Last active
April 10, 2017 14:38
-
-
Save liamsi/980cf4d11999a06b11d717a3551e5958 to your computer and use it in GitHub Desktop.
Intercept TLS handshakes and log hash, domain name, and base64 encoded cert (as JSON fields) into kafka
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
@load base/protocols/ssl | |
@load Bro/Kafka/logs-to-kafka.bro | |
module TLSFun; | |
export { | |
# Append the value LOG to the Log::ID enumerable. | |
redef enum Log::ID += { LOG }; | |
type Info: record { | |
certHash: string &log; | |
commonName: string &log; | |
fullCert: string &log; | |
}; | |
} | |
event bro_init() | |
{ | |
# Create the logging stream. | |
Log::create_stream(LOG, [$columns=Info, $path="certs"]); | |
} | |
redef LogAscii::use_json = T; | |
redef Kafka::kafka_conf = table( | |
["metadata.broker.list"] = "localhost:9092" | |
); | |
redef Kafka::topic_name = "certs"; | |
redef Kafka::logs_to_send = set(LOG); | |
event ssl_established(c: connection) | |
{ | |
# Only continue if this connection contains certificates | |
if ( ! c$ssl?$cert_chain || |c$ssl$cert_chain| == 0 || | |
! c$ssl$cert_chain[0]?$x509 ) | |
return; | |
local cert = c$ssl$cert_chain[0]$x509; | |
local subject = cert$certificate$subject; | |
local hash = c$ssl$cert_chain[0]$sha1; | |
local certHandle = c$ssl$cert_chain[0]$x509$handle; | |
# extract CN from subject | |
local common_name = subst_string(find_last(subject, /CN=([^,]*)/), "CN=", ""); | |
print fmt("%s\n", common_name); | |
local cert_string = x509_get_certificate_string(certHandle, T); | |
Log::write( LOG, [$certHash=hash, | |
$commonName=common_name, | |
$fullCert=cert_string]); | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Bookmarks: