Added certificate fingerprints, issuers, subject fields, and storing unique domain records only
This commit is contained in:
parent
93e7dcd529
commit
b01e4fbbf1
@ -1,6 +1,6 @@
|
||||
#!/usr/bin/env python
|
||||
# Elasticsearch Recon Ingestion Scripts (ERIS) - Developed by Acidvegas (https://git.acid.vegas/eris)
|
||||
# ingest_certstream.py
|
||||
# ingestors/ingest_certstream.py
|
||||
|
||||
import asyncio
|
||||
import json
|
||||
@ -16,10 +16,6 @@ except ImportError:
|
||||
# Set a default elasticsearch index if one is not provided
|
||||
default_index = 'eris-certstream'
|
||||
|
||||
# Set the cache size for the Certstream records to prevent duplicates
|
||||
cache = []
|
||||
cache_size = 5000
|
||||
|
||||
|
||||
def construct_map() -> dict:
|
||||
'''Construct the Elasticsearch index mapping for Certstream records.'''
|
||||
@ -31,8 +27,20 @@ def construct_map() -> dict:
|
||||
mapping = {
|
||||
'mappings': {
|
||||
'properties' : {
|
||||
'domain' : keyword_mapping,
|
||||
'seen' : { 'type': 'date' }
|
||||
'domain' : keyword_mapping,
|
||||
'fingerprint' : keyword_mapping,
|
||||
'issuer' : keyword_mapping,
|
||||
'subject' : {
|
||||
'type' : 'object',
|
||||
'properties': {
|
||||
'C': { 'type': 'keyword' },
|
||||
'CN': { 'type': 'keyword' },
|
||||
'L': { 'type': 'keyword' },
|
||||
'O': { 'type': 'keyword' },
|
||||
'OU': { 'type': 'keyword' }
|
||||
}
|
||||
},
|
||||
'seen' : { 'type': 'date' }
|
||||
}
|
||||
}
|
||||
}
|
||||
@ -47,49 +55,52 @@ async def process_data(place_holder: str = None):
|
||||
:param place_holder: Placeholder parameter to match the process_data function signature of other ingestors.
|
||||
'''
|
||||
|
||||
async for websocket in websockets.connect('wss://certstream.calidog.io', ping_interval=15, ping_timeout=60):
|
||||
# Loop until the user interrupts the process
|
||||
while True:
|
||||
try:
|
||||
# Read the websocket stream
|
||||
async for line in websocket:
|
||||
|
||||
# Parse the JSON record
|
||||
try:
|
||||
record = json.loads(line)
|
||||
except json.decoder.JSONDecodeError:
|
||||
logging.error(f'Invalid line from the websocket: {line}')
|
||||
continue
|
||||
# Connect to the Certstream websocket
|
||||
async for websocket in websockets.connect('wss://certstream.calidog.io', ping_interval=15, ping_timeout=60):
|
||||
|
||||
# Grab the unique domains from the records
|
||||
all_domains = set(record['data']['leaf_cert']['all_domains'])
|
||||
domains = list()
|
||||
# Read the websocket stream
|
||||
async for line in websocket:
|
||||
|
||||
# We only care about subdomains (excluding www. and wildcards)
|
||||
for domain in all_domains:
|
||||
if domain.startswith('*.'):
|
||||
domain = domain[2:]
|
||||
if domain.startswith('www.') and domain.count('.') == 2:
|
||||
# Parse the JSON record
|
||||
try:
|
||||
record = json.loads(line)
|
||||
except json.decoder.JSONDecodeError:
|
||||
logging.error(f'Invalid line from the websocket: {line}')
|
||||
continue
|
||||
if domain.count('.') > 1:
|
||||
# TODO: Add a check for PSL TLDs...domain.co.uk, domain.com.au, etc. (we want to ignore these if they are not subdomains)
|
||||
if domain not in domains:
|
||||
domains.append(domain)
|
||||
|
||||
# Construct the document
|
||||
for domain in domains:
|
||||
if domain in cache:
|
||||
continue # Skip the domain if it is already in the cache
|
||||
# Grab the unique domains from the records
|
||||
all_domains = set(record['data']['leaf_cert']['all_domains'])
|
||||
fingerprint = record['data']['leaf_cert']['fingerprint']
|
||||
issuer = record['data']['leaf_cert']['issuer']['O']
|
||||
subject = {k: v for k, v in record['data']['leaf_cert']['subject'].items() if v is not None}
|
||||
|
||||
if len(cache) >= cache_size:
|
||||
cache.pop(0) # Remove the oldest domain from the cache
|
||||
# Create a record for each domain
|
||||
for domain in all_domains:
|
||||
if domain.startswith('*.'):
|
||||
domain = domain[2:]
|
||||
if domain in all_domains:
|
||||
continue
|
||||
|
||||
cache.append(domain) # Add the domain to the cache
|
||||
# Construct the document
|
||||
struct = {
|
||||
'domain' : domain,
|
||||
'fingerprint' : fingerprint,
|
||||
'issuer' : issuer,
|
||||
'subject' : subject,
|
||||
'seen' : time.strftime('%Y-%m-%dT%H:%M:%SZ', time.gmtime())
|
||||
}
|
||||
|
||||
struct = {
|
||||
'domain' : domain,
|
||||
'seen' : time.strftime('%Y-%m-%dT%H:%M:%SZ', time.gmtime())
|
||||
}
|
||||
|
||||
yield {'_index': default_index, '_source': struct}
|
||||
yield {
|
||||
'_op_type' : 'update',
|
||||
'_id' : domain,
|
||||
'_index' : default_index,
|
||||
'doc' : struct,
|
||||
'doc_as_upsert' : True
|
||||
}
|
||||
|
||||
except websockets.ConnectionClosed as e :
|
||||
logging.error(f'Connection to Certstream was closed. Attempting to reconnect... ({e})')
|
||||
@ -109,76 +120,4 @@ async def test():
|
||||
|
||||
|
||||
if __name__ == '__main__':
|
||||
asyncio.run(test())
|
||||
|
||||
|
||||
|
||||
'''
|
||||
Output:
|
||||
{
|
||||
"data": {
|
||||
"cert_index": 43061646,
|
||||
"cert_link": "https://yeti2025.ct.digicert.com/log/ct/v1/get-entries?start=43061646&end=43061646",
|
||||
"leaf_cert": {
|
||||
"all_domains": [
|
||||
"*.d7zdnegbre53n.amplifyapp.com",
|
||||
"d7zdnegbre53n.amplifyapp.com"
|
||||
],
|
||||
"extensions": {
|
||||
"authorityInfoAccess" : "CA Issuers - URI:http://crt.r2m02.amazontrust.com/r2m02.cer\nOCSP - URI:http://ocsp.r2m02.amazontrust.com\n",
|
||||
"authorityKeyIdentifier" : "keyid:C0:31:52:CD:5A:50:C3:82:7C:74:71:CE:CB:E9:9C:F9:7A:EB:82:E2\n",
|
||||
"basicConstraints" : "CA:FALSE",
|
||||
"certificatePolicies" : "Policy: 2.23.140.1.2.1",
|
||||
"crlDistributionPoints" : "Full Name:\n URI:http://crl.r2m02.amazontrust.com/r2m02.crl",
|
||||
"ctlPoisonByte" : true,
|
||||
"extendedKeyUsage" : "TLS Web server authentication, TLS Web client authentication",
|
||||
"keyUsage" : "Digital Signature, Key Encipherment",
|
||||
"subjectAltName" : "DNS:d7zdnegbre53n.amplifyapp.com, DNS:*.d7zdnegbre53n.amplifyapp.com",
|
||||
"subjectKeyIdentifier" : "59:32:78:2A:11:03:62:55:BB:3B:B9:80:24:76:28:90:2E:D1:A4:56"
|
||||
},
|
||||
"fingerprint": "D9:05:A3:D5:AA:F9:68:BC:0C:0A:15:69:C9:5E:11:92:32:67:4F:FA",
|
||||
"issuer": {
|
||||
"C" : "US",
|
||||
"CN" : "Amazon RSA 2048 M02",
|
||||
"L" : null,
|
||||
"O" : "Amazon",
|
||||
"OU" : null,
|
||||
"ST" : null,
|
||||
"aggregated" : "/C=US/CN=Amazon RSA 2048 M02/O=Amazon",
|
||||
"emailAddress" : null
|
||||
},
|
||||
"not_after" : 1743811199,
|
||||
"not_before" : 1709596800,
|
||||
"serial_number" : "FDB450C1942E3D30A18737063449E62",
|
||||
"signature_algorithm" : "sha256, rsa",
|
||||
"subject": {
|
||||
"C" : null,
|
||||
"CN" : "*.d7zdnegbre53n.amplifyapp.com",
|
||||
"L" : null,
|
||||
"O" : null,
|
||||
"OU" : null,
|
||||
"ST" : null,
|
||||
"aggregated" : "/CN=*.d7zdnegbre53n.amplifyapp.com",
|
||||
"emailAddress" : null
|
||||
}
|
||||
},
|
||||
"seen": 1709651773.594684,
|
||||
"source": {
|
||||
"name" : "DigiCert Yeti2025 Log",
|
||||
"url" : "https://yeti2025.ct.digicert.com/log/"
|
||||
},
|
||||
"update_type": "PrecertLogEntry"
|
||||
},
|
||||
"message_type": "certificate_update"
|
||||
}
|
||||
|
||||
|
||||
Input:
|
||||
{
|
||||
"domain" : "d7zdnegbre53n.amplifyapp.com",
|
||||
"seen" : "2022-01-02T12:00:00Z"
|
||||
}
|
||||
|
||||
Notes:
|
||||
- Fix the "no close frame received or sent" error
|
||||
'''
|
||||
asyncio.run(test())
|
Loading…
Reference in New Issue
Block a user