View Javadoc
1   /*
2    * Copyright 2016 The Netty Project
3    *
4    * The Netty Project licenses this file to you under the Apache License,
5    * version 2.0 (the "License"); you may not use this file except in compliance
6    * with the License. You may obtain a copy of the License at:
7    *
8    *   https://www.apache.org/licenses/LICENSE-2.0
9    *
10   * Unless required by applicable law or agreed to in writing, software
11   * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
12   * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
13   * License for the specific language governing permissions and limitations
14   * under the License.
15   */
16  package io.netty.handler.ssl;
17  
18  import io.netty.internal.tcnative.CertificateCallback;
19  import io.netty.internal.tcnative.SSL;
20  import io.netty.internal.tcnative.SSLContext;
21  import io.netty.util.internal.EmptyArrays;
22  
23  import java.security.KeyStore;
24  import java.security.PrivateKey;
25  import java.security.cert.X509Certificate;
26  import java.util.Arrays;
27  import java.util.Collections;
28  import java.util.HashSet;
29  import java.util.LinkedHashSet;
30  import java.util.List;
31  import java.util.Map;
32  import java.util.Set;
33  import javax.net.ssl.KeyManagerFactory;
34  import javax.net.ssl.SNIServerName;
35  import javax.net.ssl.SSLException;
36  import javax.net.ssl.TrustManagerFactory;
37  import javax.net.ssl.X509ExtendedTrustManager;
38  import javax.net.ssl.X509TrustManager;
39  import javax.security.auth.x500.X500Principal;
40  
41  /**
42   * A client-side {@link SslContext} which uses OpenSSL's SSL/TLS implementation.
43   * <p>Instances of this class must be {@link #release() released} or else native memory will leak!
44   *
45   * <p>Instances of this class <strong>must not</strong> be released before any {@link ReferenceCountedOpenSslEngine}
46   * which depends upon the instance of this class is released. Otherwise if any method of
47   * {@link ReferenceCountedOpenSslEngine} is called which uses this class's JNI resources the JVM may crash.
48   */
49  public final class ReferenceCountedOpenSslClientContext extends ReferenceCountedOpenSslContext {
50  
51      private static final Set<String> SUPPORTED_KEY_TYPES = Collections.unmodifiableSet(new LinkedHashSet<String>(
52              Arrays.asList(OpenSslKeyMaterialManager.KEY_TYPE_RSA,
53                            OpenSslKeyMaterialManager.KEY_TYPE_DH_RSA,
54                            OpenSslKeyMaterialManager.KEY_TYPE_EC,
55                            OpenSslKeyMaterialManager.KEY_TYPE_EC_RSA,
56                            OpenSslKeyMaterialManager.KEY_TYPE_EC_EC)));
57  
58      private final OpenSslSessionContext sessionContext;
59  
60      ReferenceCountedOpenSslClientContext(X509Certificate[] trustCertCollection, TrustManagerFactory trustManagerFactory,
61                                           X509Certificate[] keyCertChain, PrivateKey key, String keyPassword,
62                                           KeyManagerFactory keyManagerFactory, Iterable<String> ciphers,
63                                           CipherSuiteFilter cipherFilter, ApplicationProtocolConfig apn,
64                                           String[] protocols, long sessionCacheSize, long sessionTimeout,
65                                           boolean enableOcsp, String keyStore, String endpointIdentificationAlgorithm,
66                                           List<SNIServerName> serverNames, ResumptionController resumptionController,
67                                           Map.Entry<SslContextOption<?>, Object>... options) throws SSLException {
68          super(ciphers, cipherFilter, toNegotiator(apn), SSL.SSL_MODE_CLIENT, keyCertChain,
69                ClientAuth.NONE, protocols, false, endpointIdentificationAlgorithm, enableOcsp, true,
70                  serverNames, resumptionController, options);
71          boolean success = false;
72          try {
73              sessionContext = newSessionContext(this, ctx, engineMap, trustCertCollection, trustManagerFactory,
74                                                 keyCertChain, key, keyPassword, keyManagerFactory, keyStore,
75                                                 sessionCacheSize, sessionTimeout, resumptionController);
76              success = true;
77          } finally {
78              if (!success) {
79                  release();
80              }
81          }
82      }
83  
84      @Override
85      public OpenSslSessionContext sessionContext() {
86          return sessionContext;
87      }
88  
89      static OpenSslSessionContext newSessionContext(ReferenceCountedOpenSslContext thiz, long ctx,
90                                                     OpenSslEngineMap engineMap,
