Newer
Older
Patrick Dowler
committed
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
/*
************************************************************************
******************* CANADIAN ASTRONOMY DATA CENTRE *******************
************** CENTRE CANADIEN DE DONNÉES ASTRONOMIQUES **************
*
* (c) 2009. (c) 2009.
* Government of Canada Gouvernement du Canada
* National Research Council Conseil national de recherches
* Ottawa, Canada, K1A 0R6 Ottawa, Canada, K1A 0R6
* All rights reserved Tous droits réservés
*
* NRC disclaims any warranties, Le CNRC dénie toute garantie
* expressed, implied, or énoncée, implicite ou légale,
* statutory, of any kind with de quelque nature que ce
* respect to the software, soit, concernant le logiciel,
* including without limitation y compris sans restriction
* any warranty of merchantability toute garantie de valeur
* or fitness for a particular marchande ou de pertinence
* purpose. NRC shall not be pour un usage particulier.
* liable in any event for any Le CNRC ne pourra en aucun cas
* damages, whether direct or être tenu responsable de tout
* indirect, special or general, dommage, direct ou indirect,
* consequential or incidental, particulier ou général,
* arising from the use of the accessoire ou fortuit, résultant
* software. Neither the name de l'utilisation du logiciel. Ni
* of the National Research le nom du Conseil National de
* Council of Canada nor the Recherches du Canada ni les noms
* names of its contributors may de ses participants ne peuvent
* be used to endorse or promote être utilisés pour approuver ou
* products derived from this promouvoir les produits dérivés
* software without specific prior de ce logiciel sans autorisation
* written permission. préalable et particulière
* par écrit.
*
* This file is part of the Ce fichier fait partie du projet
* OpenCADC project. OpenCADC.
*
* OpenCADC is free software: OpenCADC est un logiciel libre ;
* you can redistribute it and/or vous pouvez le redistribuer ou le
* modify it under the terms of modifier suivant les termes de
* the GNU Affero General Public la “GNU Affero General Public
* License as published by the License” telle que publiée
* Free Software Foundation, par la Free Software Foundation
* either version 3 of the : soit la version 3 de cette
* License, or (at your option) licence, soit (à votre gré)
* any later version. toute version ultérieure.
*
* OpenCADC is distributed in the OpenCADC est distribué
* hope that it will be useful, dans l’espoir qu’il vous
* but WITHOUT ANY WARRANTY; sera utile, mais SANS AUCUNE
* without even the implied GARANTIE : sans même la garantie
* warranty of MERCHANTABILITY implicite de COMMERCIALISABILITÉ
* or FITNESS FOR A PARTICULAR ni d’ADÉQUATION À UN OBJECTIF
* PURPOSE. See the GNU Affero PARTICULIER. Consultez la Licence
* General Public License for Générale Publique GNU Affero
* more details. pour plus de détails.
*
* You should have received Vous devriez avoir reçu une
* a copy of the GNU Affero copie de la Licence Générale
* General Public License along Publique GNU Affero avec
* with OpenCADC. If not, see OpenCADC ; si ce n’est
* <http://www.gnu.org/licenses/>. pas le cas, consultez :
* <http://www.gnu.org/licenses/>.
*
* $Revision: 4 $
*
************************************************************************
*/
package ca.nrc.cadc.cred.server;
import java.io.IOException;
import java.io.Writer;
import java.security.AccessControlContext;
import java.security.AccessControlException;
import java.security.AccessController;
import java.security.GeneralSecurityException;
import java.security.InvalidKeyException;
import java.security.KeyPair;
import java.security.KeyPairGenerator;
import java.security.NoSuchAlgorithmException;
import java.security.PrivateKey;
import java.security.Security;
import java.security.cert.X509Certificate;
import java.util.Set;
import javax.security.auth.Subject;
import javax.security.auth.x500.X500Principal;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.bouncycastle.openssl.PEMWriter;
import ca.nrc.cadc.auth.AuthenticationUtil;
import ca.nrc.cadc.auth.X509CertificateChain;
import ca.nrc.cadc.cred.CertUtil;
import org.apache.log4j.Logger;
import org.astrogrid.security.delegation.CertificateSigningRequest;
import org.astrogrid.security.delegation.Delegations;
import org.astrogrid.security.delegation.Util;
/**
* Implementation of the base Delegations that stores certificates in a
* relational database.
*
* @author pdowler
*/
public class DatabaseDelegations extends Delegations
{
private static final Logger log = Logger.getLogger(DatabaseDelegations.class);
private CertificateDAO certificateDAO = null;
private KeyPairGenerator keyPairGenerator;
protected DatabaseDelegations(String dataSourceName, CertificateDAO.CertificateSchema config)
{
// Add the Bouncy Castle JCE provider. This allows the CSR
// classes to work. The BC implementation of PKCS#10 depends on
// the ciphers in the BC provider.
if (Security.getProvider("BC") == null)
{
Security.addProvider(new BouncyCastleProvider());
}
try
{
keyPairGenerator = KeyPairGenerator.getInstance("RSA");
keyPairGenerator.initialize(CertUtil.DEFAULT_KEY_LENGTH);
}
catch (NoSuchAlgorithmException ex)
{
throw new RuntimeException("BUG/CONFIG: cannot load RSA key-pair generator", ex);
}
certificateDAO = new CertificateDAO(config);
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#initializeIdentity(java.lang.String)
*/
@Override
public String initializeIdentity(String identity) throws GeneralSecurityException
{
try
{
String canonizedDn = AuthenticationUtil.canonizeDistinguishedName(identity);
X500Principal p = new X500Principal(canonizedDn);
return initializeIdentity(p);
}
catch(GeneralSecurityException gex)
{
log.debug("initializeIdentity failed", gex);
throw gex;
}
catch(RuntimeException t)
{
log.debug("initializeIdentity failed", t);
throw t;
}
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#initializeIdentity(javax.security.auth.x500.X500Principal)
*/
@Override
public String initializeIdentity(X500Principal principal) throws GeneralSecurityException
{
try
{
String canonizedDn = AuthenticationUtil.canonizeDistinguishedName(principal.getName());
X500Principal p = new X500Principal(canonizedDn);
String hashKey = hash(p);
KeyPair keyPair = this.keyPairGenerator.generateKeyPair();
PrivateKey privateKey = keyPair.getPrivate();
log.debug("creating CertificateSigningRequest: " + canonizedDn + "," + keyPair);
CertificateSigningRequest csr = new CertificateSigningRequest(canonizedDn, keyPair);
X509CertificateChain chain = new X509CertificateChain(p, privateKey, Util.getCsrString(csr));
certificateDAO.put(chain);
return hashKey;
}
catch(GeneralSecurityException gex)
{
log.debug("initializeIdentity failed", gex);
throw gex;
}
catch(RuntimeException t)
{
log.debug("initializeIdentity failed", t);
throw t;
}
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#getCsr(java.lang.String)
*/
@Override
public CertificateSigningRequest getCsr(String hashKey)
{
X509CertificateChain x509CertificateChain = certificateDAO.get(hashKey);
if (x509CertificateChain == null)
{
return null;
}
String csrString = x509CertificateChain.getCsrString();
CertificateSigningRequest csr = Util.getCsrFromString(csrString);
return csr;
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#getPrivateKey(java.lang.String)
*/
@Override
public PrivateKey getPrivateKey(String hashKey)
{
X509CertificateChain x509CertificateChain = certificateDAO.get(hashKey);
if (x509CertificateChain == null)
{
return null;
}
return x509CertificateChain.getPrivateKey();
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#getCertificate(java.lang.String)
*/
@Override
public X509Certificate[] getCertificates(String hashKey)
{
X509CertificateChain x509CertificateChain = certificateDAO.get(hashKey);
if (x509CertificateChain == null)
{
return null;
}
return x509CertificateChain.getChain();
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#remove(java.lang.String)
*/
@Override
public void remove(String hashKey)
{
certificateDAO.delete(hashKey);
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#isKnown(java.lang.String)
*/
@Override
public boolean isKnown(String hashKey)
{
X509CertificateChain chain = certificateDAO.get(hashKey);
return (chain != null);
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#setCertificate(java.lang.String, java.security.cert.X509Certificate)
*/
@Override
public void setCertificates(String hashKey, X509Certificate[] certificates) throws InvalidKeyException
{
X509CertificateChain chain = certificateDAO.get(hashKey);
if (chain != null)
{
chain.setChain(certificates);
certificateDAO.put(chain);
}
else
throw new InvalidKeyException("No identity matches the hash key " + hashKey);
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#getPrincipals()
*/
@Override
public Object[] getPrincipals()
{
// List<String> hashKeyList = certificateDAO.getAllHashKeys();
// return hashKeyList.toArray();
//TODO AD: this is a workaround to send the hash to the caller when it
// does a listing.
AccessControlContext acContext = AccessController.getContext();
Subject subject = Subject.getSubject(acContext);
Set<X500Principal> principals = subject
.getPrincipals(X500Principal.class);
if (principals.size() == 0)
{
throw new AccessControlException(
"Delegation failed because the caller is not authenticated.");
}
else if (principals.size() > 1)
{
throw new AccessControlException(
"Delegation failed because caller autheticated with multiple certificates.");
}
return new String[] { X509CertificateChain.genHashKey(principals
.iterator().next()) };
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#getName(java.lang.String)
*/
@Override
public String getName(String hashKey)
{
X509CertificateChain x509CertificateChain = certificateDAO.get(hashKey);
if (x509CertificateChain == null)
{
return null;
}
String dn = x509CertificateChain.getPrincipal().getName();
return dn;
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#getKeys(java.lang.String)
*/
@Override
public KeyPair getKeys(String hashKey)
{
throw new RuntimeException("getKeys() not implemented in DAO version implementation.");
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#hasCertificate(java.lang.String)
*/
@Override
public boolean hasCertificate(String hashKey)
{
X509CertificateChain chain = certificateDAO.get(hashKey);
return (chain.getChain() != null);
}
/* (non-Javadoc)
* @see org.astrogrid.security.delegation.Delegations#writeCertificate(java.lang.String, java.io.Writer)
*/
@Override
public void writeCertificate(String hashKey, Writer out) throws IOException
{
PEMWriter pem = new PEMWriter(out);
X509Certificate[] certs = getCertificates(hashKey);
if (certs == null)
{
throw new IllegalArgumentException(
"No certificate corresponding to the haskey: " + hashKey);
}
for (X509Certificate cert : certs)
{
pem.writeObject(cert);
}
pem.flush();
pem.close();
}
}