mirror of
https://github.com/openjdk/jdk.git
synced 2026-03-04 13:10:15 +00:00
Merge
This commit is contained in:
commit
09220bdd58
@ -162,7 +162,7 @@ class BasicChecker extends PKIXCertPathChecker {
|
||||
throw new CertPathValidatorException
|
||||
(msg + " check failed", e, null, -1,
|
||||
BasicReason.INVALID_SIGNATURE);
|
||||
} catch (GeneralSecurityException e) {
|
||||
} catch (Exception e) {
|
||||
throw new CertPathValidatorException(msg + " check failed", e);
|
||||
}
|
||||
|
||||
|
||||
33
jdk/test/sun/security/krb5/auto/Action.java
Normal file
33
jdk/test/sun/security/krb5/auto/Action.java
Normal file
@ -0,0 +1,33 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
/**
|
||||
* Action used in Context.doAs
|
||||
*/
|
||||
public interface Action {
|
||||
/**
|
||||
* This method always reads a byte block and emits another one
|
||||
*/
|
||||
byte[] run(Context s, byte[] input) throws Exception;
|
||||
}
|
||||
|
||||
114
jdk/test/sun/security/krb5/auto/BasicKrb5Test.java
Normal file
114
jdk/test/sun/security/krb5/auto/BasicKrb5Test.java
Normal file
@ -0,0 +1,114 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 6706974
|
||||
* @summary Add krb5 test infrastructure
|
||||
*/
|
||||
|
||||
import org.ietf.jgss.GSSName;
|
||||
import sun.security.jgss.GSSUtil;
|
||||
import sun.security.krb5.Config;
|
||||
import sun.security.krb5.internal.crypto.EType;
|
||||
|
||||
/**
|
||||
* Basic JGSS/krb5 test with 3 parties: client, server, backend server. Each
|
||||
* party uses JAAS login to get subjects and executes JGSS calls using
|
||||
* Subject.doAs.
|
||||
*/
|
||||
public class BasicKrb5Test {
|
||||
|
||||
/**
|
||||
* @param args empty or etype
|
||||
*/
|
||||
public static void main(String[] args)
|
||||
throws Exception {
|
||||
|
||||
String etype = null;
|
||||
if (args.length > 0) {
|
||||
etype = args[0];
|
||||
}
|
||||
|
||||
// Creates and starts the KDC. This line must be put ahead of etype check
|
||||
// since the check needs a krb5.conf.
|
||||
new OneKDC(etype).writeJAASConf();
|
||||
|
||||
System.out.println("Testing etype " + etype);
|
||||
if (etype != null && !EType.isSupported(Config.getInstance().getType(etype))) {
|
||||
System.out.println("Not supported.");
|
||||
System.exit(0);
|
||||
}
|
||||
|
||||
new BasicKrb5Test().go(OneKDC.SERVER, OneKDC.BACKEND);
|
||||
}
|
||||
|
||||
void go(final String server, final String backend) throws Exception {
|
||||
Context c, s, s2, b;
|
||||
c = Context.fromJAAS("client");
|
||||
s = Context.fromJAAS("server");
|
||||
b = Context.fromJAAS("backend");
|
||||
|
||||
c.startAsClient(server, GSSUtil.GSS_KRB5_MECH_OID);
|
||||
c.x().requestCredDeleg(true);
|
||||
s.startAsServer(GSSUtil.GSS_KRB5_MECH_OID);
|
||||
|
||||
c.status();
|
||||
s.status();
|
||||
|
||||
Context.handshake(c, s);
|
||||
GSSName client = c.x().getSrcName();
|
||||
|
||||
c.status();
|
||||
s.status();
|
||||
|
||||
Context.transmit("i say high --", c, s);
|
||||
Context.transmit(" you say low", s, c);
|
||||
|
||||
s2 = s.delegated();
|
||||
s.dispose();
|
||||
s = null;
|
||||
|
||||
s2.startAsClient(backend, GSSUtil.GSS_KRB5_MECH_OID);
|
||||
b.startAsServer(GSSUtil.GSS_KRB5_MECH_OID);
|
||||
|
||||
s2.status();
|
||||
b.status();
|
||||
|
||||
Context.handshake(s2, b);
|
||||
GSSName client2 = b.x().getSrcName();
|
||||
|
||||
if (!client.equals(client2)) {
|
||||
throw new Exception("Delegation failed");
|
||||
}
|
||||
|
||||
s2.status();
|
||||
b.status();
|
||||
|
||||
Context.transmit("you say hello --", s2, b);
|
||||
Context.transmit(" i say goodbye", b, s2);
|
||||
|
||||
s2.dispose();
|
||||
b.dispose();
|
||||
}
|
||||
}
|
||||
75
jdk/test/sun/security/krb5/auto/CleanState.java
Normal file
75
jdk/test/sun/security/krb5/auto/CleanState.java
Normal file
@ -0,0 +1,75 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 6716534
|
||||
* @summary Krb5LoginModule has not cleaned temp info between authentication attempts
|
||||
*/
|
||||
import com.sun.security.auth.module.Krb5LoginModule;
|
||||
import java.util.HashMap;
|
||||
import java.util.Map;
|
||||
import javax.security.auth.Subject;
|
||||
import javax.security.auth.callback.Callback;
|
||||
import javax.security.auth.callback.CallbackHandler;
|
||||
import javax.security.auth.callback.NameCallback;
|
||||
import javax.security.auth.callback.PasswordCallback;
|
||||
|
||||
public class CleanState {
|
||||
public static void main(String[] args) throws Exception {
|
||||
CleanState x = new CleanState();
|
||||
new OneKDC(null);
|
||||
x.go();
|
||||
}
|
||||
|
||||
void go() throws Exception {
|
||||
Krb5LoginModule krb5 = new Krb5LoginModule();
|
||||
|
||||
final String name = OneKDC.USER;
|
||||
final char[] password = OneKDC.PASS;
|
||||
char[] badpassword = "hellokitty".toCharArray();
|
||||
|
||||
Map<String,String> map = new HashMap<String,String>();
|
||||
map.put("useTicketCache", "false");
|
||||
map.put("doNotPrompt", "false");
|
||||
map.put("tryFirstPass", "true");
|
||||
Map<String,Object> shared = new HashMap<String,Object>();
|
||||
shared.put("javax.security.auth.login.name", name);
|
||||
shared.put("javax.security.auth.login.password", badpassword);
|
||||
|
||||
krb5.initialize(new Subject(), new CallbackHandler() {
|
||||
@Override
|
||||
public void handle(Callback[] callbacks) {
|
||||
for(Callback callback: callbacks) {
|
||||
if (callback instanceof NameCallback) {
|
||||
((NameCallback)callback).setName(name);
|
||||
}
|
||||
if (callback instanceof PasswordCallback) {
|
||||
((PasswordCallback)callback).setPassword(password);
|
||||
}
|
||||
}
|
||||
}
|
||||
}, shared, map);
|
||||
krb5.login();
|
||||
}
|
||||
}
|
||||
386
jdk/test/sun/security/krb5/auto/Context.java
Normal file
386
jdk/test/sun/security/krb5/auto/Context.java
Normal file
@ -0,0 +1,386 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
import com.sun.security.auth.module.Krb5LoginModule;
|
||||
import java.security.PrivilegedActionException;
|
||||
import java.security.PrivilegedExceptionAction;
|
||||
import java.util.Arrays;
|
||||
import java.util.HashMap;
|
||||
import java.util.Map;
|
||||
import javax.security.auth.Subject;
|
||||
import javax.security.auth.kerberos.KerberosKey;
|
||||
import javax.security.auth.kerberos.KerberosTicket;
|
||||
import javax.security.auth.login.LoginContext;
|
||||
import org.ietf.jgss.GSSContext;
|
||||
import org.ietf.jgss.GSSCredential;
|
||||
import org.ietf.jgss.GSSException;
|
||||
import org.ietf.jgss.GSSManager;
|
||||
import org.ietf.jgss.GSSName;
|
||||
import org.ietf.jgss.MessageProp;
|
||||
import org.ietf.jgss.Oid;
|
||||
|
||||
/**
|
||||
* Context of a JGSS subject, encapsulating Subject and GSSContext.
|
||||
*
|
||||
* Three "constructors", which acquire the (private) credentials and fill
|
||||
* it into the Subject:
|
||||
*
|
||||
* 1. static fromJAAS(): Creates a Context using a JAAS login config entry
|
||||
* 2. static fromUserPass(): Creates a Context using a username and a password
|
||||
* 3. delegated(): A new context which uses the delegated credentials from a
|
||||
* previously established acceptor Context
|
||||
*
|
||||
* Two context initiators, which create the GSSContext object inside:
|
||||
*
|
||||
* 1. startAsClient()
|
||||
* 2. startAsServer()
|
||||
*
|
||||
* Privileged action:
|
||||
* doAs(): Performs an action in the name of the Subject
|
||||
*
|
||||
* Handshake process:
|
||||
* static handShake(initiator, acceptor)
|
||||
*
|
||||
* A four-phase typical data communication which includes all four GSS
|
||||
* actions (wrap, unwrap, getMic and veryfyMiC):
|
||||
* static transmit(message, from, to)
|
||||
*/
|
||||
public class Context {
|
||||
|
||||
private Subject s;
|
||||
private GSSContext x;
|
||||
private boolean f; // context established?
|
||||
private String name;
|
||||
private GSSCredential cred; // see static method delegated().
|
||||
|
||||
private Context() {}
|
||||
|
||||
/**
|
||||
* Using the delegated credentials from a previous acceptor
|
||||
* @param c
|
||||
*/
|
||||
public Context delegated() throws Exception {
|
||||
Context out = new Context();
|
||||
out.s = s;
|
||||
out.cred = x.getDelegCred();
|
||||
out.name = name + " as " + out.cred.getName().toString();
|
||||
return out;
|
||||
}
|
||||
|
||||
/**
|
||||
* Logins with a JAAS login config entry name
|
||||
*/
|
||||
public static Context fromJAAS(final String name) throws Exception {
|
||||
Context out = new Context();
|
||||
out.name = name;
|
||||
LoginContext lc = new LoginContext(name);
|
||||
lc.login();
|
||||
out.s = lc.getSubject();
|
||||
return out;
|
||||
}
|
||||
|
||||
/**
|
||||
* Logins with a username and a password, using Krb5LoginModule directly
|
||||
* @param storeKey true if key should be saved, used on acceptor side
|
||||
*/
|
||||
public static Context fromUserPass(String user, char[] pass, boolean storeKey) throws Exception {
|
||||
Context out = new Context();
|
||||
out.name = user;
|
||||
out.s = new Subject();
|
||||
Krb5LoginModule krb5 = new Krb5LoginModule();
|
||||
Map<String, String> map = new HashMap<String, String>();
|
||||
map.put("tryFirstPass", "true");
|
||||
if (storeKey) {
|
||||
map.put("storeKey", "true");
|
||||
}
|
||||
Map<String, Object> shared = new HashMap<String, Object>();
|
||||
shared.put("javax.security.auth.login.name", user);
|
||||
shared.put("javax.security.auth.login.password", pass);
|
||||
|
||||
krb5.initialize(out.s, null, shared, map);
|
||||
krb5.login();
|
||||
krb5.commit();
|
||||
return out;
|
||||
}
|
||||
|
||||
/**
|
||||
* Starts as a client
|
||||
* @param target communication peer
|
||||
* @param mech GSS mech
|
||||
* @throws java.lang.Exception
|
||||
*/
|
||||
public void startAsClient(final String target, final Oid mech) throws Exception {
|
||||
doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] dummy) throws Exception {
|
||||
GSSManager m = GSSManager.getInstance();
|
||||
me.x = m.createContext(
|
||||
target.indexOf('@') < 0 ?
|
||||
m.createName(target, null) :
|
||||
m.createName(target, GSSName.NT_HOSTBASED_SERVICE),
|
||||
mech,
|
||||
cred,
|
||||
GSSContext.DEFAULT_LIFETIME);
|
||||
return null;
|
||||
}
|
||||
}, null);
|
||||
f = false;
|
||||
}
|
||||
|
||||
/**
|
||||
* Starts as a server
|
||||
* @param mech GSS mech
|
||||
* @throws java.lang.Exception
|
||||
*/
|
||||
public void startAsServer(final Oid mech) throws Exception {
|
||||
doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] dummy) throws Exception {
|
||||
GSSManager m = GSSManager.getInstance();
|
||||
me.x = m.createContext(m.createCredential(
|
||||
null,
|
||||
GSSCredential.INDEFINITE_LIFETIME,
|
||||
mech,
|
||||
GSSCredential.ACCEPT_ONLY));
|
||||
return null;
|
||||
}
|
||||
}, null);
|
||||
f = false;
|
||||
}
|
||||
|
||||
/**
|
||||
* Accesses the internal GSSContext object. Currently it's used for --
|
||||
*
|
||||
* 1. calling requestXXX() before handshake
|
||||
* 2. accessing source name
|
||||
*
|
||||
* Note: If the application needs to do any privileged call on this
|
||||
* object, please use doAs(). Otherwise, it can be done directly. The
|
||||
* methods listed above are all non-privileged calls.
|
||||
*
|
||||
* @return the GSSContext object
|
||||
*/
|
||||
public GSSContext x() {
|
||||
return x;
|
||||
}
|
||||
|
||||
/**
|
||||
* Disposes the GSSContext within
|
||||
* @throws org.ietf.jgss.GSSException
|
||||
*/
|
||||
public void dispose() throws GSSException {
|
||||
x.dispose();
|
||||
}
|
||||
|
||||
/**
|
||||
* Does something using the Subject inside
|
||||
* @param action the action
|
||||
* @param in the input byte
|
||||
* @return the output byte
|
||||
* @throws java.lang.Exception
|
||||
*/
|
||||
public byte[] doAs(final Action action, final byte[] in) throws Exception {
|
||||
try {
|
||||
return Subject.doAs(s, new PrivilegedExceptionAction<byte[]>() {
|
||||
|
||||
@Override
|
||||
public byte[] run() throws Exception {
|
||||
return action.run(Context.this, in);
|
||||
}
|
||||
});
|
||||
} catch (PrivilegedActionException pae) {
|
||||
throw pae.getException();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Prints status of GSSContext and Subject
|
||||
* @throws java.lang.Exception
|
||||
*/
|
||||
public void status() throws Exception {
|
||||
System.out.println("STATUS OF " + name.toUpperCase());
|
||||
try {
|
||||
StringBuffer sb = new StringBuffer();
|
||||
if (x.getAnonymityState()) {
|
||||
sb.append("anon, ");
|
||||
}
|
||||
if (x.getConfState()) {
|
||||
sb.append("conf, ");
|
||||
}
|
||||
if (x.getCredDelegState()) {
|
||||
sb.append("deleg, ");
|
||||
}
|
||||
if (x.getIntegState()) {
|
||||
sb.append("integ, ");
|
||||
}
|
||||
if (x.getMutualAuthState()) {
|
||||
sb.append("mutual, ");
|
||||
}
|
||||
if (x.getReplayDetState()) {
|
||||
sb.append("rep det, ");
|
||||
}
|
||||
if (x.getSequenceDetState()) {
|
||||
sb.append("seq det, ");
|
||||
}
|
||||
System.out.println("Context status of " + name + ": " + sb.toString());
|
||||
System.out.println(x.getSrcName() + " -> " + x.getTargName());
|
||||
} catch (Exception e) {
|
||||
;// Don't care
|
||||
}
|
||||
System.out.println("=====================================");
|
||||
for (Object o : s.getPrivateCredentials()) {
|
||||
System.out.println(" " + o.getClass());
|
||||
if (o instanceof KerberosTicket) {
|
||||
KerberosTicket kt = (KerberosTicket) o;
|
||||
System.out.println(" " + kt.getServer() + " for " + kt.getClient());
|
||||
} else if (o instanceof KerberosKey) {
|
||||
KerberosKey kk = (KerberosKey) o;
|
||||
System.out.print(" " + kk.getKeyType() + " " + kk.getVersionNumber() + " " + kk.getAlgorithm() + " ");
|
||||
for (byte b : kk.getEncoded()) {
|
||||
System.out.printf("%02X", b & 0xff);
|
||||
}
|
||||
System.out.println();
|
||||
} else if (o instanceof Map) {
|
||||
Map map = (Map) o;
|
||||
for (Object k : map.keySet()) {
|
||||
System.out.println(" " + k + ": " + map.get(k));
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Transmits a message from one Context to another. The sender wraps the
|
||||
* message and sends it to the receiver. The receiver unwraps it, creates
|
||||
* a MIC of the clear text and sends it back to the sender. The sender
|
||||
* verifies the MIC against the message sent earlier.
|
||||
* @param message the message
|
||||
* @param s1 the sender
|
||||
* @param s2 the receiver
|
||||
* @throws java.lang.Exception If anything goes wrong
|
||||
*/
|
||||
static public void transmit(final String message, final Context s1,
|
||||
final Context s2) throws Exception {
|
||||
final byte[] messageBytes = message.getBytes();
|
||||
System.out.printf("-------------------- TRANSMIT from %s to %s------------------------\n",
|
||||
s1.name, s2.name);
|
||||
|
||||
byte[] t = s1.doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] dummy) throws Exception {
|
||||
System.out.println("wrap");
|
||||
MessageProp p1 = new MessageProp(0, true);
|
||||
byte[] out = me.x.wrap(messageBytes, 0, messageBytes.length, p1);
|
||||
System.out.println(printProp(p1));
|
||||
return out;
|
||||
}
|
||||
}, null);
|
||||
|
||||
t = s2.doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] input) throws Exception {
|
||||
MessageProp p1 = new MessageProp(0, true);
|
||||
byte[] bytes = me.x.unwrap(input, 0, input.length, p1);
|
||||
if (!Arrays.equals(messageBytes, bytes))
|
||||
throw new Exception("wrap/unwrap mismatch");
|
||||
System.out.println("unwrap");
|
||||
System.out.println(printProp(p1));
|
||||
p1 = new MessageProp(0, true);
|
||||
System.out.println("getMIC");
|
||||
bytes = me.x.getMIC(bytes, 0, bytes.length, p1);
|
||||
System.out.println(printProp(p1));
|
||||
return bytes;
|
||||
}
|
||||
}, t);
|
||||
// Re-unwrap should make p2.isDuplicateToken() returns true
|
||||
s1.doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] input) throws Exception {
|
||||
MessageProp p1 = new MessageProp(0, true);
|
||||
System.out.println("verifyMIC");
|
||||
me.x.verifyMIC(input, 0, input.length,
|
||||
messageBytes, 0, messageBytes.length,
|
||||
p1);
|
||||
System.out.println(printProp(p1));
|
||||
return null;
|
||||
}
|
||||
}, t);
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns a string description of a MessageProp object
|
||||
* @param prop the object
|
||||
* @return the description
|
||||
*/
|
||||
static public String printProp(MessageProp prop) {
|
||||
StringBuffer sb = new StringBuffer();
|
||||
sb.append("MessagePop: ");
|
||||
sb.append("QOP="+ prop.getQOP() + ", ");
|
||||
sb.append(prop.getPrivacy()?"privacy, ":"");
|
||||
sb.append(prop.isDuplicateToken()?"dup, ":"");
|
||||
sb.append(prop.isGapToken()?"gap, ":"");
|
||||
sb.append(prop.isOldToken()?"old, ":"");
|
||||
sb.append(prop.isUnseqToken()?"unseq, ":"");
|
||||
sb.append(prop.getMinorString()+ "(" + prop.getMinorStatus()+")");
|
||||
return sb.toString();
|
||||
}
|
||||
|
||||
/**
|
||||
* Handshake (security context establishment process) between two Contexts
|
||||
* @param c the initiator
|
||||
* @param s the acceptor
|
||||
* @throws java.lang.Exception
|
||||
*/
|
||||
static public void handshake(final Context c, final Context s) throws Exception {
|
||||
byte[] t = new byte[0];
|
||||
while (!c.f || !s.f) {
|
||||
t = c.doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] input) throws Exception {
|
||||
if (me.x.isEstablished()) {
|
||||
me.f = true;
|
||||
System.out.println(c.name + " side established");
|
||||
return null;
|
||||
} else {
|
||||
System.out.println(c.name + " call initSecContext");
|
||||
return me.x.initSecContext(input, 0, input.length);
|
||||
}
|
||||
}
|
||||
}, t);
|
||||
|
||||
t = s.doAs(new Action() {
|
||||
@Override
|
||||
public byte[] run(Context me, byte[] input) throws Exception {
|
||||
if (me.x.isEstablished()) {
|
||||
me.f = true;
|
||||
System.out.println(s.name + " side established");
|
||||
return null;
|
||||
} else {
|
||||
System.out.println(s.name + " called acceptSecContext");
|
||||
return me.x.acceptSecContext(input, 0, input.length);
|
||||
}
|
||||
}
|
||||
}, t);
|
||||
}
|
||||
}
|
||||
}
|
||||
101
jdk/test/sun/security/krb5/auto/CrossRealm.java
Normal file
101
jdk/test/sun/security/krb5/auto/CrossRealm.java
Normal file
@ -0,0 +1,101 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 6706974
|
||||
* @summary Add krb5 test infrastructure
|
||||
*/
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.security.Security;
|
||||
import javax.security.auth.callback.Callback;
|
||||
import javax.security.auth.callback.CallbackHandler;
|
||||
import javax.security.auth.callback.NameCallback;
|
||||
import javax.security.auth.callback.PasswordCallback;
|
||||
import javax.security.auth.callback.UnsupportedCallbackException;
|
||||
import org.ietf.jgss.GSSContext;
|
||||
import org.ietf.jgss.GSSManager;
|
||||
import org.ietf.jgss.GSSName;
|
||||
import sun.security.jgss.GSSUtil;
|
||||
|
||||
public class CrossRealm implements CallbackHandler {
|
||||
public static void main(String[] args) throws Exception {
|
||||
startKDCs();
|
||||
xRealmAuth();
|
||||
}
|
||||
|
||||
static void startKDCs() throws Exception {
|
||||
// Create and start the KDC
|
||||
KDC kdc1 = KDC.create("RABBIT.HOLE");
|
||||
kdc1.addPrincipal("dummy", "bogus".toCharArray());
|
||||
kdc1.addPrincipalRandKey("krbtgt/RABBIT.HOLE");
|
||||
kdc1.addPrincipal("krbtgt/SNAKE.HOLE", "sharedsec".toCharArray());
|
||||
|
||||
KDC kdc2 = KDC.create("SNAKE.HOLE");
|
||||
kdc2.addPrincipalRandKey("krbtgt/SNAKE.HOLE");
|
||||
kdc2.addPrincipal("krbtgt/RABBIT.HOLE", "sharedsec".toCharArray());
|
||||
kdc2.addPrincipalRandKey("host/www.snake.hole");
|
||||
|
||||
KDC.saveConfig("krb5-localkdc.conf", kdc1, kdc2,
|
||||
"forwardable=true",
|
||||
"[domain_realm]",
|
||||
".snake.hole=SNAKE.HOLE");
|
||||
System.setProperty("java.security.krb5.conf", "krb5-localkdc.conf");
|
||||
}
|
||||
|
||||
static void xRealmAuth() throws Exception {
|
||||
Security.setProperty("auth.login.defaultCallbackHandler", "CrossRealm");
|
||||
System.setProperty("java.security.auth.login.config", "jaas-localkdc.conf");
|
||||
System.setProperty("javax.security.auth.useSubjectCredsOnly", "false");
|
||||
FileOutputStream fos = new FileOutputStream("jaas-localkdc.conf");
|
||||
fos.write(("com.sun.security.jgss.krb5.initiate {\n" +
|
||||
" com.sun.security.auth.module.Krb5LoginModule\n" +
|
||||
" required\n" +
|
||||
" principal=dummy\n" +
|
||||
" doNotPrompt=false\n" +
|
||||
" useTicketCache=false\n" +
|
||||
" ;\n" +
|
||||
"};").getBytes());
|
||||
fos.close();
|
||||
|
||||
GSSManager m = GSSManager.getInstance();
|
||||
m.createContext(
|
||||
m.createName("host@www.snake.hole", GSSName.NT_HOSTBASED_SERVICE),
|
||||
GSSUtil.GSS_KRB5_MECH_OID,
|
||||
null,
|
||||
GSSContext.DEFAULT_LIFETIME).initSecContext(new byte[0], 0, 0);
|
||||
}
|
||||
|
||||
@Override
|
||||
public void handle(Callback[] callbacks) throws IOException, UnsupportedCallbackException {
|
||||
for (Callback callback : callbacks) {
|
||||
if (callback instanceof NameCallback) {
|
||||
((NameCallback) callback).setName("dummy");
|
||||
}
|
||||
if (callback instanceof PasswordCallback) {
|
||||
((PasswordCallback) callback).setPassword("bogus".toCharArray());
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
969
jdk/test/sun/security/krb5/auto/KDC.java
Normal file
969
jdk/test/sun/security/krb5/auto/KDC.java
Normal file
@ -0,0 +1,969 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
import java.lang.reflect.Constructor;
|
||||
import java.lang.reflect.Field;
|
||||
import java.lang.reflect.InvocationTargetException;
|
||||
import java.net.*;
|
||||
import java.io.*;
|
||||
import java.lang.reflect.Method;
|
||||
import java.security.SecureRandom;
|
||||
import java.util.*;
|
||||
import java.util.concurrent.*;
|
||||
import sun.security.krb5.*;
|
||||
import sun.security.krb5.internal.*;
|
||||
import sun.security.krb5.internal.crypto.KeyUsage;
|
||||
import sun.security.krb5.internal.ktab.KeyTab;
|
||||
import sun.security.util.DerInputStream;
|
||||
import sun.security.util.DerOutputStream;
|
||||
import sun.security.util.DerValue;
|
||||
|
||||
/**
|
||||
* A KDC server.
|
||||
* <p>
|
||||
* Features:
|
||||
* <ol>
|
||||
* <li> Supports TCP and UDP
|
||||
* <li> Supports AS-REQ and TGS-REQ
|
||||
* <li> Principal db and other settings hard coded in application
|
||||
* <li> Options, say, request preauth or not
|
||||
* </ol>
|
||||
* Side effects:
|
||||
* <ol>
|
||||
* <li> The Sun-internal class <code>sun.security.krb5.Config</code> is a
|
||||
* singleton and initialized according to Kerberos settings (krb5.conf and
|
||||
* java.security.krb5.* system properties). This means once it's initialized
|
||||
* it will not automatically notice any changes to these settings (or file
|
||||
* changes of krb5.conf). The KDC class normally does not touch these
|
||||
* settings (except for the <code>writeKtab()</code> method). However, to make
|
||||
* sure nothing ever goes wrong, if you want to make any changes to these
|
||||
* settings after calling a KDC method, call <code>Config.refresh()</code> to
|
||||
* make sure your changes are reflected in the <code>Config</code> object.
|
||||
* </ol>
|
||||
* Issues and TODOs:
|
||||
* <ol>
|
||||
* <li> Generates krb5.conf to be used on another machine, currently the kdc is
|
||||
* always localhost
|
||||
* <li> More options to KDC, say, error output, say, response nonce !=
|
||||
* request nonce
|
||||
* </ol>
|
||||
* Note: This program uses internal krb5 classes (including reflection to
|
||||
* access private fields and methods).
|
||||
* <p>
|
||||
* Usages:
|
||||
* <p>
|
||||
* 1. Init and start the KDC:
|
||||
* <pre>
|
||||
* KDC kdc = KDC.create("REALM.NAME", port, isDaemon);
|
||||
* KDC kdc = KDC.create("REALM.NAME");
|
||||
* </pre>
|
||||
* Here, <code>port</code> is the UDP and TCP port number the KDC server
|
||||
* listens on. If zero, a random port is chosen, which you can use getPort()
|
||||
* later to retrieve the value.
|
||||
* <p>
|
||||
* If <code>isDaemon</code> is true, the KDC worker threads will be daemons.
|
||||
* <p>
|
||||
* The shortcut <code>KDC.create("REALM.NAME")</code> has port=0 and
|
||||
* isDaemon=false, and is commonly used in an embedded KDC.
|
||||
* <p>
|
||||
* 2. Adding users:
|
||||
* <pre>
|
||||
* kdc.addPrincipal(String principal_name, char[] password);
|
||||
* kdc.addPrincipalRandKey(String principal_name);
|
||||
* </pre>
|
||||
* A service principal's name should look like "host/f.q.d.n". The second form
|
||||
* generates a random key. To expose this key, call <code>writeKtab()</code> to
|
||||
* save the keys into a keytab file.
|
||||
* <p>
|
||||
* Note that you need to add the principal name krbtgt/REALM.NAME yourself.
|
||||
* <p>
|
||||
* Note that you can safely add a principal at any time after the KDC is
|
||||
* started and before a user requests info on this principal.
|
||||
* <p>
|
||||
* 3. Other public methods:
|
||||
* <ul>
|
||||
* <li> <code>getPort</code>: Returns the port number the KDC uses
|
||||
* <li> <code>getRealm</code>: Returns the realm name
|
||||
* <li> <code>writeKtab</code>: Writes all principals' keys into a keytab file
|
||||
* <li> <code>saveConfig</code>: Saves a krb5.conf file to access this KDC
|
||||
* <li> <code>setOption</code>: Sets various options
|
||||
* </ul>
|
||||
* Read the javadoc for details. Lazy developer can use <code>OneKDC</code>
|
||||
* directly.
|
||||
*/
|
||||
public class KDC {
|
||||
|
||||
// Under the hood.
|
||||
|
||||
// The random generator to generate random keys (including session keys)
|
||||
private static SecureRandom secureRandom = new SecureRandom();
|
||||
// Principal db
|
||||
private Map<String,char[]> passwords = new HashMap<String,char[]>();
|
||||
// Realm name
|
||||
private String realm;
|
||||
// The request/response job queue
|
||||
private BlockingQueue<Job> q = new ArrayBlockingQueue<Job>(100);
|
||||
// Service port number
|
||||
private int port;
|
||||
// Options
|
||||
private Map<Option,Object> options = new HashMap<Option,Object>();
|
||||
|
||||
/**
|
||||
* Option names, to be expanded forever.
|
||||
*/
|
||||
public static enum Option {
|
||||
/**
|
||||
* Whether pre-authentication is required. Default Boolean.TRUE
|
||||
*/
|
||||
PREAUTH_REQUIRED,
|
||||
};
|
||||
|
||||
/**
|
||||
* A standalone KDC server.
|
||||
* @param args
|
||||
* @throws java.lang.Exception
|
||||
*/
|
||||
public static void main(String[] args) throws Exception {
|
||||
if (args.length > 0) {
|
||||
if (args[0].equals("-help") || args[0].equals("--help")) {
|
||||
System.out.println("Usage:");
|
||||
System.out.println(" java " + KDC.class + " " +
|
||||
"Start KDC on port 8888");
|
||||
return;
|
||||
}
|
||||
}
|
||||
String localhost = "localhost";
|
||||
try {
|
||||
localhost = InetAddress.getByName(localhost)
|
||||
.getCanonicalHostName();
|
||||
} catch (UnknownHostException uhe) {
|
||||
; // Ignore, localhost is still "localhost"
|
||||
}
|
||||
KDC kdc = create("RABBIT.HOLE", 8888, false);
|
||||
kdc.addPrincipal("dummy", "bogus".toCharArray());
|
||||
kdc.addPrincipal("foo", "bar".toCharArray());
|
||||
kdc.addPrincipalRandKey("krbtgt/" + kdc.realm);
|
||||
kdc.addPrincipalRandKey("server/" + localhost);
|
||||
kdc.addPrincipalRandKey("backend/" + localhost);
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates and starts a KDC running as a daemon on a random port.
|
||||
* @param realm the realm name
|
||||
* @return the running KDC instance
|
||||
* @throws java.io.IOException for any socket creation error
|
||||
*/
|
||||
public static KDC create(String realm) throws IOException {
|
||||
return create(realm, 0, true);
|
||||
}
|
||||
|
||||
/**
|
||||
* Creates and starts a KDC server.
|
||||
* @param realm the realm name
|
||||
* @param port the TCP and UDP port to listen to. A random port will to
|
||||
* chosen if zero.
|
||||
* @param asDaemon if true, KDC threads will be daemons. Otherwise, not.
|
||||
* @return the running KDC instance
|
||||
* @throws java.io.IOException for any socket creation error
|
||||
*/
|
||||
public static KDC create(String realm, int port, boolean asDaemon) throws IOException {
|
||||
return new KDC(realm, port, asDaemon);
|
||||
}
|
||||
|
||||
/**
|
||||
* Sets an option
|
||||
* @param key the option name
|
||||
* @param obj the value
|
||||
*/
|
||||
public void setOption(Option key, Object value) {
|
||||
options.put(key, value);
|
||||
}
|
||||
|
||||
/**
|
||||
* Write all principals' keys into a keytab file. Note that the keys for
|
||||
* the krbtgt principal for this realm will not be written.
|
||||
* <p>
|
||||
* Attention: This method references krb5.conf settings. If you need to
|
||||
* setup krb5.conf later, please call <code>Config.refresh()</code> after
|
||||
* the new setting. For example:
|
||||
* <pre>
|
||||
* kdc.writeKtab("/etc/kdc/ktab"); // Config is initialized,
|
||||
* System.setProperty("java.security.krb5.conf", "/home/mykrb5.conf");
|
||||
* Config.refresh();
|
||||
* </pre>
|
||||
*
|
||||
* Inside this method there are 2 places krb5.conf is used:
|
||||
* <ol>
|
||||
* <li> (Fatal) Generating keys: EncryptionKey.acquireSecretKeys
|
||||
* <li> (Has workaround) Creating PrincipalName
|
||||
* </ol>
|
||||
* @param tab The keytab filename to write to.
|
||||
* @throws java.io.IOException for any file output error
|
||||
* @throws sun.security.krb5.KrbException for any realm and/or principal
|
||||
* name error.
|
||||
*/
|
||||
public void writeKtab(String tab) throws IOException, KrbException {
|
||||
KeyTab ktab = KeyTab.create(tab);
|
||||
for (String name : passwords.keySet()) {
|
||||
if (name.equals("krbtgt/" + realm)) {
|
||||
continue;
|
||||
}
|
||||
ktab.addEntry(new PrincipalName(name + "@" + realm,
|
||||
name.indexOf('/') < 0 ?
|
||||
PrincipalName.KRB_NT_UNKNOWN :
|
||||
PrincipalName.KRB_NT_SRV_HST), passwords.get(name));
|
||||
}
|
||||
ktab.save();
|
||||
}
|
||||
|
||||
/**
|
||||
* Adds a new principal to this realm with a given password.
|
||||
* @param user the principal's name. For a service principal, use the
|
||||
* form of host/f.q.d.n
|
||||
* @param pass the password for the principal
|
||||
*/
|
||||
public void addPrincipal(String user, char[] pass) {
|
||||
passwords.put(user, pass);
|
||||
}
|
||||
|
||||
/**
|
||||
* Adds a new principal to this realm with a random password
|
||||
* @param user the principal's name. For a service principal, use the
|
||||
* form of host/f.q.d.n
|
||||
*/
|
||||
public void addPrincipalRandKey(String user) {
|
||||
passwords.put(user, randomPassword());
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the name of this realm
|
||||
* @return the name of this realm
|
||||
*/
|
||||
public String getRealm() {
|
||||
return realm;
|
||||
}
|
||||
|
||||
/**
|
||||
* Writes a krb5.conf for one or more KDC that includes KDC locations for
|
||||
* each realm and the default realm name. You can also add extra strings
|
||||
* into the file. The method should be called like:
|
||||
* <pre>
|
||||
* KDC.saveConfig("krb5.conf", kdc1, kdc2, ..., line1, line2, ...);
|
||||
* </pre>
|
||||
* Here you can provide one or more kdc# and zero or more line# arguments.
|
||||
* The line# will be put after [libdefaults] and before [realms]. Therefore
|
||||
* you can append new lines into [libdefaults] and/or create your new
|
||||
* stanzas as well. Note that a newline character will be appended to
|
||||
* each line# argument.
|
||||
* <p>
|
||||
* For example:
|
||||
* <pre>
|
||||
* KDC.saveConfig("krb5.conf", this);
|
||||
* </pre>
|
||||
* generates:
|
||||
* <pre>
|
||||
* [libdefaults]
|
||||
* default_realm = REALM.NAME
|
||||
*
|
||||
* [realms]
|
||||
* REALM.NAME = {
|
||||
* kdc = localhost:port_number
|
||||
* }
|
||||
* </pre>
|
||||
*
|
||||
* Another example:
|
||||
* <pre>
|
||||
* KDC.saveConfig("krb5.conf", kdc1, kdc2, "forwardable = true", "",
|
||||
* "[domain_realm]",
|
||||
* ".kdc1.com = KDC1.NAME");
|
||||
* </pre>
|
||||
* generates:
|
||||
* <pre>
|
||||
* [libdefaults]
|
||||
* default_realm = KDC1.NAME
|
||||
* forwardable = true
|
||||
*
|
||||
* [domain_realm]
|
||||
* .kdc1.com = KDC1.NAME
|
||||
*
|
||||
* [realms]
|
||||
* KDC1.NAME = {
|
||||
* kdc = localhost:port1
|
||||
* }
|
||||
* KDC2.NAME = {
|
||||
* kdc = localhost:port2
|
||||
* }
|
||||
* </pre>
|
||||
* @param file the name of the file to write into
|
||||
* @param kdc the first (and default) KDC
|
||||
* @param more more KDCs or extra lines (in their appearing order) to
|
||||
* insert into the krb5.conf file. This method reads each argument's type
|
||||
* to determine what it's for. This argument can be empty.
|
||||
* @throws java.io.IOException for any file output error
|
||||
*/
|
||||
public static void saveConfig(String file, KDC kdc, Object... more)
|
||||
throws IOException {
|
||||
File f = new File(file);
|
||||
StringBuffer sb = new StringBuffer();
|
||||
sb.append("[libdefaults]\ndefault_realm = ");
|
||||
sb.append(kdc.realm);
|
||||
sb.append("\n");
|
||||
for (Object o: more) {
|
||||
if (o instanceof String) {
|
||||
sb.append(o);
|
||||
sb.append("\n");
|
||||
}
|
||||
}
|
||||
sb.append("\n[realms]\n");
|
||||
sb.append(realmLineForKDC(kdc));
|
||||
for (Object o: more) {
|
||||
if (o instanceof KDC) {
|
||||
sb.append(realmLineForKDC((KDC)o));
|
||||
}
|
||||
}
|
||||
FileOutputStream fos = new FileOutputStream(f);
|
||||
fos.write(sb.toString().getBytes());
|
||||
fos.close();
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the service port of the KDC server.
|
||||
* @return the KDC service port
|
||||
*/
|
||||
public int getPort() {
|
||||
return port;
|
||||
}
|
||||
|
||||
// Private helper methods
|
||||
|
||||
/**
|
||||
* Private constructor, cannot be called outside.
|
||||
* @param realm
|
||||
*/
|
||||
private KDC(String realm) {
|
||||
this.realm = realm;
|
||||
}
|
||||
|
||||
/**
|
||||
* A constructor that starts the KDC service also.
|
||||
*/
|
||||
protected KDC(String realm, int port, boolean asDaemon)
|
||||
throws IOException {
|
||||
this(realm);
|
||||
startServer(port, asDaemon);
|
||||
}
|
||||
/**
|
||||
* Generates a 32-char random password
|
||||
* @return the password
|
||||
*/
|
||||
private static char[] randomPassword() {
|
||||
char[] pass = new char[32];
|
||||
for (int i=0; i<32; i++)
|
||||
pass[i] = (char)secureRandom.nextInt();
|
||||
return pass;
|
||||
}
|
||||
|
||||
/**
|
||||
* Generates a random key for the given encryption type.
|
||||
* @param eType the encryption type
|
||||
* @return the generated key
|
||||
* @throws sun.security.krb5.KrbException for unknown/unsupported etype
|
||||
*/
|
||||
private static EncryptionKey generateRandomKey(int eType)
|
||||
throws KrbException {
|
||||
// Is 32 enough for AES256? I should have generated the keys directly
|
||||
// but different cryptos have different rules on what keys are valid.
