mirror of
https://github.com/openjdk/jdk.git
synced 2026-02-16 05:15:22 +00:00
6939248: Jarsigner can't extract Extended Key Usage from Timestamp Reply correctly
Reviewed-by: xuelei, mullan
This commit is contained in:
parent
7afbc895a8
commit
592e8de4e1
@ -81,6 +81,11 @@ public final class TimestampedSigner extends ContentSigner {
|
||||
*/
|
||||
private static final String KP_TIMESTAMPING_OID = "1.3.6.1.5.5.7.3.8";
|
||||
|
||||
/*
|
||||
* Object identifier for extendedKeyUsage extension
|
||||
*/
|
||||
private static final String EXTENDED_KEY_USAGE_OID = "2.5.29.37";
|
||||
|
||||
/*
|
||||
* Object identifier for the timestamping access descriptors.
|
||||
*/
|
||||
@ -357,34 +362,26 @@ public final class TimestampedSigner extends ContentSigner {
|
||||
}
|
||||
|
||||
// Examine the TSA's certificate (if present)
|
||||
List<String> keyPurposes = null;
|
||||
X509Certificate[] certs = tsToken.getCertificates();
|
||||
if (certs != null && certs.length > 0) {
|
||||
// Use certficate from the TSP reply
|
||||
// Pick out the cert for the TS server, which is the end-entity
|
||||
// one inside the chain.
|
||||
for (X509Certificate cert: certs) {
|
||||
boolean isSigner = false;
|
||||
for (X509Certificate cert2: certs) {
|
||||
if (cert != cert2) {
|
||||
if (cert.getSubjectDN().equals(cert2.getIssuerDN())) {
|
||||
isSigner = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
for (SignerInfo si: tsToken.getSignerInfos()) {
|
||||
X509Certificate cert = si.getCertificate(tsToken);
|
||||
if (cert == null) {
|
||||
// Error, we've already set tsRequestCertificate = true
|
||||
throw new CertificateException(
|
||||
"Certificate not included in timestamp token");
|
||||
} else {
|
||||
if (!cert.getCriticalExtensionOIDs().contains(
|
||||
EXTENDED_KEY_USAGE_OID)) {
|
||||
throw new CertificateException(
|
||||
"Certificate is not valid for timestamping");
|
||||
}
|
||||
if (!isSigner) {
|
||||
keyPurposes = cert.getExtendedKeyUsage();
|
||||
if (keyPurposes == null ||
|
||||
! keyPurposes.contains(KP_TIMESTAMPING_OID)) {
|
||||
throw new CertificateException(
|
||||
"Certificate is not valid for timestamping");
|
||||
}
|
||||
break;
|
||||
List keyPurposes = cert.getExtendedKeyUsage();
|
||||
if (keyPurposes == null ||
|
||||
! keyPurposes.contains(KP_TIMESTAMPING_OID)) {
|
||||
throw new CertificateException(
|
||||
"Certificate is not valid for timestamping");
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
return tsReply.getEncodedToken();
|
||||
}
|
||||
}
|
||||
|
||||
294
jdk/test/sun/security/tools/jarsigner/TimestampCheck.java
Normal file
294
jdk/test/sun/security/tools/jarsigner/TimestampCheck.java
Normal file
@ -0,0 +1,294 @@
|
||||
/*
|
||||
* Copyright 2003-2010 Sun Microsystems, Inc. All Rights Reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
* under the terms of the GNU General Public License version 2 only, as
|
||||
* published by the Free Software Foundation.
|
||||
*
|
||||
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
* version 2 for more details (a copy is included in the LICENSE file that
|
||||
* accompanied this code).
|
||||
*
|
||||
* You should have received a copy of the GNU General Public License version
|
||||
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
*
|
||||
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
* CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
* have any questions.
|
||||
*/
|
||||
|
||||
import com.sun.net.httpserver.*;
|
||||
import java.io.BufferedReader;
|
||||
import java.io.ByteArrayOutputStream;
|
||||
import java.io.File;
|
||||
import java.io.FileInputStream;
|
||||
import java.io.FileOutputStream;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStreamReader;
|
||||
import java.io.OutputStream;
|
||||
import java.math.BigInteger;
|
||||
import java.net.InetSocketAddress;
|
||||
import java.security.KeyStore;
|
||||
import java.security.PrivateKey;
|
||||
import java.security.Signature;
|
||||
import java.security.cert.Certificate;
|
||||
import java.security.cert.X509Certificate;
|
||||
import java.util.Calendar;
|
||||
import sun.security.pkcs.ContentInfo;
|
||||
import sun.security.pkcs.PKCS7;
|
||||
import sun.security.pkcs.SignerInfo;
|
||||
import sun.security.util.DerOutputStream;
|
||||
import sun.security.util.DerValue;
|
||||
import sun.security.util.ObjectIdentifier;
|
||||
import sun.security.x509.AlgorithmId;
|
||||
import sun.security.x509.X500Name;
|
||||
|
||||
public class TimestampCheck {
|
||||
static final String TSKS = "tsks";
|
||||
static final String JAR = "old.jar";
|
||||
|
||||
static class Handler implements HttpHandler {
|
||||
public void handle(HttpExchange t) throws IOException {
|
||||
int len = 0;
|
||||
for (String h: t.getRequestHeaders().keySet()) {
|
||||
if (h.equalsIgnoreCase("Content-length")) {
|
||||
len = Integer.valueOf(t.getRequestHeaders().get(h).get(0));
|
||||
}
|
||||
}
|
||||
byte[] input = new byte[len];
|
||||
t.getRequestBody().read(input);
|
||||
|
||||
try {
|
||||
int path = 0;
|
||||
if (t.getRequestURI().getPath().length() > 1) {
|
||||
path = Integer.parseInt(
|
||||
t.getRequestURI().getPath().substring(1));
|
||||
}
|
||||
byte[] output = sign(input, path);
|
||||
Headers out = t.getResponseHeaders();
|
||||
out.set("Content-Type", "application/timestamp-reply");
|
||||
|
||||
t.sendResponseHeaders(200, output.length);
|
||||
OutputStream os = t.getResponseBody();
|
||||
os.write(output);
|
||||
} catch (Exception e) {
|
||||
e.printStackTrace();
|
||||
t.sendResponseHeaders(500, 0);
|
||||
}
|
||||
t.close();
|
||||
}
|
||||
|
||||
/**
|
||||
* @param input The data to sign
|
||||
* @param path different cases to simulate, impl on URL path
|
||||
* 0: normal
|
||||
* 1: Missing nonce
|
||||
* 2: Different nonce
|
||||
* 3: Bad digets octets in messageImprint
|
||||
* 4: Different algorithmId in messageImprint
|
||||
* 5: whole chain in cert set
|
||||
* 6: extension is missing
|
||||
* 7: extension is non-critical
|
||||
* 8: extension does not have timestamping
|
||||
* @returns the signed
|
||||
*/
|
||||
byte[] sign(byte[] input, int path) throws Exception {
|
||||
// Read TSRequest
|
||||
DerValue value = new DerValue(input);
|
||||
System.err.println("\nIncoming Request\n===================");
|
||||
System.err.println("Version: " + value.data.getInteger());
|
||||
DerValue messageImprint = value.data.getDerValue();
|
||||
AlgorithmId aid = AlgorithmId.parse(
|
||||
messageImprint.data.getDerValue());
|
||||
System.err.println("AlgorithmId: " + aid);
|
||||
|
||||
BigInteger nonce = null;
|
||||
while (value.data.available() > 0) {
|
||||
DerValue v = value.data.getDerValue();
|
||||
if (v.tag == DerValue.tag_Integer) {
|
||||
nonce = v.getBigInteger();
|
||||
System.err.println("nonce: " + nonce);
|
||||
} else if (v.tag == DerValue.tag_Boolean) {
|
||||
System.err.println("certReq: " + v.getBoolean());
|
||||
}
|
||||
}
|
||||
|
||||
// Write TSResponse
|
||||
System.err.println("\nResponse\n===================");
|
||||
KeyStore ks = KeyStore.getInstance("JKS");
|
||||
ks.load(new FileInputStream(TSKS), "changeit".toCharArray());
|
||||
|
||||
String alias = "ts";
|
||||
if (path == 6) alias = "tsbad1";
|
||||
if (path == 7) alias = "tsbad2";
|
||||
