-
-
Save shaneutt/2ca973903cfd5a318ddd6fc7e296c52f to your computer and use it in GitHub Desktop.
Client side certificates with go
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package main | |
| import ( | |
| "crypto/tls" | |
| "crypto/x509" | |
| "fmt" | |
| "io" | |
| "log" | |
| ) | |
| func main() { | |
| cert, err := tls.LoadX509KeyPair("certs/client.pem", "certs/client.key") | |
| if err != nil { | |
| log.Fatalf("server: loadkeys: %s", err) | |
| } | |
| config := tls.Config{Certificates: []tls.Certificate{cert}, InsecureSkipVerify: true} | |
| conn, err := tls.Dial("tcp", "127.0.0.1:8000", &config) | |
| if err != nil { | |
| log.Fatalf("client: dial: %s", err) | |
| } | |
| defer conn.Close() | |
| log.Println("client: connected to: ", conn.RemoteAddr()) | |
| state := conn.ConnectionState() | |
| for _, v := range state.PeerCertificates { | |
| fmt.Println(x509.MarshalPKIXPublicKey(v.PublicKey)) | |
| fmt.Println(v.Subject) | |
| } | |
| log.Println("client: handshake: ", state.HandshakeComplete) | |
| log.Println("client: mutual: ", state.NegotiatedProtocolIsMutual) | |
| message := "Hello\n" | |
| n, err := io.WriteString(conn, message) | |
| if err != nil { | |
| log.Fatalf("client: write: %s", err) | |
| } | |
| log.Printf("client: wrote %q (%d bytes)", message, n) | |
| reply := make([]byte, 256) | |
| n, err = conn.Read(reply) | |
| log.Printf("client: read %q (%d bytes)", string(reply[:n]), n) | |
| log.Print("client: exiting") | |
| } |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| #!/bin/bash | |
| # call this script with an email address (valid or not). | |
| # like: | |
| # ./makecert.sh [email protected] | |
| mkdir certs | |
| rm certs/* | |
| echo "make server cert" | |
| openssl req -new -nodes -x509 -out certs/server.pem -keyout certs/server.key -days 3650 -subj "/C=DE/ST=NRW/L=Earth/O=Random Company/OU=IT/CN=www.random.com/emailAddress=$1" | |
| echo "make client cert" | |
| openssl req -new -nodes -x509 -out certs/client.pem -keyout certs/client.key -days 3650 -subj "/C=DE/ST=NRW/L=Earth/O=Random Company/OU=IT/CN=www.random.com/emailAddress=$1" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| package main | |
| import ( | |
| "crypto/rand" | |
| "crypto/tls" | |
| "crypto/x509" | |
| "log" | |
| "net" | |
| ) | |
| func main() { | |
| cert, err := tls.LoadX509KeyPair("certs/server.pem", "certs/server.key") | |
| if err != nil { | |
| log.Fatalf("server: loadkeys: %s", err) | |
| } | |
| config := tls.Config{Certificates: []tls.Certificate{cert}} | |
| config.Rand = rand.Reader | |
| service := "0.0.0.0:8000" | |
| listener, err := tls.Listen("tcp", service, &config) | |
| if err != nil { | |
| log.Fatalf("server: listen: %s", err) | |
| } | |
| log.Print("server: listening") | |
| for { | |
| conn, err := listener.Accept() | |
| if err != nil { | |
| log.Printf("server: accept: %s", err) | |
| break | |
| } | |
| log.Printf("server: accepted from %s", conn.RemoteAddr()) | |
| go handleClient(conn) | |
| } | |
| } | |
| func handleClient(conn net.Conn) { | |
| defer conn.Close() | |
| tlscon, ok := conn.(*tls.Conn) | |
| if ok { | |
| log.Print("server: conn: type assert to TLS succeedded") | |
| err := tlscon.Handshake() | |
| if err != nil { | |
| log.Fatalf("server: handshake failed: %s", err) | |
| } else { | |
| log.Print("server: conn: Handshake completed") | |
| } | |
| state := tlscon.ConnectionState() | |
| for _, v := range state.PeerCertificates { | |
| log.Print(x509.MarshalPKIXPublicKey(v.PublicKey)) | |
| } | |
| } | |
| buf := make([]byte, 512) | |
| for { | |
| log.Print("server: conn: waiting") | |
| n, err := conn.Read(buf) | |
| if err != nil { | |
| if err != nil { | |
| log.Printf("server: conn: read: %s", err) | |
| } | |
| break | |
| } | |
| log.Printf("server: conn: echo %q\n", string(buf[:n])) | |
| n, err = conn.Write(buf[:n]) | |
| if err != nil { | |
| log.Printf("server: write: %s", err) | |
| break | |
| } | |
| } | |
| log.Println("server: conn: closed") | |
| } |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment