Mercurial Hosting > luan
view src/org/eclipse/jetty/util/ssl/SslContextFactory.java @ 848:22a4e93ed20e
remove Container
author | Franklin Schmidt <fschmidt@gmail.com> |
---|---|
date | Mon, 19 Sep 2016 16:38:36 -0600 |
parents | 8e9db0bbf4f9 |
children | 35d04ac3fd0b |
line wrap: on
line source
// // ======================================================================== // Copyright (c) 1995-2014 Mort Bay Consulting Pty. Ltd. // ------------------------------------------------------------------------ // All rights reserved. This program and the accompanying materials // are made available under the terms of the Eclipse Public License v1.0 // and Apache License v2.0 which accompanies this distribution. // // The Eclipse Public License is available at // http://www.eclipse.org/legal/epl-v10.html // // The Apache License v2.0 is available at // http://www.opensource.org/licenses/apache2.0.php // // You may elect to redistribute this code under either of these licenses. // ======================================================================== // package org.eclipse.jetty.util.ssl; import java.io.ByteArrayInputStream; import java.io.ByteArrayOutputStream; import java.io.File; import java.io.IOException; import java.io.InputStream; import java.net.InetAddress; import java.security.InvalidParameterException; import java.security.KeyStore; import java.security.SecureRandom; import java.security.Security; import java.security.cert.CRL; import java.security.cert.CertStore; import java.security.cert.Certificate; import java.security.cert.CollectionCertStoreParameters; import java.security.cert.PKIXBuilderParameters; import java.security.cert.X509CertSelector; import java.util.Arrays; import java.util.Collection; import java.util.Collections; import java.util.LinkedHashSet; import java.util.List; import java.util.Set; import javax.net.ssl.CertPathTrustManagerParameters; import javax.net.ssl.KeyManager; import javax.net.ssl.KeyManagerFactory; import javax.net.ssl.SSLContext; import javax.net.ssl.SSLEngine; import javax.net.ssl.SSLServerSocket; import javax.net.ssl.SSLServerSocketFactory; import javax.net.ssl.SSLSocket; import javax.net.ssl.SSLSocketFactory; import javax.net.ssl.TrustManager; import javax.net.ssl.TrustManagerFactory; import javax.net.ssl.X509KeyManager; import javax.net.ssl.X509TrustManager; import org.eclipse.jetty.util.IO; import org.eclipse.jetty.util.component.AbstractLifeCycle; import org.slf4j.Logger; import org.slf4j.LoggerFactory; import org.eclipse.jetty.util.resource.Resource; import org.eclipse.jetty.util.security.CertificateUtils; import org.eclipse.jetty.util.security.CertificateValidator; import org.eclipse.jetty.util.security.Password; /* ------------------------------------------------------------ */ /** * SslContextFactory is used to configure SSL connectors * as well as HttpClient. It holds all SSL parameters and * creates SSL context based on these parameters to be * used by the SSL connectors. */ public class SslContextFactory extends AbstractLifeCycle { public final static TrustManager[] TRUST_ALL_CERTS = new X509TrustManager[]{new X509TrustManager() { public java.security.cert.X509Certificate[] getAcceptedIssuers() { return new java.security.cert.X509Certificate[]{}; } public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) { } public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) { } }}; private static final Logger LOG = LoggerFactory.getLogger(SslContextFactory.class); public static final String DEFAULT_KEYMANAGERFACTORY_ALGORITHM = (Security.getProperty("ssl.KeyManagerFactory.algorithm") == null ? "SunX509" : Security.getProperty("ssl.KeyManagerFactory.algorithm")); public static final String DEFAULT_TRUSTMANAGERFACTORY_ALGORITHM = (Security.getProperty("ssl.TrustManagerFactory.algorithm") == null ? "SunX509" : Security.getProperty("ssl.TrustManagerFactory.algorithm")); /** Default value for the keystore location path. */ public static final String DEFAULT_KEYSTORE_PATH = System.getProperty("user.home") + File.separator + ".keystore"; /** String name of key password property. */ public static final String KEYPASSWORD_PROPERTY = "org.eclipse.jetty.ssl.keypassword"; /** String name of keystore password property. */ public static final String PASSWORD_PROPERTY = "org.eclipse.jetty.ssl.password"; /** Excluded protocols. */ private final Set<String> _excludeProtocols = new LinkedHashSet<String>(); /** Included protocols. */ private Set<String> _includeProtocols = null; /** Excluded cipher suites. */ private final Set<String> _excludeCipherSuites = new LinkedHashSet<String>(); /** Included cipher suites. */ private Set<String> _includeCipherSuites = null; /** Keystore path. */ private String _keyStorePath; /** Keystore provider name */ private String _keyStoreProvider; /** Keystore type */ private String _keyStoreType = "JKS"; /** Keystore input stream */ private InputStream _keyStoreInputStream; /** SSL certificate alias */ private String _certAlias; /** Truststore path */ private String _trustStorePath; /** Truststore provider name */ private String _trustStoreProvider; /** Truststore type */ private String _trustStoreType = "JKS"; /** Truststore input stream */ private InputStream _trustStoreInputStream; /** Set to true if client certificate authentication is required */ private boolean _needClientAuth = false; /** Set to true if client certificate authentication is desired */ private boolean _wantClientAuth = false; /** Set to true if renegotiation is allowed */ private boolean _allowRenegotiate = true; /** Keystore password */ private transient Password _keyStorePassword; /** Key manager password */ private transient Password _keyManagerPassword; /** Truststore password */ private transient Password _trustStorePassword; /** SSL provider name */ private String _sslProvider; /** SSL protocol name */ private String _sslProtocol = "TLS"; /** SecureRandom algorithm */ private String _secureRandomAlgorithm; /** KeyManager factory algorithm */ private String _keyManagerFactoryAlgorithm = DEFAULT_KEYMANAGERFACTORY_ALGORITHM; /** TrustManager factory algorithm */ private String _trustManagerFactoryAlgorithm = DEFAULT_TRUSTMANAGERFACTORY_ALGORITHM; /** Set to true if SSL certificate validation is required */ private boolean _validateCerts; /** Set to true if SSL certificate of the peer validation is required */ private boolean _validatePeerCerts; /** Maximum certification path length (n - number of intermediate certs, -1 for unlimited) */ private int _maxCertPathLength = -1; /** Path to file that contains Certificate Revocation List */ private String _crlPath; /** Set to true to enable CRL Distribution Points (CRLDP) support */ private boolean _enableCRLDP = false; /** Set to true to enable On-Line Certificate Status Protocol (OCSP) support */ private boolean _enableOCSP = false; /** Location of OCSP Responder */ private String _ocspResponderURL; /** SSL keystore */ private KeyStore _keyStore; /** SSL truststore */ private KeyStore _trustStore; /** Set to true to enable SSL Session caching */ private boolean _sessionCachingEnabled = true; /** SSL session cache size */ private int _sslSessionCacheSize; /** SSL session timeout */ private int _sslSessionTimeout; /** SSL context */ private SSLContext _context; private boolean _trustAll; /* ------------------------------------------------------------ */ /** * Construct an instance of SslContextFactory * Default constructor for use in XmlConfiguration files */ public SslContextFactory() { _trustAll=true; } /* ------------------------------------------------------------ */ /** * Construct an instance of SslContextFactory * Default constructor for use in XmlConfiguration files * @param trustAll whether to blindly trust all certificates * @see #setTrustAll(boolean) */ public SslContextFactory(boolean trustAll) { _trustAll=trustAll; } /* ------------------------------------------------------------ */ /** * Construct an instance of SslContextFactory * @param keyStorePath default keystore location */ public SslContextFactory(String keyStorePath) { _keyStorePath = keyStorePath; } /* ------------------------------------------------------------ */ /** * Create the SSLContext object and start the lifecycle * @see org.eclipse.jetty.util.component.AbstractLifeCycle#doStart() */ @Override protected void doStart() throws Exception { if (_context == null) { if (_keyStore==null && _keyStoreInputStream == null && _keyStorePath == null && _trustStore==null && _trustStoreInputStream == null && _trustStorePath == null ) { TrustManager[] trust_managers=null; if (_trustAll) { LOG.debug("No keystore or trust store configured. ACCEPTING UNTRUSTED CERTIFICATES!!!!!"); // Create a trust manager that does not validate certificate chains trust_managers = TRUST_ALL_CERTS; } SecureRandom secureRandom = (_secureRandomAlgorithm == null)?null:SecureRandom.getInstance(_secureRandomAlgorithm); _context = SSLContext.getInstance(_sslProtocol); _context.init(null, trust_managers, secureRandom); } else { // verify that keystore and truststore // parameters are set up correctly checkKeyStore(); KeyStore keyStore = loadKeyStore(); KeyStore trustStore = loadTrustStore(); Collection<? extends CRL> crls = loadCRL(_crlPath); if (_validateCerts && keyStore != null) { if (_certAlias == null) { List<String> aliases = Collections.list(keyStore.aliases()); _certAlias = aliases.size() == 1 ? aliases.get(0) : null; } Certificate cert = _certAlias == null?null:keyStore.getCertificate(_certAlias); if (cert == null) { throw new Exception("No certificate found in the keystore" + (_certAlias==null ? "":" for alias " + _certAlias)); } CertificateValidator validator = new CertificateValidator(trustStore, crls); validator.setMaxCertPathLength(_maxCertPathLength); validator.setEnableCRLDP(_enableCRLDP); validator.setEnableOCSP(_enableOCSP); validator.setOcspResponderURL(_ocspResponderURL); validator.validate(keyStore, cert); } KeyManager[] keyManagers = getKeyManagers(keyStore); TrustManager[] trustManagers = getTrustManagers(trustStore,crls); SecureRandom secureRandom = (_secureRandomAlgorithm == null)?null:SecureRandom.getInstance(_secureRandomAlgorithm); _context = (_sslProvider == null)?SSLContext.getInstance(_sslProtocol):SSLContext.getInstance(_sslProtocol,_sslProvider); _context.init(keyManagers,trustManagers,secureRandom); SSLEngine engine=newSslEngine(); LOG.info("Enabled Protocols {} of {}",Arrays.asList(engine.getEnabledProtocols()),Arrays.asList(engine.getSupportedProtocols())); if (LOG.isDebugEnabled()) LOG.debug("Enabled Ciphers {} of {}",Arrays.asList(engine.getEnabledCipherSuites()),Arrays.asList(engine.getSupportedCipherSuites())); } } } /* ------------------------------------------------------------ */ /** * @return The array of protocol names to exclude from * {@link SSLEngine#setEnabledProtocols(String[])} */ public String[] getExcludeProtocols() { return _excludeProtocols.toArray(new String[_excludeProtocols.size()]); } /* ------------------------------------------------------------ */ /** * @param protocols * The array of protocol names to exclude from * {@link SSLEngine#setEnabledProtocols(String[])} */ public void setExcludeProtocols(String... protocols) { checkNotStarted(); _excludeProtocols.clear(); _excludeProtocols.addAll(Arrays.asList(protocols)); } /* ------------------------------------------------------------ */ /** * @param protocol Protocol names to add to {@link SSLEngine#setEnabledProtocols(String[])} */ public void addExcludeProtocols(String... protocol) { checkNotStarted(); _excludeProtocols.addAll(Arrays.asList(protocol)); } /* ------------------------------------------------------------ */ /** * @return The array of protocol names to include in * {@link SSLEngine#setEnabledProtocols(String[])} */ public String[] getIncludeProtocols() { return _includeProtocols.toArray(new String[_includeProtocols.size()]); } /* ------------------------------------------------------------ */ /** * @param protocols * The array of protocol names to include in * {@link SSLEngine#setEnabledProtocols(String[])} */ public void setIncludeProtocols(String... protocols) { checkNotStarted(); _includeProtocols = new LinkedHashSet<String>(Arrays.asList(protocols)); } /* ------------------------------------------------------------ */ /** * @return The array of cipher suite names to exclude from * {@link SSLEngine#setEnabledCipherSuites(String[])} */ public String[] getExcludeCipherSuites() { return _excludeCipherSuites.toArray(new String[_excludeCipherSuites.size()]); } /* ------------------------------------------------------------ */ /** * @param cipherSuites * The array of cipher suite names to exclude from * {@link SSLEngine#setEnabledCipherSuites(String[])} */ public void setExcludeCipherSuites(String... cipherSuites) { checkNotStarted(); _excludeCipherSuites.clear(); _excludeCipherSuites.addAll(Arrays.asList(cipherSuites)); } /* ------------------------------------------------------------ */ /** * @param cipher Cipher names to add to {@link SSLEngine#setEnabledCipherSuites(String[])} */ public void addExcludeCipherSuites(String... cipher) { checkNotStarted(); _excludeCipherSuites.addAll(Arrays.asList(cipher)); } /* ------------------------------------------------------------ */ /** * @return The array of cipher suite names to include in * {@link SSLEngine#setEnabledCipherSuites(String[])} */ public String[] getIncludeCipherSuites() { return _includeCipherSuites.toArray(new String[_includeCipherSuites.size()]); } /* ------------------------------------------------------------ */ /** * @param cipherSuites * The array of cipher suite names to include in * {@link SSLEngine#setEnabledCipherSuites(String[])} */ public void setIncludeCipherSuites(String... cipherSuites) { checkNotStarted(); _includeCipherSuites = new LinkedHashSet<String>(Arrays.asList(cipherSuites)); } /* ------------------------------------------------------------ */ /** * @return The file or URL of the SSL Key store. */ public String getKeyStorePath() { return _keyStorePath; } /* ------------------------------------------------------------ */ @Deprecated public String getKeyStore() { return _keyStorePath; } /* ------------------------------------------------------------ */ /** * @param keyStorePath * The file or URL of the SSL Key store. */ public void setKeyStorePath(String keyStorePath) { checkNotStarted(); _keyStorePath = keyStorePath; } /* ------------------------------------------------------------ */ /** * @param keyStorePath the file system path or URL of the keystore * @deprecated Use {@link #setKeyStorePath(String)} */ @Deprecated public void setKeyStore(String keyStorePath) { checkNotStarted(); _keyStorePath = keyStorePath; } /* ------------------------------------------------------------ */ /** * @return The provider of the key store */ public String getKeyStoreProvider() { return _keyStoreProvider; } /* ------------------------------------------------------------ */ /** * @param keyStoreProvider * The provider of the key store */ public void setKeyStoreProvider(String keyStoreProvider) { checkNotStarted(); _keyStoreProvider = keyStoreProvider; } /* ------------------------------------------------------------ */ /** * @return The type of the key store (default "JKS") */ public String getKeyStoreType() { return (_keyStoreType); } /* ------------------------------------------------------------ */ /** * @param keyStoreType * The type of the key store (default "JKS") */ public void setKeyStoreType(String keyStoreType) { checkNotStarted(); _keyStoreType = keyStoreType; } /* ------------------------------------------------------------ */ /** Get the _keyStoreInputStream. * @return the _keyStoreInputStream * * @deprecated */ @Deprecated public InputStream getKeyStoreInputStream() { checkKeyStore(); return _keyStoreInputStream; } /* ------------------------------------------------------------ */ /** Set the keyStoreInputStream. * @param keyStoreInputStream the InputStream to the KeyStore * * @deprecated Use {@link #setKeyStore(KeyStore)} */ @Deprecated public void setKeyStoreInputStream(InputStream keyStoreInputStream) { checkNotStarted(); _keyStoreInputStream = keyStoreInputStream; } /* ------------------------------------------------------------ */ /** * @return Alias of SSL certificate for the connector */ public String getCertAlias() { return _certAlias; } /* ------------------------------------------------------------ */ /** * @param certAlias * Alias of SSL certificate for the connector */ public void setCertAlias(String certAlias) { checkNotStarted(); _certAlias = certAlias; } /* ------------------------------------------------------------ */ /** * @return The file name or URL of the trust store location */ public String getTrustStore() { return _trustStorePath; } /* ------------------------------------------------------------ */ /** * @param trustStorePath * The file name or URL of the trust store location */ public void setTrustStore(String trustStorePath) { checkNotStarted(); _trustStorePath = trustStorePath; } /* ------------------------------------------------------------ */ /** * @return The provider of the trust store */ public String getTrustStoreProvider() { return _trustStoreProvider; } /* ------------------------------------------------------------ */ /** * @param trustStoreProvider * The provider of the trust store */ public void setTrustStoreProvider(String trustStoreProvider) { checkNotStarted(); _trustStoreProvider = trustStoreProvider; } /* ------------------------------------------------------------ */ /** * @return The type of the trust store (default "JKS") */ public String getTrustStoreType() { return _trustStoreType; } /* ------------------------------------------------------------ */ /** * @param trustStoreType * The type of the trust store (default "JKS") */ public void setTrustStoreType(String trustStoreType) { checkNotStarted(); _trustStoreType = trustStoreType; } /* ------------------------------------------------------------ */ /** Get the _trustStoreInputStream. * @return the _trustStoreInputStream * * @deprecated */ @Deprecated public InputStream getTrustStoreInputStream() { checkKeyStore(); return _trustStoreInputStream; } /* ------------------------------------------------------------ */ /** Set the _trustStoreInputStream. * @param trustStoreInputStream the InputStream to the TrustStore * * @deprecated */ @Deprecated public void setTrustStoreInputStream(InputStream trustStoreInputStream) { checkNotStarted(); _trustStoreInputStream = trustStoreInputStream; } /* ------------------------------------------------------------ */ /** * @return True if SSL needs client authentication. * @see SSLEngine#getNeedClientAuth() */ public boolean getNeedClientAuth() { return _needClientAuth; } /* ------------------------------------------------------------ */ /** * @param needClientAuth * True if SSL needs client authentication. * @see SSLEngine#getNeedClientAuth() */ public void setNeedClientAuth(boolean needClientAuth) { checkNotStarted(); _needClientAuth = needClientAuth; } /* ------------------------------------------------------------ */ /** * @return True if SSL wants client authentication. * @see SSLEngine#getWantClientAuth() */ public boolean getWantClientAuth() { return _wantClientAuth; } /* ------------------------------------------------------------ */ /** * @param wantClientAuth * True if SSL wants client authentication. * @see SSLEngine#getWantClientAuth() */ public void setWantClientAuth(boolean wantClientAuth) { checkNotStarted(); _wantClientAuth = wantClientAuth; } /* ------------------------------------------------------------ */ /** * @return true if SSL certificate has to be validated * @deprecated */ @Deprecated public boolean getValidateCerts() { return _validateCerts; } /* ------------------------------------------------------------ */ /** * @return true if SSL certificate has to be validated */ public boolean isValidateCerts() { return _validateCerts; } /* ------------------------------------------------------------ */ /** * @param validateCerts * true if SSL certificates have to be validated */ public void setValidateCerts(boolean validateCerts) { checkNotStarted(); _validateCerts = validateCerts; } /* ------------------------------------------------------------ */ /** * @return true if SSL certificates of the peer have to be validated */ public boolean isValidatePeerCerts() { return _validatePeerCerts; } /* ------------------------------------------------------------ */ /** * @param validatePeerCerts * true if SSL certificates of the peer have to be validated */ public void setValidatePeerCerts(boolean validatePeerCerts) { checkNotStarted(); _validatePeerCerts = validatePeerCerts; } /* ------------------------------------------------------------ */ /** * @return True if SSL re-negotiation is allowed (default false) */ public boolean isAllowRenegotiate() { return _allowRenegotiate; } /* ------------------------------------------------------------ */ /** * Set if SSL re-negotiation is allowed. CVE-2009-3555 discovered * a vulnerability in SSL/TLS with re-negotiation. If your JVM * does not have CVE-2009-3555 fixed, then re-negotiation should * not be allowed. CVE-2009-3555 was fixed in Sun java 1.6 with a ban * of renegotiates in u19 and with RFC5746 in u22. * * @param allowRenegotiate * true if re-negotiation is allowed (default false) */ public void setAllowRenegotiate(boolean allowRenegotiate) { checkNotStarted(); _allowRenegotiate = allowRenegotiate; } /* ------------------------------------------------------------ */ /** * @param password * The password for the key store */ public void setKeyStorePassword(String password) { checkNotStarted(); _keyStorePassword = Password.getPassword(PASSWORD_PROPERTY,password,null); } /* ------------------------------------------------------------ */ /** * @param password * The password (if any) for the specific key within the key store */ public void setKeyManagerPassword(String password) { checkNotStarted(); _keyManagerPassword = Password.getPassword(KEYPASSWORD_PROPERTY,password,null); } /* ------------------------------------------------------------ */ /** * @param password * The password for the trust store */ public void setTrustStorePassword(String password) { checkNotStarted(); _trustStorePassword = Password.getPassword(PASSWORD_PROPERTY,password,null); } /* ------------------------------------------------------------ */ /** * @return The SSL provider name, which if set is passed to * {@link SSLContext#getInstance(String, String)} */ public String getProvider() { return _sslProvider; } /* ------------------------------------------------------------ */ /** * @param provider * The SSL provider name, which if set is passed to * {@link SSLContext#getInstance(String, String)} */ public void setProvider(String provider) { checkNotStarted(); _sslProvider = provider; } /* ------------------------------------------------------------ */ /** * @return The SSL protocol (default "TLS") passed to * {@link SSLContext#getInstance(String, String)} */ public String getProtocol() { return _sslProtocol; } /* ------------------------------------------------------------ */ /** * @param protocol * The SSL protocol (default "TLS") passed to * {@link SSLContext#getInstance(String, String)} */ public void setProtocol(String protocol) { checkNotStarted(); _sslProtocol = protocol; } /* ------------------------------------------------------------ */ /** * @return The algorithm name, which if set is passed to * {@link SecureRandom#getInstance(String)} to obtain the {@link SecureRandom} instance passed to * {@link SSLContext#init(javax.net.ssl.KeyManager[], javax.net.ssl.TrustManager[], SecureRandom)} */ public String getSecureRandomAlgorithm() { return _secureRandomAlgorithm; } /* ------------------------------------------------------------ */ /** * @param algorithm * The algorithm name, which if set is passed to * {@link SecureRandom#getInstance(String)} to obtain the {@link SecureRandom} instance passed to * {@link SSLContext#init(javax.net.ssl.KeyManager[], javax.net.ssl.TrustManager[], SecureRandom)} */ public void setSecureRandomAlgorithm(String algorithm) { checkNotStarted(); _secureRandomAlgorithm = algorithm; } /* ------------------------------------------------------------ */ /** * @return The algorithm name (default "SunX509") used by the {@link KeyManagerFactory} */ public String getSslKeyManagerFactoryAlgorithm() { return (_keyManagerFactoryAlgorithm); } /* ------------------------------------------------------------ */ /** * @param algorithm * The algorithm name (default "SunX509") used by the {@link KeyManagerFactory} */ public void setSslKeyManagerFactoryAlgorithm(String algorithm) { checkNotStarted(); _keyManagerFactoryAlgorithm = algorithm; } /* ------------------------------------------------------------ */ /** * @return The algorithm name (default "SunX509") used by the {@link TrustManagerFactory} */ public String getTrustManagerFactoryAlgorithm() { return (_trustManagerFactoryAlgorithm); } /* ------------------------------------------------------------ */ /** * @return True if all certificates should be trusted if there is no KeyStore or TrustStore */ public boolean isTrustAll() { return _trustAll; } /* ------------------------------------------------------------ */ /** * @param trustAll True if all certificates should be trusted if there is no KeyStore or TrustStore */ public void setTrustAll(boolean trustAll) { _trustAll = trustAll; } /* ------------------------------------------------------------ */ /** * @param algorithm * The algorithm name (default "SunX509") used by the {@link TrustManagerFactory} * Use the string "TrustAll" to install a trust manager that trusts all. */ public void setTrustManagerFactoryAlgorithm(String algorithm) { checkNotStarted(); _trustManagerFactoryAlgorithm = algorithm; } /* ------------------------------------------------------------ */ /** * @return Path to file that contains Certificate Revocation List */ public String getCrlPath() { return _crlPath; } /* ------------------------------------------------------------ */ /** * @param crlPath * Path to file that contains Certificate Revocation List */ public void setCrlPath(String crlPath) { checkNotStarted(); _crlPath = crlPath; } /* ------------------------------------------------------------ */ /** * @return Maximum number of intermediate certificates in * the certification path (-1 for unlimited) */ public int getMaxCertPathLength() { return _maxCertPathLength; } /* ------------------------------------------------------------ */ /** * @param maxCertPathLength * maximum number of intermediate certificates in * the certification path (-1 for unlimited) */ public void setMaxCertPathLength(int maxCertPathLength) { checkNotStarted(); _maxCertPathLength = maxCertPathLength; } /* ------------------------------------------------------------ */ /** * @return The SSLContext */ public SSLContext getSslContext() { if (!isStarted()) throw new IllegalStateException(getState()); return _context; } /* ------------------------------------------------------------ */ /** * @param sslContext * Set a preconfigured SSLContext */ public void setSslContext(SSLContext sslContext) { checkNotStarted(); _context = sslContext; } /* ------------------------------------------------------------ */ /** * Override this method to provide alternate way to load a keystore. * * @return the key store instance * @throws Exception if the keystore cannot be loaded */ protected KeyStore loadKeyStore() throws Exception { return _keyStore != null ? _keyStore : getKeyStore(_keyStoreInputStream, _keyStorePath, _keyStoreType, _keyStoreProvider, _keyStorePassword==null? null: _keyStorePassword.toString()); } /* ------------------------------------------------------------ */ /** * Override this method to provide alternate way to load a truststore. * * @return the key store instance * @throws Exception if the truststore cannot be loaded */ protected KeyStore loadTrustStore() throws Exception { return _trustStore != null ? _trustStore : getKeyStore(_trustStoreInputStream, _trustStorePath, _trustStoreType, _trustStoreProvider, _trustStorePassword==null? null: _trustStorePassword.toString()); } /* ------------------------------------------------------------ */ /** * Loads keystore using an input stream or a file path in the same * order of precedence. * * Required for integrations to be able to override the mechanism * used to load a keystore in order to provide their own implementation. * * @param storeStream keystore input stream * @param storePath path of keystore file * @param storeType keystore type * @param storeProvider keystore provider * @param storePassword keystore password * @return created keystore * @throws Exception if the keystore cannot be obtained * * @deprecated */ @Deprecated protected KeyStore getKeyStore(InputStream storeStream, String storePath, String storeType, String storeProvider, String storePassword) throws Exception { return CertificateUtils.getKeyStore(storeStream, storePath, storeType, storeProvider, storePassword); } /* ------------------------------------------------------------ */ /** * Loads certificate revocation list (CRL) from a file. * * Required for integrations to be able to override the mechanism used to * load CRL in order to provide their own implementation. * * @param crlPath path of certificate revocation list file * @return Collection of CRL's * @throws Exception if the certificate revocation list cannot be loaded */ protected Collection<? extends CRL> loadCRL(String crlPath) throws Exception { return CertificateUtils.loadCRL(crlPath); } /* ------------------------------------------------------------ */ protected KeyManager[] getKeyManagers(KeyStore keyStore) throws Exception { KeyManager[] managers = null; if (keyStore != null) { KeyManagerFactory keyManagerFactory = KeyManagerFactory.getInstance(_keyManagerFactoryAlgorithm); keyManagerFactory.init(keyStore,_keyManagerPassword == null?(_keyStorePassword == null?null:_keyStorePassword.toString().toCharArray()):_keyManagerPassword.toString().toCharArray()); managers = keyManagerFactory.getKeyManagers(); if (_certAlias != null) { for (int idx = 0; idx < managers.length; idx++) { if (managers[idx] instanceof X509KeyManager) { managers[idx] = new AliasedX509ExtendedKeyManager(_certAlias,(X509KeyManager)managers[idx]); } } } } return managers; } /* ------------------------------------------------------------ */ protected TrustManager[] getTrustManagers(KeyStore trustStore, Collection<? extends CRL> crls) throws Exception { TrustManager[] managers = null; if (trustStore != null) { // Revocation checking is only supported for PKIX algorithm if (_validatePeerCerts && _trustManagerFactoryAlgorithm.equalsIgnoreCase("PKIX")) { PKIXBuilderParameters pbParams = new PKIXBuilderParameters(trustStore,new X509CertSelector()); // Set maximum certification path length pbParams.setMaxPathLength(_maxCertPathLength); // Make sure revocation checking is enabled pbParams.setRevocationEnabled(true); if (crls != null && !crls.isEmpty()) { pbParams.addCertStore(CertStore.getInstance("Collection",new CollectionCertStoreParameters(crls))); } if (_enableCRLDP) { // Enable Certificate Revocation List Distribution Points (CRLDP) support System.setProperty("com.sun.security.enableCRLDP","true"); } if (_enableOCSP) { // Enable On-Line Certificate Status Protocol (OCSP) support Security.setProperty("ocsp.enable","true"); if (_ocspResponderURL != null) { // Override location of OCSP Responder Security.setProperty("ocsp.responderURL", _ocspResponderURL); } } TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(_trustManagerFactoryAlgorithm); trustManagerFactory.init(new CertPathTrustManagerParameters(pbParams)); managers = trustManagerFactory.getTrustManagers(); } else { TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(_trustManagerFactoryAlgorithm); trustManagerFactory.init(trustStore); managers = trustManagerFactory.getTrustManagers(); } } return