if (path == 8) alias = "tsbad3";
|
||||
|
||||
DerOutputStream statusInfo = new DerOutputStream();
|
||||
statusInfo.putInteger(0);
|
||||
|
||||
DerOutputStream token = new DerOutputStream();
|
||||
AlgorithmId[] algorithms = {aid};
|
||||
Certificate[] chain = ks.getCertificateChain(alias);
|
||||
X509Certificate[] signerCertificateChain = null;
|
||||
X509Certificate signer = (X509Certificate)chain[0];
|
||||
if (path == 5) { // Only case 5 uses full chain
|
||||
signerCertificateChain = new X509Certificate[chain.length];
|
||||
for (int i=0; i<chain.length; i++) {
|
||||
signerCertificateChain[i] = (X509Certificate)chain[i];
|
||||
}
|
||||
} else if (path == 9) {
|
||||
signerCertificateChain = new X509Certificate[0];
|
||||
} else {
|
||||
signerCertificateChain = new X509Certificate[1];
|
||||
signerCertificateChain[0] = (X509Certificate)chain[0];
|
||||
}
|
||||
|
||||
DerOutputStream tst = new DerOutputStream();
|
||||
|
||||
tst.putInteger(1);
|
||||
tst.putOID(new ObjectIdentifier("1.2.3.4")); // policy
|
||||
|
||||
if (path != 3 && path != 4) {
|
||||
tst.putDerValue(messageImprint);
|
||||
} else {
|
||||
byte[] data = messageImprint.toByteArray();
|
||||
if (path == 4) {
|
||||
data[6] = (byte)0x01;
|
||||
} else {
|
||||
data[data.length-1] = (byte)0x01;
|
||||
data[data.length-2] = (byte)0x02;
|
||||
data[data.length-3] = (byte)0x03;
|
||||
}
|
||||
tst.write(data);
|
||||
}
|
||||
|
||||
tst.putInteger(1);
|
||||
|
||||
Calendar cal = Calendar.getInstance();
|
||||
tst.putGeneralizedTime(cal.getTime());
|
||||
|
||||
if (path == 2) {
|
||||
tst.putInteger(1234);
|
||||
} else if (path == 1) {
|
||||
// do nothing
|
||||
} else {
|
||||
tst.putInteger(nonce);
|
||||
}
|
||||
|
||||
DerOutputStream tstInfo = new DerOutputStream();
|
||||
tstInfo.write(DerValue.tag_Sequence, tst);
|
||||
|
||||
DerOutputStream tstInfo2 = new DerOutputStream();
|
||||
tstInfo2.putOctetString(tstInfo.toByteArray());
|
||||
|
||||
Signature sig = Signature.getInstance("SHA1withDSA");
|
||||
sig.initSign((PrivateKey)(ks.getKey(
|
||||
alias, "changeit".toCharArray())));
|
||||
sig.update(tstInfo.toByteArray());
|
||||
|
||||
ContentInfo contentInfo = new ContentInfo(new ObjectIdentifier(
|
||||
"1.2.840.113549.1.9.16.1.4"),
|
||||
new DerValue(tstInfo2.toByteArray()));
|
||||
|
||||
System.err.println("Signing...");
|
||||
System.err.println(new X500Name(signer
|
||||
.getIssuerX500Principal().getName()));
|
||||
System.err.println(signer.getSerialNumber());
|
||||
|
||||
SignerInfo signerInfo = new SignerInfo(
|
||||
new X500Name(signer.getIssuerX500Principal().getName()),
|
||||
signer.getSerialNumber(),
|
||||
aid, AlgorithmId.get("DSA"), sig.sign());
|
||||
|
||||
SignerInfo[] signerInfos = {signerInfo};
|
||||
PKCS7 p7 =
|
||||
new PKCS7(algorithms, contentInfo, signerCertificateChain,
|
||||
signerInfos);
|
||||
ByteArrayOutputStream p7out = new ByteArrayOutputStream();
|
||||
p7.encodeSignedData(p7out);
|
||||
|
||||
DerOutputStream response = new DerOutputStream();
|
||||
response.write(DerValue.tag_Sequence, statusInfo);
|
||||
response.putDerValue(new DerValue(p7out.toByteArray()));
|
||||
|
||||
DerOutputStream out = new DerOutputStream();
|
||||
out.write(DerValue.tag_Sequence, response);
|
||||
|
||||
return out.toByteArray();
|
||||
}
|
||||
}
|
||||
|
||||
public static void main(String[] args) throws Exception {
|
||||
|
||||
Handler h = new Handler();
|
||||
HttpServer server = HttpServer.create(new InetSocketAddress(0), 0);
|
||||
int port = server.getAddress().getPort();
|
||||
HttpContext ctx = server.createContext("/", h);
|
||||
server.start();
|
||||
|
||||
String cmd = null;
|
||||
// Use -J-Djava.security.egd=file:/dev/./urandom to speed up
|
||||
// nonce generation in timestamping request. Not avaibale on
|
||||
// Windows and defaults to thread seed generator, not too bad.