91                                                     X509Certificate[] trustCertCollection,
92                                                     TrustManagerFactory trustManagerFactory,
93                                                     X509Certificate[] keyCertChain, PrivateKey key,
94                                                     String keyPassword, KeyManagerFactory keyManagerFactory,
95                                                     String keyStore, long sessionCacheSize, long sessionTimeout,
96                                                     ResumptionController resumptionController)
97              throws SSLException {
98          if (key == null && keyCertChain != null || key != null && keyCertChain == null) {
99              throw new IllegalArgumentException(
100                     "Either both keyCertChain and key needs to be null or none of them");
101         }
102         OpenSslKeyMaterialProvider keyMaterialProvider = null;
103         try {
104             try {
105                 if (!OpenSsl.useKeyManagerFactory()) {
106                     if (keyManagerFactory != null) {
107                         throw new IllegalArgumentException(
108                                 "KeyManagerFactory not supported");
109                     }
110                     if (keyCertChain != null/* && key != null*/) {
111                         setKeyMaterial(ctx, keyCertChain, key, keyPassword);
112                     }
113                 } else {
114                     // javadocs state that keyManagerFactory has precedent over keyCertChain
115                     if (keyManagerFactory == null && keyCertChain != null) {
116                         char[] keyPasswordChars = keyStorePassword(keyPassword);
117                         KeyStore ks = buildKeyStore(keyCertChain, key, keyPasswordChars, keyStore);
118                         if (ks.aliases().hasMoreElements()) {
119                             keyManagerFactory = new OpenSslX509KeyManagerFactory();
120                         } else {
121                             keyManagerFactory = new OpenSslCachingX509KeyManagerFactory(
122                                     KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm()));
123                         }
124                         keyManagerFactory.init(ks, keyPasswordChars);
125                         keyMaterialProvider = providerFor(keyManagerFactory, keyPassword);
126                     } else if (keyManagerFactory != null) {
127                         keyMaterialProvider = providerFor(keyManagerFactory, keyPassword);
128                     }
129 
130                     if (keyMaterialProvider != null) {
131                         OpenSslKeyMaterialManager materialManager =
132                                 new OpenSslKeyMaterialManager(keyMaterialProvider, thiz.hasTmpDhKeys);
133                         SSLContext.setCertificateCallback(ctx, new OpenSslClientCertificateCallback(
134                                 engineMap, materialManager));
135                     }
136                 }
137             } catch (Exception e) {
138                 throw new SSLException("failed to set certificate and key", e);
139             }
140 
141             // On the client side we always need to use SSL_CVERIFY_OPTIONAL (which will translate to SSL_VERIFY_PEER)
142             // to ensure that when the TrustManager throws we will produce the correct alert back to the server.
143             //
144             // See:
145             //   - https://www.openssl.org/docs/man1.0.2/man3/SSL_CTX_set_verify.html
146             //   - https://github.com/netty/netty/issues/8942
147             SSLContext.setVerify(ctx, SSL.SSL_CVERIFY_OPTIONAL, VERIFY_DEPTH);
148 
149             try {
150                 if (trustCertCollection != null) {
151                     trustManagerFactory = buildTrustManagerFactory(trustCertCollection, trustManagerFactory, keyStore);
152                 } else if (trustManagerFactory == null) {
153                     trustManagerFactory = TrustManagerFactory.getInstance(
154                             TrustManagerFactory.getDefaultAlgorithm());
155                     trustManagerFactory.init((KeyStore) null);
156                 }
157                 final X509TrustManager manager = chooseTrustManager(
158                         trustManagerFactory.getTrustManagers(), resumptionController);
159 
160                 // IMPORTANT: The callbacks set for verification must be static to prevent memory leak as
161                 //            otherwise the context can never be collected. This is because the JNI code holds
162                 //            a global reference to the callbacks.
163                 //
164                 //            See https://github.com/netty/netty/issues/5372
165 
166                 setVerifyCallback(ctx, engineMap, manager);
167             } catch (Exception e) {
168                 if (keyMaterialProvider != null) {
169                     keyMaterialProvider.destroy();
170                 }
171                 throw new SSLException("unable to setup trustmanager", e);
172             }
173             OpenSslClientSessionContext context = new OpenSslClientSessionContext(thiz, keyMaterialProvider);
174             context.setSessionCacheEnabled(CLIENT_ENABLE_SESSION_CACHE);
175             if (sessionCacheSize > 0) {
176                 context.setSessionCacheSize((int) Math.min(sessionCacheSize, Integer.MAX_VALUE));
177             }
178             if (sessionTimeout > 0) {
179                 context.setSessionTimeout((int) Math.min(sessionTimeout, Integer.MAX_VALUE));
180             }
181 
182             if (CLIENT_ENABLE_SESSION_TICKET) {
183                 context.setTicketKeys();
184             }
185 
186             keyMaterialProvider = null;
187             return context;
188         } finally {
189             if (keyMaterialProvider != null) {
190                 keyMaterialProvider.destroy();
191             }
192         }
193     }
194 
195     private static void setVerifyCallback(long ctx, OpenSslEngineMap engineMap, X509TrustManager manager) {
196         // Use this to prevent an error when running on java < 7
197         if (useExtendedTrustManager(manager)) {
198             SSLContext.setCertVerifyCallback(ctx,
199                     new ExtendedTrustManagerVerifyCallback(engineMap, (X509ExtendedTrustManager) manager));
200         } else {
201             SSLContext.setCertVerifyCallback(ctx, new TrustManagerVerifyCallback(engineMap, manager));
202         }
203     }
204 
205     static final class OpenSslClientSessionContext extends OpenSslSessionContext {
206         OpenSslClientSessionContext(ReferenceCountedOpenSslContext context, OpenSslKeyMaterialProvider provider) {
207             super(context, provider, SSL.SSL_SESS_CACHE_CLIENT, new OpenSslClientSessionCache(context.engineMap));
208         }
209     }
210 
211     private static final class TrustManagerVerifyCallback extends AbstractCertificateVerifier {
212         private final X509TrustManager manager;
213 
214         TrustManagerVerifyCallback(OpenSslEngineMap engineMap, X509TrustManager manager) {
215             super(engineMap);
216             this.manager = manager;
217         }
218 
219         @Override
220         void verify(ReferenceCountedOpenSslEngine engine, X509Certificate[] peerCerts, String auth)
221                 throws Exception {
222             manager.checkServerTrusted(peerCerts, auth);
223         }
224     }
225 
226     private static final class ExtendedTrustManagerVerifyCallback extends AbstractCertificateVerifier {
227         private final X509ExtendedTrustManager manager;
228 
229         ExtendedTrustManagerVerifyCallback(OpenSslEngineMap engineMap, X509ExtendedTrustManager manager) {
230             super(engineMap);
231             this.manager = manager;
232         }
233 
234         @Override
235         void verify(ReferenceCountedOpenSslEngine engine, X509Certificate[] peerCerts, String auth)
236                 throws Exception {
237             manager.checkServerTrusted(peerCerts, auth, engine);
238         }
239     }
240 
241     private static final class OpenSslClientCertificateCallback implements CertificateCallback {
242         private final OpenSslEngineMap engineMap;
243         private final OpenSslKeyMaterialManager keyManagerHolder;
244 
245         OpenSslClientCertificateCallback(OpenSslEngineMap engineMap, OpenSslKeyMaterialManager keyManagerHolder) {
246             this.engineMap = engineMap;
247             this.keyManagerHolder = keyManagerHolder;
248         }
249 
250         @Override
251         public void handle(long ssl, byte[] keyTypeBytes, byte[][] asn1DerEncodedPrincipals) throws Exception {
252             final ReferenceCountedOpenSslEngine engine = engineMap.get(ssl);
253             // May be null if it was destroyed in the meantime.
