-
-
Save rac3rx/2dc93fe5033a97f982b6e8a0461d60e4 to your computer and use it in GitHub Desktop.
Import DoD root certificates into linux CA store
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# Import DoD root certificates into linux CA store | |
main() { | |
# Location of bundle from DISA site | |
url='https://public.cyber.mil/pki-pke/pkipke-document-library/' | |
bundle=$(curl -s $url | awk -F '"' 'tolower($2) ~ /dod\.zip/ {print $2}') | |
#bundle=https://dl.dod.cyber.mil/wp-content/uploads/pki-pke/zip/certificates_pkcs7_v5-6_dod.zip | |
# Set cert directory and update command based on OS | |
source /etc/os-release | |
if [[ $ID =~ (fedora|rhel|centos) || | |
$ID_LIKE =~ (fedora|rhel|centos) ]]; then | |
certdir=/etc/pki/ca-trust/source/anchors | |
update=update-ca-trust | |
elif [[ $ID =~ (debian|ubuntu|mint) || | |
$ID_LIKE =~ (debian|ubuntu|mint) ]]; then | |
certdir=/usr/local/share/ca-certificates | |
update=update-ca-certificates | |
else | |
certdir=$1 | |
update=$2 | |
fi | |
[[ -n $certdir && -n $update ]] || { | |
echo 'Unable to autodetect OS using /etc/os-release.' | |
echo 'Please provide CA certificate directory and update command.' | |
echo 'Example: add-dod-certs.sh /cert/store/location update-cmd' | |
exit 1 | |
} | |
# Verify if CA TRUST is EMPTY if not BACKUP | |
if [ -d /etc/pki/ca-trust/source/anchors/ ] && [ -n "$(ls -A /etc/pki/ca-trust/source/anchors/)" ]; then | |
echo "NOT-EMPTY"; find /etc/pki/ca-trust/source/anchors/ -type f -iregex '.*\.p7b$' -exec echo {} {}.BACKUP-`date +%s` \;; | |
else | |
echo "EMPTY"; | |
fi | |
# Download and extract the bundle | |
cd $certdir | |
wget -qP tmp $bundle | |
unzip -qj tmp/${bundle##*/} -d tmp | |
# Convert the PKCS#7 bundle into individual PEM files | |
openssl pkcs7 -print_certs -in tmp/*.pem.p7b | | |
awk 'BEGIN {c=0} /subject=/ {c++} {print > "cert." c ".pem"}' | |
# Rename the files based on the CA name | |
for i in *.pem; do | |
name=$(openssl x509 -noout -subject -in $i | | |
awk -F '(=|= )' '{gsub(/ /, "_", $NF); print $NF}' | |
) | |
mv $i ${name}.crt | |
done | |
# Remove temp files and update certificate stores | |
rm -fr tmp | |
$update | |
} | |
# Only execute if not being sourced | |
[[ ${BASH_SOURCE[0]} == "$0" ]] && main "$@" |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Found a very clever script for DoD root CA Certs; updated the awk regex expression within the URL variable from /dod.zip/ to /dod.zip/