|
||||
if (System.getProperty("java.home").endsWith("jre")) {
|
||||
cmd = System.getProperty("java.home") + "/../bin/jarsigner" +
|
||||
" -J-Djava.security.egd=file:/dev/./urandom" +
|
||||
" -debug -keystore " + TSKS + " -storepass changeit" +
|
||||
" -tsa http://localhost:" + port + "/%d" +
|
||||
" -signedjar new.jar " + JAR + " old";
|
||||
} else {
|
||||
cmd = System.getProperty("java.home") + "/bin/jarsigner" +
|
||||
" -J-Djava.security.egd=file:/dev/./urandom" +
|
||||
" -debug -keystore " + TSKS + " -storepass changeit" +
|
||||
" -tsa http://localhost:" + port + "/%d" +
|
||||
" -signedjar new.jar " + JAR + " old";
|
||||
}
|
||||
|
||||
try {
|
||||
if (args.length == 0) { // Run this test
|
||||
jarsigner(cmd, 0, true); // Success, normal call
|
||||
jarsigner(cmd, 1, false); // These 4 should fail
|
||||
jarsigner(cmd, 2, false);
|
||||
jarsigner(cmd, 3, false);
|
||||
jarsigner(cmd, 4, false);
|
||||
jarsigner(cmd, 5, true); // Success, 6543440 solved.
|
||||
jarsigner(cmd, 6, false); // tsbad1
|
||||
jarsigner(cmd, 7, false); // tsbad2
|
||||
jarsigner(cmd, 8, false); // tsbad3
|
||||
jarsigner(cmd, 9, false); // no cert in timestamp
|
||||
} else { // Run as a standalone server
|
||||
System.err.println("Press Enter to quit server");
|
||||
System.in.read();
|
||||
}
|
||||
} finally {
|
||||
server.stop(0);
|
||||
new File("x.jar").delete();
|
||||
}
|
||||
}
|
||||
|
||||
/**
|
||||
* @param cmd the command line (with a hole to plug in)
|
||||
* @param path the path in the URL, i.e, http://localhost/path
|
||||
* @param expected if this command should succeed
|
||||
*/
|
||||
static void jarsigner(String cmd, int path, boolean expected)
|
||||
throws Exception {
|
||||
System.err.println("Test " + path);
|
||||
Process p = Runtime.getRuntime().exec(String.format(cmd, path));
|
||||
BufferedReader reader = new BufferedReader(
|
||||
new InputStreamReader(p.getErrorStream()));
|
||||
while (true) {
|
||||
String s = reader.readLine();
|
||||
if (s == null) break;
|
||||
System.err.println(s);
|
||||
}
|
||||
int result = p.waitFor();
|
||||
if (expected && result != 0 || !expected && result == 0) {
|
||||
throw new Exception("Failed");
|
||||
}
|
||||
}
|
||||
}
|
||||
91
jdk/test/sun/security/tools/jarsigner/ts.sh
Normal file
91
jdk/test/sun/security/tools/jarsigner/ts.sh
Normal file
@ -0,0 +1,91 @@
|
||||
#
|
||||
# Copyright 2007-2010 Sun Microsystems, Inc. All Rights Reserved.
|
||||
# DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
#
|
||||
# This code is free software; you can redistribute it and/or modify it
|
||||
# under the terms of the GNU General Public License version 2 only, as
|
||||
# published by the Free Software Foundation.
|
||||
#
|
||||
# This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
# ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
# FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
# version 2 for more details (a copy is included in the LICENSE file that
|
||||
# accompanied this code).
|
||||
#
|
||||
# You should have received a copy of the GNU General Public License version
|
||||
# 2 along with this work; if not, write to the Free Software Foundation,
|
||||
# Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
#
|
||||
# Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
||||
# CA 95054 USA or visit www.sun.com if you need additional information or
|
||||
# have any questions.
|
||||
#
|
||||
|
||||
# @test
|
||||
# @bug 6543842 6543440 6939248
|
||||
# @summary checking response of timestamp
|
||||
#
|
||||
# @run shell/timeout=600 ts.sh
|
||||
|
||||
# Run for a long time because jarsigner with timestamp needs to create a
|
||||
# 64-bit random number and it might be extremely slow on a machine with
|
||||
# not enough entropy pool
|
||||
|
||||
# set platform-dependent variables
|
||||
OS=`uname -s`
|
||||
case "$OS" in
|
||||
Windows_* )
|
||||
FS="\\"
|
||||
;;
|
||||
* )
|
||||
FS="/"
|
||||
;;
|
||||
esac
|
||||
|
||||
if [ "${TESTSRC}" = "" ] ; then
|
||||
TESTSRC="."
|
||||
fi
|
||||
if [ "${TESTJAVA}" = "" ] ; then
|
||||
JAVAC_CMD=`which javac`
|
||||
TESTJAVA=`dirname $JAVAC_CMD`/..
|
||||
fi
|
||||
|
||||
JAR="${TESTJAVA}${FS}bin${FS}jar"
|
||||
JAVA="${TESTJAVA}${FS}bin${FS}java"
|
||||
JAVAC="${TESTJAVA}${FS}bin${FS}javac"
|
||||
KT="${TESTJAVA}${FS}bin${FS}keytool -keystore tsks -storepass changeit -keypass changeit"
|
||||
|
||||
rm tsks
|
||||
echo Nothing > A
|
||||
rm old.jar
|
||||
$JAR cvf old.jar A
|
||||
|
||||
# ca is CA
|
||||
# old is signer for code
|
||||
# ts is signer for timestamp
|
||||
# tsbad1 has no extendedKeyUsage
|
||||
# tsbad2's extendedKeyUsage is non-critical
|
||||
# tsbad3's extendedKeyUsage has no timestamping
|
||||
|
||||
$KT -alias ca -genkeypair -ext bc -dname CN=CA
|
||||
$KT -alias old -genkeypair -dname CN=old
|
||||
$KT -alias ts -genkeypair -dname CN=ts
|
||||
$KT -alias tsbad1 -genkeypair -dname CN=tsbad1
|
||||
$KT -alias tsbad2 -genkeypair -dname CN=tsbad2
|
||||
$KT -alias tsbad3 -genkeypair -dname CN=tsbad3
|
||||
$KT -alias ts -certreq | \
|
||||
$KT -alias ca -gencert -ext eku:critical=ts | \
|
||||
$KT -alias ts -importcert
|
||||
$KT -alias tsbad1 -certreq | \
|
||||
$KT -alias ca -gencert | \
|
||||
$KT -alias tsbad1 -importcert
|
||||
$KT -alias tsbad2 -certreq | \
|
||||
$KT -alias ca -gencert -ext eku=ts | \
|
||||
$KT -alias tsbad2 -importcert
|
||||
$KT -alias tsbad3 -certreq | \
|
||||
$KT -alias ca -gencert -ext eku:critical=cs | \
|
||||
$KT -alias tsbad3 -importcert
|
||||
|
||||
$JAVAC -d . ${TESTSRC}/TimestampCheck.java
|
||||
$JAVA TimestampCheck
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user