254             if (engine == null) {
255                 return;
256             }
257             try {
258                 final Set<String> keyTypesSet = supportedClientKeyTypes(keyTypeBytes);
259                 final String[] keyTypes = keyTypesSet.toArray(EmptyArrays.EMPTY_STRINGS);
260                 final X500Principal[] issuers;
261                 if (asn1DerEncodedPrincipals == null) {
262                     issuers = null;
263                 } else {
264                     issuers = new X500Principal[asn1DerEncodedPrincipals.length];
265                     for (int i = 0; i < asn1DerEncodedPrincipals.length; i++) {
266                         issuers[i] = new X500Principal(asn1DerEncodedPrincipals[i]);
267                     }
268                 }
269                 keyManagerHolder.setKeyMaterialClientSide(engine, keyTypes, issuers);
270             } catch (Throwable cause) {
271                 engine.initHandshakeException(cause);
272                 if (cause instanceof Exception) {
273                     throw (Exception) cause;
274                 }
275                 throw new SSLException(cause);
276             }
277         }
278 
279         /**
280          * Gets the supported key types for client certificates.
281          *
282          * @param clientCertificateTypes {@code ClientCertificateType} values provided by the server.
283          *        See https://www.ietf.org/assignments/tls-parameters/tls-parameters.xml.
284          * @return supported key types that can be used in {@code X509KeyManager.chooseClientAlias} and
285          *         {@code X509ExtendedKeyManager.chooseEngineClientAlias}.
286          */
287         private static Set<String> supportedClientKeyTypes(byte[] clientCertificateTypes) {
288             if (clientCertificateTypes == null) {
289                 // Try all of the supported key types.
290                 return SUPPORTED_KEY_TYPES;
291             }
292             Set<String> result = new HashSet<String>(clientCertificateTypes.length);
293             for (byte keyTypeCode : clientCertificateTypes) {
294                 String keyType = clientKeyType(keyTypeCode);
295                 if (keyType == null) {
296                     // Unsupported client key type -- ignore
297                     continue;
298                 }
299                 result.add(keyType);
300             }
301             return result;
302         }
303 
304         private static String clientKeyType(byte clientCertificateType) {
305             // See also https://www.ietf.org/assignments/tls-parameters/tls-parameters.xml
306             switch (clientCertificateType) {
307                 case CertificateCallback.TLS_CT_RSA_SIGN:
308                     return OpenSslKeyMaterialManager.KEY_TYPE_RSA; // RFC rsa_sign
309                 case CertificateCallback.TLS_CT_RSA_FIXED_DH:
310                     return OpenSslKeyMaterialManager.KEY_TYPE_DH_RSA; // RFC rsa_fixed_dh
311                 case CertificateCallback.TLS_CT_ECDSA_SIGN:
312                     return OpenSslKeyMaterialManager.KEY_TYPE_EC; // RFC ecdsa_sign
313                 case CertificateCallback.TLS_CT_RSA_FIXED_ECDH:
314                     return OpenSslKeyMaterialManager.KEY_TYPE_EC_RSA; // RFC rsa_fixed_ecdh
315                 case CertificateCallback.TLS_CT_ECDSA_FIXED_ECDH:
316                     return OpenSslKeyMaterialManager.KEY_TYPE_EC_EC; // RFC ecdsa_fixed_ecdh
317                 default:
318                     return null;
319             }
320         }
321     }
322 }