print_certs -inform PEM -in $i >> certs.txt
done

cat certs.txt | awk 'BEGIN {c=0} /subject=/ {c++} {print > "cert." c ".pem"}'

The openssl command didn't like file globbing for the -in argument, and required me to tell it what type of cert with -inform. On top of that, 5 of the 6 certificates downloaded were in DER format with the last in PEM format with a different file naming standard.

@AfroThundr3007730
Copy link
Author

AfroThundr3007730 commented Jul 18, 2023

@BennieCopeland The main _der.p7b bundle has the same content as the main _pem.p7b bundle, but in DER format. The ca_X_der.p7b bundles have the same content as the main DER bundle but split by issuing CA. So the only bundle needed from the zip file is the PEM format bundle. Since OpenSSL assumes PEM format by default, adding -inform X isn't necessary in this case. Your set of commands will just end up extracting the same certs several times.

@AfroThundr3007730
Copy link
Author

Updated the wildcard file match to account for the underscore. Since they keep renaming the zip, I don't want to use a direct URL here still.

@emucker
Copy link

emucker commented Jul 19, 2023

Thanks for the update on the file name format. I'll try it out and drop a note if I run into any issues.

@emucker
Copy link

emucker commented Jul 19, 2023

Script is all good now. Gave it a test run today. Thank you for updating.

@BennieCopeland
Copy link

@AfroThundr3007730 Thanks for the information. I wasn't aware of all the duplication in the certificate files. The implementation makes a lot more sense now.

@senterfd-jrg
Copy link

senterfd-jrg commented Nov 7, 2023

I noticed that a current release, 03NOV2023, of the PKI CA Certificate Bundles: PKCS#7 for DoD PKI Only - Version 5.13 provides a CA certificate bundle that is missing the expected "tmp/*_pem.p7b" file. I have modified my version of your file with the following adjustment to support either case.

    ...
    unzip -qj tmp/${bundle##*/} -d tmp

    # Check for existence of PEM format p7b.
    if [ -f "tmp/*_dod_pem.p7b" ]; then
        echo 'Found PEM formatted file, continuing extraction...'
        certform="PEM"
        certfile="*_dod_pem.p7b"
    else
        echo 'Found DER formatted file, continuing extraction and conversion...'
        certform="DER"
        certfile="*_dod_der.p7b"
    fi

    # Convert the PKCS#7 bundle into individual PEM files
    openssl pkcs7 -inform ${certform} -print_certs -in tmp/${certfile} |
        awk 'BEGIN {c=0} /subject=/ {c++} {print > "cert." c ".pem"}'

    # Rename the files based on the CA name
    ...

@emucker
Copy link

emucker commented Nov 8, 2023

@senterfd-jrg Thanks for the update. I coincidentally came across the same issue yesterday morning. Appreciate the fix. Tested locally and successfully imported certificates.

@aaronlippold
Copy link

Added the above and retested

#!/bin/bash
# Import DoD root certificates into linux CA store
# https://gist.github.com/AfroThundr3007730/ba99753dda66fc4abaf30fb5c0e5d012

main() {
  # Location of bundle from DISA site
  url='https://public.cyber.mil/pki-pke/pkipke-document-library/'
  bundle=$(curl -s $url | awk -F '"' 'tolower($2) ~ /dod.zip/ {print $2}')
  #bundle=https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/certificates_pkcs7_v5-6_dod.zip

  # Set cert directory and update command based on OS
  source /etc/os-release
  if [[ $ID =~ (fedora|rhel|centos) ||
    $ID_LIKE =~ (fedora|rhel|centos) ]]; then
    certdir=/etc/pki/ca-trust/source/anchors
    update=update-ca-trust
  elif [[ $ID =~ (debian|ubuntu|mint) ||
    $ID_LIKE =~ (debian|ubuntu|mint) ]]; then
    certdir=/usr/local/share/ca-certificates
    update=update-ca-certificates
  else
    certdir=$1
    update=$2
  fi

  [[ -n $certdir && -n $update ]] || {
    echo 'Unable to autodetect OS using /etc/os-release.'
    echo 'Please provide CA certificate directory and update command.'
    echo 'Example: add-dod-certs.sh /cert/store/location update-cmd'
    exit 1
  }

  # Extract the bundle
  cd $certdir
  wget -qP tmp $bundle
  unzip -qj tmp/${bundle##*/} -d tmp

  # Check for existence of PEM format p7b.
  if [ -f "tmp/*_dod_pem.p7b" ]; then
    echo 'Found PEM formatted file, continuing extraction...'
    certform="PEM"
    certfile="*_dod_pem.p7b"
  else
    echo 'Found DER formatted file, continuing extraction and conversion...'
    certform="DER"
    certfile="*_dod_der.p7b"
  fi

  # Convert the PKCS#7 bundle into individual PEM files
  openssl pkcs7 -inform ${certform} -print_certs -in tmp/${certfile} |
    awk 'BEGIN {c=0} /subject=/ {c++} {print > "cert." c ".pem"}'

  # Rename the files based on the CA name
  for i in *.pem; do
    name=$(
      openssl x509 -noout -subject -in $i |
        awk -F '(=|= )' '{gsub(/ /, "_", $NF); print $NF}'
    )
    mv $i ${name}.crt
  done

  # Remove temp files and update certificate stores
  rm -fr tmp
  $update
}

# Only execute if not being sourced
[[ ${BASH_SOURCE[0]} == "$0" ]] && main "$@"

@danielcjacobs
Copy link

what are the args to this script supposed to be?

@aaronlippold
Copy link

It doesn’t need any I don’t think

@danielcjacobs
Copy link

The script uses $1 and $2, are those not 2 arguments that get passed in?

@aaronlippold
Copy link

If I recall those reference the tokens that awk produces. I will double check.

@Amndeep7
Copy link

Amndeep7 commented Jan 5, 2024

@danielcjacobs if you look in the if/else block, you'll see that those args are supposed to be set to the certdir and whatever shellscript/binary is being used to update all the cert bundles. the gist tries to provide good defaults, but you can also overwrite if you so desire.

@njohbillie
Copy link

Will this run on mac?

@AfroThundr3007730
Copy link
Author

AfroThundr3007730 commented Mar 2, 2024

@senterfd-jrg Thanks for catching that. I've updated the script to incorporate it (and fix various shellcheck warnings).

@njohbillie I haven't researched how a mac imports trusted certificates. If it works similarly to Linux certificate management, then you could adapt the script to make it work, if not then you may need to look at another tool to do it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment