2020-09-18 09:00:27 +00:00
|
|
|
#!rsc by RouterOS
|
2018-07-05 13:29:26 +00:00
|
|
|
# RouterOS script: check-certificates
|
2022-01-01 20:38:15 +00:00
|
|
|
# Copyright (c) 2013-2022 Christian Hesse <mail@eworm.de>
|
2020-06-19 20:17:42 +00:00
|
|
|
# https://git.eworm.de/cgit/routeros-scripts/about/COPYING.md
|
2018-07-05 13:29:26 +00:00
|
|
|
#
|
|
|
|
# check for certificate validity
|
2020-03-27 20:41:18 +00:00
|
|
|
# https://git.eworm.de/cgit/routeros-scripts/about/doc/check-certificates.md
|
2018-07-05 13:29:26 +00:00
|
|
|
|
2021-02-22 14:14:10 +00:00
|
|
|
:local 0 "check-certificates";
|
2021-02-18 13:52:47 +00:00
|
|
|
:global GlobalFunctionsReady;
|
|
|
|
:while ($GlobalFunctionsReady != true) do={ :delay 500ms; }
|
|
|
|
|
global: variable names are CamelCase
___ _ ___ __
/ _ )(_)__ _ / _/__ _/ /_
/ _ / / _ `/ / _/ _ `/ __/
/____/_/\_, / /_/ \_,_/\__/
_ __ /___/ _ __
| | / /___ __________ (_)___ ____ _/ /
| | /| / / __ `/ ___/ __ \/ / __ \/ __ `/ /
| |/ |/ / /_/ / / / / / / / / / / /_/ /_/
|__/|__/\__,_/_/ /_/ /_/_/_/ /_/\__, (_)
/____/
RouterOS has some odd behavior when it comes to variable names. Let's
have a look at the interfaces:
[admin@MikroTik] > / interface print where name=en1
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU
0 RS en1 ether 1500 1598
That looks ok. Now we use a script:
{ :local interface "en1";
/ interface print where name=$interface; }
And the result...
[admin@MikroTik] > { :local interface "en1";
{... / interface print where name=$interface; }
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU
0 RS en1 ether 1500 1598
... still looks ok.
We make a little modification to the script:
{ :local name "en1";
/ interface print where name=$name; }
And the result:
[admin@MikroTik] > { :local name "en1";
{... / interface print where name=$name; }
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU
0 RS en1 ether 1500 1598
1 S en2 ether 1500 1598
2 S en3 ether 1500 1598
3 S en4 ether 1500 1598
4 S en5 ether 1500 1598
5 R br-local bridge 1500 1598
Ups! The filter has no effect!
That happens whenever the variable name ($name) matches the property
name (name=).
And another modification:
{ :local type "en1";
/ interface print where name=$type; }
And the result:
[admin@MikroTik] > { :local type "en1";
{... / interface print where name=$type; }
Flags: D - dynamic, X - disabled, R - running, S - slave
# NAME TYPE ACTUAL-MTU L2MTU
Ups! Nothing?
Even if the variable name ($type) matches whatever property name (type=)
things go wrong.
The answer from MikroTik support (in Ticket#2019010222000454):
> This is how scripting works in RouterOS and we will not fix it.
To get around this we use variable names in CamelCase. Let's hope
Mikrotik never ever introduces property names in CamelCase...
*fingers crossed*
2019-01-03 16:45:43 +00:00
|
|
|
:global CertRenewPass;
|
2020-12-18 15:02:31 +00:00
|
|
|
:global CertRenewTime;
|
2020-02-28 14:26:26 +00:00
|
|
|
:global CertRenewUrl;
|
|
|
|
:global Identity;
|
2018-07-05 13:29:26 +00:00
|
|
|
|
2020-04-03 12:12:09 +00:00
|
|
|
:global CertificateAvailable
|
2020-02-06 17:10:47 +00:00
|
|
|
:global CertificateNameByCN;
|
2020-07-16 19:18:12 +00:00
|
|
|
:global IfThenElse;
|
2021-02-22 14:14:10 +00:00
|
|
|
:global LogPrintExit2;
|
2019-07-17 14:28:22 +00:00
|
|
|
:global ParseKeyValueStore;
|
2021-04-27 18:58:19 +00:00
|
|
|
:global SendNotification2;
|
2020-07-17 09:52:54 +00:00
|
|
|
:global SymbolForNotification;
|
2019-04-10 12:47:20 +00:00
|
|
|
:global UrlEncode;
|
2019-04-18 08:39:32 +00:00
|
|
|
:global WaitForFile;
|
2020-08-21 21:13:47 +00:00
|
|
|
:global WaitFullyConnected;
|
2018-10-09 13:52:08 +00:00
|
|
|
|
2019-03-28 12:32:08 +00:00
|
|
|
:local FormatExpire do={
|
|
|
|
:global CharacterReplace;
|
|
|
|
:return [ $CharacterReplace [ $CharacterReplace [ :tostr $1 ] "w" "w " ] "d" "d " ];
|
|
|
|
}
|
|
|
|
|
2020-08-21 21:13:47 +00:00
|
|
|
$WaitFullyConnected;
|
2020-02-24 10:12:45 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
:foreach Cert in=[ /certificate/find where !revoked !ca !scep-url expires-after<$CertRenewTime ] do={
|
|
|
|
:local CertVal [ /certificate/get $Cert ];
|
2018-07-05 13:29:26 +00:00
|
|
|
|
2019-01-09 21:18:58 +00:00
|
|
|
:do {
|
|
|
|
:if ([ :len $CertRenewUrl ] = 0) do={
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 info $0 ("No CertRenewUrl given.") true;
|
2019-01-09 21:18:58 +00:00
|
|
|
}
|
2021-03-21 21:22:52 +00:00
|
|
|
$LogPrintExit2 info $0 ("Attempting to renew certificate " . ($CertVal->"name") . ".") false;
|
2018-12-20 14:55:40 +00:00
|
|
|
|
2019-04-10 12:15:41 +00:00
|
|
|
:foreach Type in={ ".pem"; ".p12" } do={
|
2019-05-20 14:25:36 +00:00
|
|
|
:local CertFileName ([ $UrlEncode ($CertVal->"common-name") ] . $Type);
|
2019-04-10 12:15:41 +00:00
|
|
|
:do {
|
2022-05-10 12:42:19 +00:00
|
|
|
/tool/fetch check-certificate=yes-without-crl \
|
2021-02-24 21:14:33 +00:00
|
|
|
($CertRenewUrl . $CertFileName) dst-path=$CertFileName as-value;
|
2019-04-18 08:39:32 +00:00
|
|
|
$WaitForFile $CertFileName;
|
2019-04-10 12:15:41 +00:00
|
|
|
:foreach PassPhrase in=$CertRenewPass do={
|
2022-05-10 12:42:19 +00:00
|
|
|
/certificate/import file-name=$CertFileName passphrase=$PassPhrase as-value;
|
2019-04-10 12:15:41 +00:00
|
|
|
}
|
2022-05-10 12:42:19 +00:00
|
|
|
/file/remove [ find where name=$CertFileName ];
|
2020-02-06 17:10:47 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
:foreach CertInChain in=[ /certificate/find where name~("^" . $CertFileName . "_[0-9]+\$") common-name!=($CertVal->"common-name") ] do={
|
|
|
|
$CertificateNameByCN [ /certificate/get $CertInChain common-name ];
|
2020-02-06 17:10:47 +00:00
|
|
|
}
|
2019-04-10 12:15:41 +00:00
|
|
|
} on-error={
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 debug $0 ("Could not download certificate file " . $CertFileName) false;
|
2019-04-10 12:15:41 +00:00
|
|
|
}
|
2019-04-01 20:45:38 +00:00
|
|
|
}
|
2018-12-20 14:55:40 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
:local CertNew [ /certificate/find where common-name=($CertVal->"common-name") fingerprint!=[ :tostr ($CertVal->"fingerprint") ] expires-after>$CertRenewTime ];
|
|
|
|
:local CertNewVal [ /certificate/get $CertNew ];
|
2018-12-20 14:55:40 +00:00
|
|
|
|
2020-04-03 12:36:32 +00:00
|
|
|
:if ([ $CertificateAvailable ([ $ParseKeyValueStore ($CertNewVal->"issuer") ]->"CN") ] = false) do={
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 warning $0 ("The certificate chain is not available!") false;
|
2020-04-03 12:36:32 +00:00
|
|
|
}
|
2020-04-03 12:12:09 +00:00
|
|
|
|
2019-07-31 19:04:06 +00:00
|
|
|
:if ($Cert != $CertNew) do={
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 debug $0 ("Certificate '" . $CertVal->"name" . "' was not updated, but replaced.") false;
|
2018-12-20 14:55:40 +00:00
|
|
|
|
2021-01-10 23:05:58 +00:00
|
|
|
:if (($CertVal->"private-key") = true && ($CertVal->"private-key") != ($CertNewVal->"private-key")) do={
|
2022-05-10 12:42:19 +00:00
|
|
|
/certificate/remove $CertNew;
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 warning $0 ("Old certificate '" . ($CertVal->"name") . "' has a private key, new certificate does not. Aborting renew.") true;
|
2021-01-10 23:05:58 +00:00
|
|
|
}
|
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
/ip/service/set certificate=($CertNewVal->"name") [ find where certificate=($CertVal->"name") ];
|
2019-03-25 15:49:26 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
/ip/ipsec/identity/set certificate=($CertNewVal->"name") [ find where certificate=($CertVal->"name") ];
|
|
|
|
/ip/ipsec/identity/set remote-certificate=($CertNewVal->"name") [ find where remote-certificate=($CertVal->"name") ];
|
2018-12-20 14:55:40 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
/ip/hotspot/profile/set ssl-certificate=($CertNewVal->"name") [ find where ssl-certificate=($CertVal->"name") ];
|
2019-07-31 19:04:06 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
/certificate/remove $Cert;
|
|
|
|
/certificate/set $CertNew name=($CertVal->"name");
|
2019-07-31 19:04:06 +00:00
|
|
|
}
|
2019-01-09 16:34:08 +00:00
|
|
|
|
2021-04-27 19:58:35 +00:00
|
|
|
$SendNotification2 ({ origin=$0; \
|
|
|
|
subject=([ $SymbolForNotification "lock-with-ink-pen" ] . "Certificate renewed"); \
|
2021-04-27 18:58:19 +00:00
|
|
|
message=("A certificate on " . $Identity . " has been renewed.\n\n" . \
|
2019-05-20 14:25:36 +00:00
|
|
|
"Name: " . ($CertVal->"name") . "\n" . \
|
|
|
|
"CommonName: " . ($CertNewVal->"common-name") . "\n" . \
|
2021-01-10 22:53:24 +00:00
|
|
|
"Private key: " . [ $IfThenElse (($CertNewVal->"private-key") = true) "available" "missing" ] . "\n" . \
|
2019-05-20 14:25:36 +00:00
|
|
|
"Fingerprint: " . ($CertNewVal->"fingerprint") . "\n" . \
|
2019-07-17 14:28:22 +00:00
|
|
|
"Issuer: " . ([ $ParseKeyValueStore ($CertNewVal->"issuer") ]->"CN") . "\n" . \
|
2019-05-20 14:25:36 +00:00
|
|
|
"Validity: " . ($CertNewVal->"invalid-before") . " to " . ($CertNewVal->"invalid-after") . "\n" . \
|
2021-04-27 18:58:19 +00:00
|
|
|
"Expires in: " . [ $FormatExpire ($CertNewVal->"expires-after") ]); silent=true });
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 info $0 ("The certificate " . ($CertVal->"name") . " has been renewed.") false;
|
2019-01-09 21:18:58 +00:00
|
|
|
} on-error={
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 debug $0 ("Could not renew certificate " . ($CertVal->"name") . ".") false;
|
2019-03-06 12:49:12 +00:00
|
|
|
}
|
|
|
|
}
|
2019-01-09 10:43:30 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
:foreach Cert in=[ /certificate/find where !revoked !scep-url !(expires-after=[]) expires-after<2w !(fingerprint=[]) ] do={
|
|
|
|
:local CertVal [ /certificate/get $Cert ];
|
2019-05-20 14:25:36 +00:00
|
|
|
|
2022-05-10 12:42:19 +00:00
|
|
|
:if ([ :len [ /certificate/scep-server/find where ca-cert=($CertVal->"ca") ] ] > 0) do={
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 debug $0 ("Certificate \"" . ($CertVal->"name") . "\" is handled by SCEP, skipping.") false;
|
2020-04-24 12:26:00 +00:00
|
|
|
} else={
|
2020-07-16 19:18:12 +00:00
|
|
|
:local State [ $IfThenElse (($CertVal->"expired") = true) "expired" "is about to expire" ];
|
2019-03-06 12:49:12 +00:00
|
|
|
|
2021-04-27 19:58:35 +00:00
|
|
|
$SendNotification2 ({ origin=$0; \
|
|
|
|
subject=([ $SymbolForNotification "warning-sign" ] . "Certificate warning!"); \
|
2021-04-27 18:58:19 +00:00
|
|
|
message=("A certificate on " . $Identity . " " . $State . ".\n\n" . \
|
2020-04-24 12:26:00 +00:00
|
|
|
"Name: " . ($CertVal->"name") . "\n" . \
|
|
|
|
"CommonName: " . ($CertVal->"common-name") . "\n" . \
|
2021-05-21 06:31:45 +00:00
|
|
|
"Private key: " . [ $IfThenElse (($CertVal->"private-key") = true) "available" "missing" ] . "\n" . \
|
2020-04-24 12:26:00 +00:00
|
|
|
"Fingerprint: " . ($CertVal->"fingerprint") . "\n" . \
|
|
|
|
"Issuer: " . ($CertVal->"ca") . ([ $ParseKeyValueStore ($CertVal->"issuer") ]->"CN") . "\n" . \
|
|
|
|
"Validity: " . ($CertVal->"invalid-before") . " to " . ($CertVal->"invalid-after") . "\n" . \
|
2021-04-27 18:58:19 +00:00
|
|
|
"Expires in: " . [ $IfThenElse (($CertVal->"expired") = true) "expired" [ $FormatExpire ($CertVal->"expires-after") ] ]) });
|
2021-02-22 14:14:10 +00:00
|
|
|
$LogPrintExit2 info $0 ("The certificate " . ($CertVal->"name") . " " . $State . \
|
2020-04-24 12:26:00 +00:00
|
|
|
", it is invalid after " . ($CertVal->"invalid-after") . ".") false;
|
|
|
|
}
|
2018-07-05 13:29:26 +00:00
|
|
|
}
|