managers; } /* ------------------------------------------------------------ */ /** * Check KeyStore Configuration. Ensures that if keystore has been * configured but there's no truststore, that keystore is * used as truststore. * @throws IllegalStateException if SslContextFactory configuration can't be used. */ public void checkKeyStore() { if (_context != null) return; //nothing to check if using preconfigured context if (_keyStore == null && _keyStoreInputStream == null && _keyStorePath == null) throw new IllegalStateException("SSL doesn't have a valid keystore"); // if the keystore has been configured but there is no // truststore configured, use the keystore as the truststore if (_trustStore == null && _trustStoreInputStream == null && _trustStorePath == null) { _trustStore = _keyStore; _trustStorePath = _keyStorePath; _trustStoreInputStream = _keyStoreInputStream; _trustStoreType = _keyStoreType; _trustStoreProvider = _keyStoreProvider; _trustStorePassword = _keyStorePassword; _trustManagerFactoryAlgorithm = _keyManagerFactoryAlgorithm; } // It's the same stream we cannot read it twice, so read it once in memory if (_keyStoreInputStream != null && _keyStoreInputStream == _trustStoreInputStream) { try { ByteArrayOutputStream baos = new ByteArrayOutputStream(); IO.copy(_keyStoreInputStream, baos); _keyStoreInputStream.close(); _keyStoreInputStream = new ByteArrayInputStream(baos.toByteArray()); _trustStoreInputStream = new ByteArrayInputStream(baos.toByteArray()); } catch (Exception ex) { throw new IllegalStateException(ex); } } } /* ------------------------------------------------------------ */ /** * Select protocols to be used by the connector * based on configured inclusion and exclusion lists * as well as enabled and supported protocols. * @param enabledProtocols Array of enabled protocols * @param supportedProtocols Array of supported protocols * @return Array of protocols to enable */ public String[] selectProtocols(String[] enabledProtocols, String[] supportedProtocols) { Set<String> selected_protocols = new LinkedHashSet<String>(); // Set the starting protocols - either from the included or enabled list if (_includeProtocols!=null) { // Use only the supported included protocols for (String protocol : _includeProtocols) if(Arrays.asList(supportedProtocols).contains(protocol)) selected_protocols.add(protocol); } else selected_protocols.addAll(Arrays.asList(enabledProtocols)); // Remove any excluded protocols if (_excludeProtocols != null) selected_protocols.removeAll(_excludeProtocols); return selected_protocols.toArray(new String[selected_protocols.size()]); } /* ------------------------------------------------------------ */ /** * Select cipher suites to be used by the connector * based on configured inclusion and exclusion lists * as well as enabled and supported cipher suite lists. * @param enabledCipherSuites Array of enabled cipher suites * @param supportedCipherSuites Array of supported cipher suites * @return Array of cipher suites to enable */ public String[] selectCipherSuites(String[] enabledCipherSuites, String[] supportedCipherSuites) { Set<String> selected_ciphers = new LinkedHashSet<String>(); // Set the starting ciphers - either from the included or enabled list if (_includeCipherSuites!=null) { // Use only the supported included ciphers for (String cipherSuite : _includeCipherSuites) if(Arrays.asList(supportedCipherSuites).contains(cipherSuite)) selected_ciphers.add(cipherSuite); } else selected_ciphers.addAll(Arrays.asList(enabledCipherSuites)); // Remove any excluded ciphers if (_excludeCipherSuites != null) selected_ciphers.removeAll(_excludeCipherSuites); return selected_ciphers.toArray(new String[selected_ciphers.size()]); } /* ------------------------------------------------------------ */ /** * Check if the lifecycle has been started and throw runtime exception */ protected void checkNotStarted() { if (isStarted()) throw new IllegalStateException("Cannot modify configuration when "+getState()); } /* ------------------------------------------------------------ */ /** * @return true if CRL Distribution Points support is enabled */ public boolean isEnableCRLDP() { return _enableCRLDP; } /* ------------------------------------------------------------ */ /** Enables CRL Distribution Points Support * @param enableCRLDP true - turn on, false - turns off */ public void setEnableCRLDP(boolean enableCRLDP) { checkNotStarted(); _enableCRLDP = enableCRLDP; } /* ------------------------------------------------------------ */ /** * @return true if On-Line Certificate Status Protocol support is enabled */ public boolean isEnableOCSP() { return _enableOCSP; } /* ------------------------------------------------------------ */ /** Enables On-Line Certificate Status Protocol support * @param enableOCSP true - turn on, false - turn off */ public void setEnableOCSP(boolean enableOCSP) { checkNotStarted(); _enableOCSP = enableOCSP; } /* ------------------------------------------------------------ */ /** * @return Location of the OCSP Responder */ public String getOcspResponderURL() { return _ocspResponderURL; } /* ------------------------------------------------------------ */ /** Set the location of the OCSP Responder. * @param ocspResponderURL location of the OCSP Responder */ public void setOcspResponderURL(String ocspResponderURL) { checkNotStarted(); _ocspResponderURL = ocspResponderURL; } /* ------------------------------------------------------------ */ /** Set the key store. * @param keyStore the key store to set */ public void setKeyStore(KeyStore keyStore) { checkNotStarted(); _keyStore = keyStore; } /* ------------------------------------------------------------ */ /** Set the trust store. * @param trustStore the trust store to set */ public void setTrustStore(KeyStore trustStore) { checkNotStarted(); _trustStore = trustStore; } /* ------------------------------------------------------------ */ /** Set the key store resource. * @param resource the key store resource to set */ public void setKeyStoreResource(Resource resource) { checkNotStarted(); try { _keyStoreInputStream = resource.getInputStream(); } catch (IOException e) { throw new InvalidParameterException("Unable to get resource "+ "input stream for resource "+resource.toString()); } } /* ------------------------------------------------------------ */ /** Set the trust store resource. * @param resource the trust store resource to set */ public void setTrustStoreResource(Resource resource) { checkNotStarted(); try { _trustStoreInputStream = resource.getInputStream(); } catch (IOException e) { throw new InvalidParameterException("Unable to get resource "+ "input stream for resource "+resource.toString()); } } /* ------------------------------------------------------------ */ /** * @return true if SSL Session caching is enabled */ public boolean isSessionCachingEnabled() { return _sessionCachingEnabled; } /* ------------------------------------------------------------ */ /** Set the flag to enable SSL Session caching. * @param enableSessionCaching the value of the flag */ public void setSessionCachingEnabled(boolean enableSessionCaching) { _sessionCachingEnabled = enableSessionCaching; } /* ------------------------------------------------------------ */ /** Get SSL session cache size. * @return SSL session cache size */ public int getSslSessionCacheSize() { return _sslSessionCacheSize; } /* ------------------------------------------------------------ */ /** SEt SSL session cache size. * @param sslSessionCacheSize SSL session cache size to set */ public void setSslSessionCacheSize(int sslSessionCacheSize) { _sslSessionCacheSize = sslSessionCacheSize; } /* ------------------------------------------------------------ */ /** Get SSL session timeout. * @return SSL session timeout */ public int getSslSessionTimeout() { return _sslSessionTimeout; } /* ------------------------------------------------------------ */ /** Set SSL session timeout. * @param sslSessionTimeout SSL session timeout to set */ public void setSslSessionTimeout(int sslSessionTimeout) { _sslSessionTimeout = sslSessionTimeout; } /* ------------------------------------------------------------ */ public SSLServerSocket newSslServerSocket(String host,int port,int backlog) throws IOException { SSLServerSocketFactory factory = _context.getServerSocketFactory(); SSLServerSocket socket = (SSLServerSocket) (host==null ? factory.createServerSocket(port,backlog): factory.createServerSocket(port,backlog,InetAddress.getByName(host))); if (getWantClientAuth()) socket.setWantClientAuth(getWantClientAuth()); if (getNeedClientAuth()) socket.setNeedClientAuth(getNeedClientAuth()); socket.setEnabledCipherSuites(selectCipherSuites( socket.getEnabledCipherSuites(), socket.getSupportedCipherSuites())); socket.setEnabledProtocols(selectProtocols(socket.getEnabledProtocols(),socket.getSupportedProtocols())); return socket; } /* ------------------------------------------------------------ */ public SSLSocket newSslSocket() throws IOException { SSLSocketFactory factory = _context.getSocketFactory(); SSLSocket socket = (SSLSocket)factory.createSocket(); if (getWantClientAuth()) socket.setWantClientAuth(getWantClientAuth()); if (getNeedClientAuth()) socket.setNeedClientAuth(getNeedClientAuth()); socket.setEnabledCipherSuites(selectCipherSuites( socket.getEnabledCipherSuites(), socket.getSupportedCipherSuites())); socket.setEnabledProtocols(selectProtocols(socket.getEnabledProtocols(),socket.getSupportedProtocols())); return socket; } /* ------------------------------------------------------------ */ public SSLEngine newSslEngine(String host,int port) { SSLEngine sslEngine=isSessionCachingEnabled() ?_context.createSSLEngine(host, port) :_context.createSSLEngine(); customize(sslEngine); return sslEngine; } /* ------------------------------------------------------------ */ public SSLEngine newSslEngine() { SSLEngine sslEngine=_context.createSSLEngine(); customize(sslEngine); return sslEngine; } /* ------------------------------------------------------------ */ public void customize(SSLEngine sslEngine) { if (getWantClientAuth()) sslEngine.setWantClientAuth(getWantClientAuth()); if (getNeedClientAuth()) sslEngine.setNeedClientAuth(getNeedClientAuth()); sslEngine.setEnabledCipherSuites(selectCipherSuites( sslEngine.getEnabledCipherSuites(), sslEngine.getSupportedCipherSuites())); sslEngine.setEnabledProtocols(selectProtocols(sslEngine.getEnabledProtocols(),sslEngine.getSupportedProtocols())); } /* ------------------------------------------------------------ */ public String toString() { return String.format("%s@%x(%s,%s)", getClass().getSimpleName(), hashCode(), _keyStorePath, _trustStorePath); } }