|
||||
char[] pass = randomPassword();
|
||||
String algo;
|
||||
switch (eType) {
|
||||
case EncryptedData.ETYPE_DES_CBC_MD5: algo = "DES"; break;
|
||||
case EncryptedData.ETYPE_DES3_CBC_HMAC_SHA1_KD: algo = "DESede"; break;
|
||||
case EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96: algo = "AES128"; break;
|
||||
case EncryptedData.ETYPE_ARCFOUR_HMAC: algo = "ArcFourHMAC"; break;
|
||||
case EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96: algo = "AES256"; break;
|
||||
default: algo = "DES"; break;
|
||||
}
|
||||
return new EncryptionKey(pass, "NOTHING", algo); // Silly
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the password for a given principal
|
||||
* @param p principal
|
||||
* @return the password
|
||||
* @throws sun.security.krb5.KrbException when the principal is not inside
|
||||
* the database.
|
||||
*/
|
||||
private char[] getPassword(PrincipalName p) throws KrbException {
|
||||
char[] pass = passwords.get(p.getNameString());
|
||||
if (pass == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_C_PRINCIPAL_UNKNOWN);
|
||||
}
|
||||
return pass;
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the salt string for the principal. For normal users, the
|
||||
* concatenation for the realm name and the sections of the principal;
|
||||
* for krgtgt/A@B and krbtgt/B@A, always return AB (so that inter-realm
|
||||
* principals have the same key).
|
||||
* @param p principal
|
||||
* @return the salt
|
||||
*/
|
||||
private String getSalt(PrincipalName p) {
|
||||
String[] ns = p.getNameStrings();
|
||||
if (ns[0].equals("krbtgt") && ns.length > 1) {
|
||||
// Shared cross-realm keys must be the same
|
||||
if (ns[1].compareTo(realm) < 0) {
|
||||
return ns[1] + realm;
|
||||
} else {
|
||||
return realm + ns[1];
|
||||
}
|
||||
} else {
|
||||
String s = getRealm();
|
||||
for (String n: p.getNameStrings()) {
|
||||
s += n;
|
||||
}
|
||||
return s;
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Returns the key for a given principal of the given encryption type
|
||||
* @param p the principal
|
||||
* @param etype the encryption type
|
||||
* @return the key
|
||||
* @throws sun.security.krb5.KrbException for unknown/unsupported etype
|
||||
*/
|
||||
private EncryptionKey keyForUser(PrincipalName p, int etype) throws KrbException {
|
||||
try {
|
||||
// Do not call EncryptionKey.acquireSecretKeys(), otherwise
|
||||
// the krb5.conf config file would be loaded.
|
||||
Method stringToKey = EncryptionKey.class.getDeclaredMethod("stringToKey", char[].class, String.class, byte[].class, Integer.TYPE);
|
||||
stringToKey.setAccessible(true);
|
||||
return new EncryptionKey((byte[]) stringToKey.invoke(null, getPassword(p), getSalt(p), null, etype), etype, null);
|
||||
} catch (InvocationTargetException ex) {
|
||||
KrbException ke = (KrbException)ex.getCause();
|
||||
throw ke;
|
||||
} catch (Exception e) {
|
||||
throw new RuntimeException(e); // should not happen
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Processes an incoming request and generates a response.
|
||||
* @param in the request
|
||||
* @return the response
|
||||
* @throws java.lang.Exception for various errors
|
||||
*/
|
||||
private byte[] processMessage(byte[] in) throws Exception {
|
||||
if ((in[0] & 0x1f) == Krb5.KRB_AS_REQ)
|
||||
return processAsReq(in);
|
||||
else
|
||||
return processTgsReq(in);
|
||||
}
|
||||
|
||||
/**
|
||||
* Processes a TGS_REQ and generates a TGS_REP (or KRB_ERROR)
|
||||
* @param in the request
|
||||
* @return the response
|
||||
* @throws java.lang.Exception for various errors
|
||||
*/
|
||||
private byte[] processTgsReq(byte[] in) throws Exception {
|
||||
TGSReq tgsReq = new TGSReq(in);
|
||||
try {
|
||||
System.out.println(realm + "> " + tgsReq.reqBody.cname +
|
||||
" sends TGS-REQ for " +
|
||||
tgsReq.reqBody.sname);
|
||||
KDCReqBody body = tgsReq.reqBody;
|
||||
int etype = 0;
|
||||
|
||||
// Reflection: PAData[] pas = tgsReq.pAData;
|
||||
Field f = KDCReq.class.getDeclaredField("pAData");
|
||||
f.setAccessible(true);
|
||||
PAData[] pas = (PAData[])f.get(tgsReq);
|
||||
|
||||
Ticket tkt = null;
|
||||
EncTicketPart etp = null;
|
||||
if (pas == null || pas.length == 0) {
|
||||
throw new KrbException(Krb5.KDC_ERR_PADATA_TYPE_NOSUPP);
|
||||
} else {
|
||||
for (PAData pa: pas) {
|
||||
if (pa.getType() == Krb5.PA_TGS_REQ) {
|
||||
APReq apReq = new APReq(pa.getValue());
|
||||
EncryptedData ed = apReq.authenticator;
|
||||
tkt = apReq.ticket;
|
||||
etype = tkt.encPart.getEType();
|
||||
EncryptionKey kkey = null;
|
||||
if (!tkt.realm.toString().equals(realm)) {
|
||||
if (tkt.sname.getNameString().equals("krbtgt/" + realm)) {
|
||||
kkey = keyForUser(new PrincipalName("krbtgt/" + tkt.realm.toString(), realm), etype);
|
||||
}
|
||||
} else {
|
||||
kkey = keyForUser(tkt.sname, etype);
|
||||
}
|
||||
byte[] bb = tkt.encPart.decrypt(kkey, KeyUsage.KU_TICKET);
|
||||
DerInputStream derIn = new DerInputStream(bb);
|
||||
DerValue der = derIn.getDerValue();
|
||||
etp = new EncTicketPart(der.toByteArray());
|
||||
}
|
||||
}
|
||||
if (tkt == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_PADATA_TYPE_NOSUPP);
|
||||
}
|
||||
}
|
||||
EncryptionKey skey = keyForUser(body.sname, etype);
|
||||
if (skey == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_SUMTYPE_NOSUPP); // TODO
|
||||
}
|
||||
|
||||
// Session key for original ticket, TGT
|
||||
EncryptionKey ckey = etp.key;
|
||||
|
||||
// Session key for session with the service
|
||||
EncryptionKey key = generateRandomKey(etype);
|
||||
|
||||
// Check time, TODO
|
||||
KerberosTime till = body.till;
|
||||
if (till == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_NEVER_VALID); // TODO
|
||||
} else if (till.isZero()) {
|
||||
till = new KerberosTime(new Date().getTime() + 1000 * 3600 * 11);
|
||||
}
|
||||
|
||||
boolean[] bFlags = new boolean[Krb5.TKT_OPTS_MAX+1];
|
||||
if (body.kdcOptions.get(KDCOptions.FORWARDABLE)) {
|
||||
bFlags[Krb5.TKT_OPTS_FORWARDABLE] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.FORWARDED) ||
|
||||
etp.flags.get(Krb5.TKT_OPTS_FORWARDED)) {
|
||||
bFlags[Krb5.TKT_OPTS_FORWARDED] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.RENEWABLE)) {
|
||||
bFlags[Krb5.TKT_OPTS_RENEWABLE] = true;
|
||||
//renew = new KerberosTime(new Date().getTime() + 1000 * 3600 * 24 * 7);
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.PROXIABLE)) {
|
||||
bFlags[Krb5.TKT_OPTS_PROXIABLE] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.POSTDATED)) {
|
||||
bFlags[Krb5.TKT_OPTS_POSTDATED] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.ALLOW_POSTDATE)) {
|
||||
bFlags[Krb5.TKT_OPTS_MAY_POSTDATE] = true;
|
||||
}
|
||||
bFlags[Krb5.TKT_OPTS_INITIAL] = true;
|
||||
|
||||
TicketFlags tFlags = new TicketFlags(bFlags);
|
||||
EncTicketPart enc = new EncTicketPart(
|
||||
tFlags,
|
||||
key,
|
||||
etp.crealm,
|
||||
etp.cname,
|
||||
new TransitedEncoding(1, new byte[0]), // TODO
|
||||
new KerberosTime(new Date()),
|
||||
body.from,
|
||||
till, body.rtime,
|
||||
body.addresses,
|
||||
null);
|
||||
Ticket t = new Ticket(
|
||||
body.crealm,
|
||||
body.sname,
|
||||
new EncryptedData(skey, enc.asn1Encode(), KeyUsage.KU_TICKET)
|
||||
);
|
||||
EncTGSRepPart enc_part = new EncTGSRepPart(
|
||||
key,
|
||||
new LastReq(new LastReqEntry[]{
|
||||
new LastReqEntry(0, new KerberosTime(new Date().getTime() - 10000))
|
||||
}),
|
||||
body.getNonce(), // TODO: detect replay
|
||||
new KerberosTime(new Date().getTime() + 1000 * 3600 * 24),
|
||||
// Next 5 and last MUST be same with ticket
|
||||
tFlags,
|
||||
new KerberosTime(new Date()),
|
||||
body.from,
|
||||
till, body.rtime,
|
||||
body.crealm,
|
||||
body.sname,
|
||||
body.addresses
|
||||
);
|
||||
EncryptedData edata = new EncryptedData(ckey, enc_part.asn1Encode(), KeyUsage.KU_ENC_TGS_REP_PART_SESSKEY);
|
||||
TGSRep tgsRep = new TGSRep(null,
|
||||
etp.crealm,
|
||||
etp.cname,
|
||||
t,
|
||||
edata);
|
||||
System.out.println(" Return " + tgsRep.cname
|
||||
+ " ticket for " + tgsRep.ticket.sname);
|
||||
|
||||
DerOutputStream out = new DerOutputStream();
|
||||
out.write(DerValue.createTag(DerValue.TAG_APPLICATION,
|
||||
true, (byte)Krb5.KRB_TGS_REP), tgsRep.asn1Encode());
|
||||
return out.toByteArray();
|
||||
} catch (KrbException ke) {
|
||||
ke.printStackTrace(System.out);
|
||||
KRBError kerr = ke.getError();
|
||||
KDCReqBody body = tgsReq.reqBody;
|
||||
System.out.println(" Error " + ke.returnCode()
|
||||
+ " " +ke.returnCodeMessage());
|
||||
if (kerr == null) {
|
||||
kerr = new KRBError(null, null, null,
|
||||
new KerberosTime(new Date()),
|
||||
0,
|
||||
ke.returnCode(),
|
||||
body.crealm, body.cname,
|
||||
new Realm(getRealm()), body.sname,
|
||||
KrbException.errorMessage(ke.returnCode()),
|
||||
null);
|
||||
}
|
||||
return kerr.asn1Encode();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Processes a AS_REQ and generates a AS_REP (or KRB_ERROR)
|
||||
* @param in the request
|
||||
* @return the response
|
||||
* @throws java.lang.Exception for various errors
|
||||
*/
|
||||
private byte[] processAsReq(byte[] in) throws Exception {
|
||||
ASReq asReq = new ASReq(in);
|
||||
int[] eTypes = null;
|
||||
try {
|
||||
System.out.println(realm + "> " + asReq.reqBody.cname +
|
||||
" sends AS-REQ for " +
|
||||
asReq.reqBody.sname);
|
||||
|
||||
KDCReqBody body = asReq.reqBody;
|
||||
|
||||
// Reflection: int[] eType = body.eType;
|
||||
Field f = KDCReqBody.class.getDeclaredField("eType");
|
||||
f.setAccessible(true);
|
||||
eTypes = (int[])f.get(body);
|
||||
int eType = eTypes[0];
|
||||
|
||||
EncryptionKey ckey = keyForUser(body.cname, eType);
|
||||
EncryptionKey skey = keyForUser(body.sname, eType);
|
||||
if (ckey == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_ETYPE_NOSUPP);
|
||||
}
|
||||
if (skey == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_SUMTYPE_NOSUPP); // TODO
|
||||
}
|
||||
|
||||
// Session key
|
||||
EncryptionKey key = generateRandomKey(eType);
|
||||
// Check time, TODO
|
||||
KerberosTime till = body.till;
|
||||
if (till == null) {
|
||||
throw new KrbException(Krb5.KDC_ERR_NEVER_VALID); // TODO
|
||||
} else if (till.isZero()) {
|
||||
till = new KerberosTime(new Date().getTime() + 1000 * 3600 * 11);
|
||||
}
|
||||
//body.from
|
||||
boolean[] bFlags = new boolean[Krb5.TKT_OPTS_MAX+1];
|
||||
if (body.kdcOptions.get(KDCOptions.FORWARDABLE)) {
|
||||
bFlags[Krb5.TKT_OPTS_FORWARDABLE] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.RENEWABLE)) {
|
||||
bFlags[Krb5.TKT_OPTS_RENEWABLE] = true;
|
||||
//renew = new KerberosTime(new Date().getTime() + 1000 * 3600 * 24 * 7);
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.PROXIABLE)) {
|
||||
bFlags[Krb5.TKT_OPTS_PROXIABLE] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.POSTDATED)) {
|
||||
bFlags[Krb5.TKT_OPTS_POSTDATED] = true;
|
||||
}
|
||||
if (body.kdcOptions.get(KDCOptions.ALLOW_POSTDATE)) {
|
||||
bFlags[Krb5.TKT_OPTS_MAY_POSTDATE] = true;
|
||||
}
|
||||
bFlags[Krb5.TKT_OPTS_INITIAL] = true;
|
||||
|
||||
f = KDCReq.class.getDeclaredField("pAData");
|
||||
f.setAccessible(true);
|
||||
PAData[] pas = (PAData[])f.get(asReq);
|
||||
if (pas == null || pas.length == 0) {
|
||||
Object preauth = options.get(Option.PREAUTH_REQUIRED);
|
||||
if (preauth == null || preauth.equals(Boolean.TRUE)) {
|
||||
throw new KrbException(Krb5.KDC_ERR_PREAUTH_REQUIRED);
|
||||
}
|
||||
} else {
|
||||
try {
|
||||
Constructor<EncryptedData> ctor = EncryptedData.class.getDeclaredConstructor(DerValue.class);
|
||||
ctor.setAccessible(true);
|
||||
EncryptedData data = ctor.newInstance(new DerValue(pas[0].getValue()));
|
||||
data.decrypt(ckey, KeyUsage.KU_PA_ENC_TS);
|
||||
} catch (Exception e) {
|
||||
throw new KrbException(Krb5.KDC_ERR_PREAUTH_FAILED);
|
||||
}
|
||||
bFlags[Krb5.TKT_OPTS_PRE_AUTHENT] = true;
|
||||
}
|
||||
|
||||
TicketFlags tFlags = new TicketFlags(bFlags);
|
||||
EncTicketPart enc = new EncTicketPart(
|
||||
tFlags,
|
||||
key,
|
||||
body.crealm,
|
||||
body.cname,
|
||||
new TransitedEncoding(1, new byte[0]),
|
||||
new KerberosTime(new Date()),
|
||||
body.from,
|
||||
till, body.rtime,
|
||||
body.addresses,
|
||||
null);
|
||||
Ticket t = new Ticket(
|
||||
body.crealm,
|
||||
body.sname,
|
||||
new EncryptedData(skey, enc.asn1Encode(), KeyUsage.KU_TICKET)
|
||||
);
|
||||
EncASRepPart enc_part = new EncASRepPart(
|
||||
key,
|
||||
new LastReq(new LastReqEntry[]{
|
||||
new LastReqEntry(0, new KerberosTime(new Date().getTime() - 10000))
|
||||
}),
|
||||
body.getNonce(), // TODO: detect replay?
|
||||
new KerberosTime(new Date().getTime() + 1000 * 3600 * 24),
|
||||
// Next 5 and last MUST be same with ticket
|
||||
tFlags,
|
||||
new KerberosTime(new Date()),
|
||||
body.from,
|
||||
till, body.rtime,
|
||||
body.crealm,
|
||||
body.sname,
|
||||
body.addresses
|
||||
);
|
||||
EncryptedData edata = new EncryptedData(ckey, enc_part.asn1Encode(), KeyUsage.KU_ENC_AS_REP_PART);
|
||||
ASRep asRep = new ASRep(null,
|
||||
body.crealm,
|
||||
body.cname,
|
||||
t,
|
||||
edata);
|
||||
|
||||
System.out.println(" Return " + asRep.cname
|
||||
+ " ticket for " + asRep.ticket.sname);
|
||||
|
||||
DerOutputStream out = new DerOutputStream();
|
||||
out.write(DerValue.createTag(DerValue.TAG_APPLICATION,
|
||||
true, (byte)Krb5.KRB_AS_REP), asRep.asn1Encode());
|
||||
return out.toByteArray();
|
||||
} catch (KrbException ke) {
|
||||
ke.printStackTrace(System.out);
|
||||
KRBError kerr = ke.getError();
|
||||
KDCReqBody body = asReq.reqBody;
|
||||
System.out.println(" Error " + ke.returnCode()
|
||||
+ " " +ke.returnCodeMessage());
|
||||
byte[] eData = null;
|
||||
if (kerr == null) {
|
||||
if (ke.returnCode() == Krb5.KDC_ERR_PREAUTH_REQUIRED ||
|
||||
ke.returnCode() == Krb5.KDC_ERR_PREAUTH_FAILED) {
|
||||
PAData pa;
|
||||
|
||||
ETypeInfo2 ei2 = new ETypeInfo2(eTypes[0], null, null);
|
||||
DerOutputStream eid = new DerOutputStream();
|
||||
eid.write(DerValue.tag_Sequence, ei2.asn1Encode());
|
||||
|
||||
pa = new PAData(Krb5.PA_ETYPE_INFO2, eid.toByteArray());
|
||||
|
||||
DerOutputStream bytes = new DerOutputStream();
|
||||
bytes.write(new PAData(Krb5.PA_ENC_TIMESTAMP, new byte[0]).asn1Encode());
|
||||
bytes.write(pa.asn1Encode());
|
||||
|
||||
boolean allOld = true;
|
||||
for (int i: eTypes) {
|
||||
if (i == EncryptedData.ETYPE_AES128_CTS_HMAC_SHA1_96 ||
|
||||
i == EncryptedData.ETYPE_AES256_CTS_HMAC_SHA1_96) {
|
||||
allOld = false;
|
||||
break;
|
||||
}
|
||||
}
|
||||
if (allOld) {
|
||||
ETypeInfo ei = new ETypeInfo(eTypes[0], null);
|
||||
eid = new DerOutputStream();
|
||||
eid.write(DerValue.tag_Sequence, ei.asn1Encode());
|
||||
pa = new PAData(Krb5.PA_ETYPE_INFO, eid.toByteArray());
|
||||
bytes.write(pa.asn1Encode());
|
||||
}
|
||||
DerOutputStream temp = new DerOutputStream();
|
||||
temp.write(DerValue.tag_Sequence, bytes);
|
||||
eData = temp.toByteArray();
|
||||
}
|
||||
kerr = new KRBError(null, null, null,
|
||||
new KerberosTime(new Date()),
|
||||
0,
|
||||
ke.returnCode(),
|
||||
body.crealm, body.cname,
|
||||
new Realm(getRealm()), body.sname,
|
||||
KrbException.errorMessage(ke.returnCode()),
|
||||
eData);
|
||||
}
|
||||
return kerr.asn1Encode();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* Generates a line for a KDC to put inside [realms] of krb5.conf
|
||||
* @param kdc the KDC
|
||||
* @return REALM.NAME = { kdc = localhost:port }
|
||||
*/
|
||||
private static String realmLineForKDC(KDC kdc) {
|
||||
return String.format(" %s = {\n kdc = localhost:%d\n }\n", kdc.realm, kdc.port);
|
||||
}
|
||||
|
||||
/**
|
||||
* Start the KDC service. This server listens on both UDP and TCP using
|
||||
* the same port number. It uses three threads to deal with requests.
|
||||
* They can be set to daemon threads if requested.
|
||||
* @param port the port number to listen to. If zero, a random available
|
||||
* port no less than 8000 will be chosen and used.
|
||||
* @param asDaemon true if the KDC threads should be daemons
|
||||
* @throws java.io.IOException for any communication error
|
||||
*/
|
||||
protected void startServer(int port, boolean asDaemon) throws IOException {
|
||||
DatagramSocket u1 = null;
|
||||
ServerSocket t1 = null;
|
||||
if (port > 0) {
|
||||
u1 = new DatagramSocket(port, InetAddress.getByName("127.0.0.1"));
|
||||
t1 = new ServerSocket(port);
|
||||
} else {
|
||||
while (true) {
|
||||
// Try to find a port number that's both TCP and UDP free
|
||||
try {
|
||||
port = 8000 + new java.util.Random().nextInt(10000);
|
||||
u1 = null;
|
||||
u1 = new DatagramSocket(port, InetAddress.getByName("127.0.0.1"));
|
||||
t1 = new ServerSocket(port);
|
||||
break;
|
||||
} catch (Exception e) {
|
||||
if (u1 != null) u1.close();
|
||||
}
|
||||
}
|
||||
}
|
||||
final DatagramSocket udp = u1;
|
||||
final ServerSocket tcp = t1;
|
||||
System.out.println("Start KDC on " + port);
|
||||
|
||||
this.port = port;
|
||||
|
||||
// The UDP consumer
|
||||
Thread thread = new Thread() {
|
||||
public void run() {
|
||||
while (true) {
|
||||
try {
|
||||
byte[] inbuf = new byte[8192];
|
||||
DatagramPacket p = new DatagramPacket(inbuf, inbuf.length);
|
||||
udp.receive(p);
|
||||
System.out.println("-----------------------------------------------");
|
||||
System.out.println(">>>>> UDP packet received");
|
||||
q.put(new Job(processMessage(Arrays.copyOf(inbuf, p.getLength())), udp, p));
|
||||
} catch (Exception e) {
|
||||
e.printStackTrace();
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
thread.setDaemon(asDaemon);
|
||||
thread.start();
|
||||
|
||||
// The TCP consumer
|
||||
thread = new Thread() {
|
||||
public void run() {
|
||||
while (true) {
|
||||
try {
|
||||
Socket socket = tcp.accept();
|
||||
System.out.println("-----------------------------------------------");
|
||||
System.out.println(">>>>> TCP connection established");
|
||||
DataInputStream in = new DataInputStream(socket.getInputStream());
|
||||
DataOutputStream out = new DataOutputStream(socket.getOutputStream());
|
||||
byte[] token = new byte[in.readInt()];
|
||||
in.readFully(token);
|
||||
q.put(new Job(processMessage(token), socket, out));
|
||||
} catch (Exception e) {
|
||||
e.printStackTrace();
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
thread.setDaemon(asDaemon);
|
||||
thread.start();
|
||||
|
||||
// The dispatcher
|
||||
thread = new Thread() {
|
||||
public void run() {
|
||||
while (true) {
|
||||
try {
|
||||
q.take().send();
|
||||
} catch (Exception e) {
|
||||
}
|
||||
}
|
||||
}
|
||||
};
|
||||
thread.setDaemon(true);
|
||||
thread.start();
|
||||
}
|
||||
|
||||
/**
|
||||
* Helper class to encapsulate a job in a KDC.
|
||||
*/
|
||||
private static class Job {
|
||||
byte[] token; // The received request at creation time and
|
||||
// the response at send time
|
||||
Socket s; // The TCP socket from where the request comes
|
||||
DataOutputStream out; // The OutputStream of the TCP socket
|
||||
DatagramSocket s2; // The UDP socket from where the request comes
|
||||
DatagramPacket dp; // The incoming UDP datagram packet
|
||||
boolean useTCP; // Whether TCP or UDP is used
|
||||
|
||||
// Creates a job object for TCP
|
||||
Job(byte[] token, Socket s, DataOutputStream out) {
|
||||
useTCP = true;
|
||||
this.token = token;
|
||||
this.s = s;
|
||||
this.out = out;
|
||||
}
|
||||
|
||||
// Creates a job object for UDP
|
||||
Job(byte[] token, DatagramSocket s2, DatagramPacket dp) {
|
||||
useTCP = false;
|
||||
this.token = token;
|
||||
this.s2 = s2;
|
||||
this.dp = dp;
|
||||
}
|
||||
|
||||
// Sends the output back to the client
|
||||
void send() {
|
||||
try {
|
||||
if (useTCP) {
|
||||
System.out.println(">>>>> TCP request honored");
|
||||
out.writeInt(token.length);
|
||||
out.write(token);
|
||||
s.close();
|
||||
} else {
|
||||
System.out.println(">>>>> UDP request honored");
|
||||
s2.send(new DatagramPacket(token, token.length, dp.getAddress(), dp.getPort()));
|
||||
}
|
||||
} catch (Exception e) {
|
||||
e.printStackTrace();
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
173
jdk/test/sun/security/krb5/auto/KerberosHashEqualsTest.java
Normal file
173
jdk/test/sun/security/krb5/auto/KerberosHashEqualsTest.java
Normal file
@ -0,0 +1,173 @@
|
||||
/*
|
||||
* Copyright 2005-2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
/*
|
||||
* @test
|
||||
* @bug 4641821
|
||||
* @summary hashCode() and equals() for KerberosKey and KerberosTicket
|
||||
*/
|
||||
|
||||
import java.net.InetAddress;
|
||||
import java.util.Date;
|
||||
import javax.security.auth.kerberos.KerberosKey;
|
||||
import javax.security.auth.kerberos.KerberosPrincipal;
|
||||
import javax.security.auth.kerberos.KerberosTicket;
|
||||
|
||||
public class KerberosHashEqualsTest {
|
||||
public static void main(String[] args) throws Exception {
|
||||
new OneKDC(null);
|
||||
new KerberosHashEqualsTest().check();
|
||||
}
|
||||
|
||||
void checkSame(Object o1, Object o2) {
|
||||
if(!o1.equals(o2)) {
|
||||
throw new RuntimeException("equals() fails");
|
||||
}
|
||||
if(o1.hashCode() != o2.hashCode()) {
|
||||
throw new RuntimeException("hashCode() not same");
|
||||
}
|
||||
}
|
||||
|
||||
void checkNotSame(Object o1, Object o2) {
|
||||
if(o1.equals(o2)) {
|
||||
throw new RuntimeException("equals() succeeds");
|
||||
}
|
||||
}
|
||||
|
||||
void check() throws Exception {
|
||||
|
||||
// The key part:
|
||||
// new KerberosKey(principal, bytes, keyType, version)
|
||||
|
||||
KerberosKey k1, k2;
|
||||
KerberosPrincipal CLIENT = new KerberosPrincipal("client");
|
||||
KerberosPrincipal SERVER = new KerberosPrincipal("server");
|
||||
byte[] PASS = "pass".getBytes();
|
||||
|
||||
k1 = new KerberosKey(CLIENT, PASS, 1, 1);
|
||||
k2 = new KerberosKey(CLIENT, PASS, 1, 1);
|
||||
checkSame(k1, k1); // me is me
|
||||
checkSame(k1, k2); // same
|
||||
|
||||
// A destroyed key doesn't equal to any key
|
||||
k2.destroy();
|
||||
checkNotSame(k1, k2);
|
||||
checkNotSame(k2, k1);
|
||||
k1.destroy();
|
||||
checkNotSame(k1, k2); // even if they are both destroyed
|
||||
checkNotSame(k2, k1);
|
||||
checkSame(k2, k2);
|
||||
|
||||
// a little difference means not equal
|
||||
k1 = new KerberosKey(CLIENT, PASS, 1, 1);
|
||||
k2 = new KerberosKey(SERVER, PASS, 1, 1);
|
||||
checkNotSame(k1, k2); // Different principal name
|
||||
|
||||
k2 = new KerberosKey(CLIENT, "ssap".getBytes(), 1, 1);
|
||||
checkNotSame(k1, k2); // Different password
|
||||
|
||||
k2 = new KerberosKey(CLIENT, PASS, 2, 1);
|
||||
checkNotSame(k1, k2); // Different keytype
|
||||
|
||||
k2 = new KerberosKey(CLIENT, PASS, 1, 2);
|
||||
checkNotSame(k1, k2); // Different version
|
||||
|
||||
k2 = new KerberosKey(null, PASS, 1, 2);
|
||||
checkNotSame(k1, k2); // null is not non-null
|
||||
|
||||
k1 = new KerberosKey(null, PASS, 1, 2);
|
||||
checkSame(k1, k2); // null is null
|
||||
|
||||
checkNotSame(k1, "Another Object");
|
||||
|
||||
// The ticket part:
|
||||
// new KerberosTicket(asn1 bytes, client, server, session key, type, flags,
|
||||
// auth, start, end, renewUntil times, address)
|
||||
|
||||
KerberosTicket t1, t2;
|
||||
|
||||
byte[] ASN1 = "asn1".getBytes();
|
||||
boolean[] FORWARDABLE = new boolean[] {true, true};
|
||||
boolean[] ALLTRUE = new boolean[] {true, true, true, true, true, true, true, true, true, true};
|
||||
Date D0 = new Date(0);
|
||||
|
||||
t1 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
checkSame(t1, t1);
|
||||
checkSame(t1, t2);
|
||||
|
||||
// destroyed tickets doesn't equal to each other
|
||||
t1.destroy();
|
||||
checkNotSame(t1, t2);
|
||||
checkNotSame(t2, t1);
|
||||
|
||||
t2.destroy();
|
||||
checkNotSame(t1, t2); // even if they are both destroyed
|
||||
checkNotSame(t2, t1);
|
||||
|
||||
checkSame(t2, t2); // unless they are the same object
|
||||
|
||||
// a little difference means not equal
|
||||
t1 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
t2 = new KerberosTicket("asn11".getBytes(), CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different ASN1 encoding
|
||||
|
||||
t2 = new KerberosTicket(ASN1, new KerberosPrincipal("client1"), SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different client
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, new KerberosPrincipal("server1"), PASS, 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different server
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, "pass1".getBytes(), 1, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different session key
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 2, FORWARDABLE, D0, D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different key type
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, new boolean[] {true, false}, D0, D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different flags, not FORWARDABLE
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, new Date(1), D0, D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different authtime
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, new Date(1), D0, D0, null);
|
||||
checkNotSame(t1, t2); // Different starttime
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, new Date(1), D0, null);
|
||||
checkNotSame(t1, t2); // Different endtime
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, D0, new InetAddress[2]);
|
||||
checkNotSame(t1, t2); // Different client addresses
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, new Date(1), null);
|
||||
t1 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, FORWARDABLE, D0, D0, D0, new Date(2), null);
|
||||
checkSame(t1, t2); // renewtill is ignored when RENEWABLE ticket flag is not set.
|
||||
|
||||
t2 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, ALLTRUE, D0, D0, D0, new Date(1), null);
|
||||
t1 = new KerberosTicket(ASN1, CLIENT, SERVER, PASS, 1, ALLTRUE, D0, D0, D0, new Date(2), null);
|
||||
checkNotSame(t1, t2); // renewtill is used when RENEWABLE is set.
|
||||
|
||||
checkNotSame(t1, "Another Object");
|
||||
System.out.println("Good!");
|
||||
}
|
||||
}
|
||||
155
jdk/test/sun/security/krb5/auto/OneKDC.java
Normal file
155
jdk/test/sun/security/krb5/auto/OneKDC.java
Normal file
@ -0,0 +1,155 @@
|
||||
/*
|
||||
* Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
import java.io.File;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.net.InetAddress;
|
||||
import java.net.UnknownHostException;
|
||||
import java.security.Security;
|
||||
import javax.security.auth.callback.Callback;
|
||||
import javax.security.auth.callback.CallbackHandler;
|
||||
import javax.security.auth.callback.NameCallback;
|
||||
import javax.security.auth.callback.PasswordCallback;
|
||||
import sun.security.krb5.Config;
|
||||
|
||||
/**
|
||||
* This class starts a simple KDC with one realm, several typical principal
|
||||
* names, generates delete-on-exit krb5.conf and keytab files, and setup
|
||||
* system properties for them. There's also a helper method to generate a
|
||||
* JAAS login config file that can be used for JAAS or JGSS apps.
|
||||
* <p>
|
||||
* Just call this line to start everything:
|
||||
* <pre>
|
||||
* new OneKDC(null).writeJaasConf();
|
||||
* </pre>
|
||||
*/
|
||||
public class OneKDC extends KDC {
|
||||
|
||||
// The krb5 codes would try to canonicalize hostnames before creating
|
||||
// a service principal name, so let's find out the canonicalized form
|
||||
// of localhost first. The following codes mimic the process inside
|
||||
// PrincipalName.java.
|
||||
static String localhost = "localhost";
|
||||
static {
|
||||
try {
|
||||
localhost = InetAddress.getByName(localhost)
|
||||
.getCanonicalHostName();
|
||||
} catch (UnknownHostException uhe) {
|
||||
; // Ignore, localhost is still "localhost"
|
||||
}
|
||||
}
|
||||
public static final String USER = "dummy";
|
||||
public static final char[] PASS = "bogus".toCharArray();
|
||||
public static String SERVER = "server/" + localhost;
|
||||
public static String BACKEND = "backend/" + localhost;
|
||||
public static final String KRB5_CONF = "localkdc-krb5.conf";
|
||||
public static final String KTAB = "localkdc.ktab";
|
||||
public static final String JAAS_CONF = "localkdc-jaas.conf";
|
||||
public static final String REALM = "RABBIT.HOLE";
|
||||
|
||||
/**
|
||||
* Creates the KDC and starts it.
|
||||
* @param etype Encryption type, null if not specified
|
||||
* @throws java.lang.Exception if there's anything wrong
|
||||
*/
|
||||
public OneKDC(String etype) throws Exception {
|
||||
super(REALM, 0, true);
|
||||
addPrincipal(USER, PASS);
|
||||
addPrincipalRandKey("krbtgt/" + REALM);
|
||||
addPrincipalRandKey(SERVER);
|
||||
addPrincipalRandKey(BACKEND);
|
||||
KDC.saveConfig(KRB5_CONF, this,
|
||||
"forwardable = true",
|
||||
"default_keytab_name = " + KTAB,
|
||||
etype == null ? "" : "default_tkt_enctypes=" + etype + "\ndefault_tgs_enctypes=" + etype);
|
||||
System.setProperty("java.security.krb5.conf", KRB5_CONF);
|
||||
// Whatever krb5.conf had been loaded before, we reload ours now.
|
||||
Config.refresh();
|
||||
|
||||
writeKtab(KTAB);
|
||||
new File(KRB5_CONF).deleteOnExit();
|
||||
new File(KTAB).deleteOnExit();
|
||||
}
|
||||
|
||||
/**
|
||||
* Writes a JAAS login config file, which contains as many as useful
|
||||
* entries, including JGSS style initiator/acceptor and normal JAAS
|
||||
* entries with names using existing OneKDC principals.
|
||||
* @throws java.lang.Exception if anything goes wrong
|
||||
*/
|
||||
public void writeJAASConf() throws IOException {
|
||||
System.setProperty("java.security.auth.login.config", JAAS_CONF);
|
||||
File f = new File(JAAS_CONF);
|
||||
FileOutputStream fos = new FileOutputStream(f);
|
||||
fos.write((
|
||||
"com.sun.security.jgss.krb5.initiate {\n" +
|
||||
" com.sun.security.auth.module.Krb5LoginModule required;\n};\n" +
|
||||
"com.sun.security.jgss.krb5.accept {\n" +
|
||||
" com.sun.security.auth.module.Krb5LoginModule required\n" +
|
||||
" principal=\"" + SERVER + "\"\n" +
|
||||
" useKeyTab=true\n" +
|
||||
" isInitiator=false\n" +
|
||||
" storeKey=true;\n};\n" +
|
||||
"client {\n" +
|
||||
" com.sun.security.auth.module.Krb5LoginModule required;\n};\n" +
|
||||
"server {\n" +
|
||||
" com.sun.security.auth.module.Krb5LoginModule required\n" +
|
||||
" principal=\"" + SERVER + "\"\n" +
|
||||
" useKeyTab=true\n" +
|
||||
" storeKey=true;\n};\n" +
|
||||
"backend {\n" +
|
||||
" com.sun.security.auth.module.Krb5LoginModule required\n" +
|
||||
" principal=\"" + BACKEND + "\"\n" +
|
||||
" useKeyTab=true\n" +
|
||||
" storeKey=true\n" +
|
||||
" isInitiator=false;\n};\n"
|
||||
).getBytes());
|
||||
fos.close();
|
||||
f.deleteOnExit();
|
||||
Security.setProperty("auth.login.defaultCallbackHandler", "OneKDC$CallbackForClient");
|
||||
}
|
||||
|
||||
/**
|
||||
* The default callback handler for JAAS login. Note that this handler is
|
||||
* hard coded to provide only info for USER1. If you need to provide info
|
||||
* for another principal, please use Context.fromUserPass() instead.
|
||||
*/
|
||||
public static class CallbackForClient implements CallbackHandler {
|
||||
public void handle(Callback[] callbacks) {
|
||||
String user = OneKDC.USER;
|
||||
char[] pass = OneKDC.PASS;
|
||||
for (Callback callback : callbacks) {
|
||||
if (callback instanceof NameCallback) {
|
||||
System.out.println("Callback for name: " + user);
|
||||
((NameCallback) callback).setName(user);
|
||||
}
|
||||
if (callback instanceof PasswordCallback) {
|
||||
System.out.println("Callback for pass: "
|
||||
+ new String(pass));
|
||||
((PasswordCallback) callback).setPassword(pass);
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
65
jdk/test/sun/security/krb5/auto/basic.sh
Normal file
65
jdk/test/sun/security/krb5/auto/basic.sh
Normal file
@ -0,0 +1,65 @@
|
||||
#
|
||||
# Copyright 2008 Sun Microsystems, Inc. All Rights Reserved.
|
||||
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
#
|
||||
# This code is free software; you can redistribute it and/or modify it
|
||||
# under the terms of the GNU General Public License version 2 only, as
|
||||
# published by the Free Software Foundation.
|
||||
#
|
||||
# This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
# version 2 for more details (a copy is included in the LICENSE file that
|
||||
# accompanied this code).
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License version
|
||||
# 2 along with this work; if not, write to the Free Software Foundation,
|
||||
# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
#
|
||||
# Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
# CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
# have any questions.
|
||||
#
|
||||
|
||||
# @test
|
||||
# @bug 6706974
|
||||
# @summary Add krb5 test infrastructure
|
||||
# @run shell/timeout=300 basic.sh
|
||||
#
|
||||
|
||||
if [ "${TESTSRC}" = "" ] ; then
|
||||
TESTSRC="."
|
||||
fi
|
||||
if [ "${TESTJAVA}" = "" ] ; then
|
||||
echo "TESTJAVA not set. Test cannot execute."
|
||||
echo "FAILED!!!"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
# set platform-dependent variables
|
||||
OS=`uname -s`
|
||||
case "$OS" in
|
||||
Windows_* )
|
||||
FS="\\"
|
||||
;;
|
||||
* )
|
||||
FS="/"
|
||||
;;
|
||||
esac
|
||||
|
||||
${TESTJAVA}${FS}bin${FS}javac -d . \
|
||||
${TESTSRC}${FS}BasicKrb5Test.java \
|
||||
${TESTSRC}${FS}KDC.java \
|
||||
${TESTSRC}${FS}OneKDC.java \
|
||||
${TESTSRC}${FS}Action.java \
|
||||
${TESTSRC}${FS}Context.java \
|
||||
|| exit 10
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test || exit 100
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test des-cbc-crc || exit 1
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test des-cbc-md5 || exit 3
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test des3-cbc-sha1 || exit 16
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test aes128-cts || exit 17
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test aes256-cts || exit 18
|
||||
${TESTJAVA}${FS}bin${FS}java -Dtest.src=$TESTSRC BasicKrb5Test rc4-hmac || exit 23
|
||||
|
||||
exit 0
|
||||
Loading…
x
Reference in New Issue
Block a user