1 package org.cacert.gigi.ping;
3 import java.io.IOException;
4 import java.io.InputStream;
5 import java.io.OutputStream;
6 import java.math.BigInteger;
7 import java.net.InetSocketAddress;
8 import java.net.Socket;
9 import java.nio.ByteBuffer;
10 import java.nio.channels.SocketChannel;
11 import java.security.GeneralSecurityException;
12 import java.security.KeyManagementException;
13 import java.security.KeyStore;
14 import java.security.KeyStoreException;
15 import java.security.SecureRandom;
16 import java.util.Arrays;
18 import javax.net.ssl.SNIHostName;
19 import javax.net.ssl.SNIServerName;
20 import javax.net.ssl.SSLContext;
21 import javax.net.ssl.SSLEngine;
22 import javax.net.ssl.SSLEngineResult.HandshakeStatus;
23 import javax.net.ssl.SSLEngineResult.Status;
24 import javax.net.ssl.SSLException;
25 import javax.net.ssl.SSLParameters;
26 import javax.net.ssl.TrustManager;
27 import javax.net.ssl.TrustManagerFactory;
28 import javax.net.ssl.X509TrustManager;
29 import javax.security.cert.CertificateException;
30 import javax.security.cert.X509Certificate;
32 import org.cacert.gigi.dbObjects.CACertificate;
33 import org.cacert.gigi.dbObjects.Certificate;
34 import org.cacert.gigi.dbObjects.CertificateOwner;
35 import org.cacert.gigi.dbObjects.Domain;
37 import sun.security.x509.AVA;
38 import sun.security.x509.X500Name;
40 public class SSLPinger extends DomainPinger {
42 public static final String[] TYPES = new String[] {
43 "xmpp", "server-xmpp", "smtp", "imap"
46 private KeyStore truststore;
48 public SSLPinger(KeyStore truststore) {
49 this.truststore = truststore;
53 public void ping(Domain domain, String configuration, CertificateOwner u, int confId) {
54 try (SocketChannel sch = SocketChannel.open()) {
55 sch.socket().setSoTimeout(5000);
56 String[] parts = configuration.split(":", 4);
57 sch.socket().connect(new InetSocketAddress(domain.getSuffix(), Integer.parseInt(parts[2])), 5000);
58 if (parts.length == 4) {
61 startXMPP(sch, false, domain.getSuffix());
64 startXMPP(sch, true, domain.getSuffix());
75 String key = parts[0];
76 String value = parts[1];
77 String res = test(sch, domain.getSuffix(), u, value);
78 enterPingResult(confId, res, res, null);
80 } catch (IOException e) {
81 enterPingResult(confId, "error", "connection Failed", null);
87 private void startIMAP(SocketChannel sch) throws IOException {
88 Socket s = sch.socket();
89 InputStream is = s.getInputStream();
90 OutputStream os = s.getOutputStream();
92 os.write("ENABLE STARTTLS\r\n".getBytes("UTF-8"));
97 private void startXMPP(SocketChannel sch, boolean server, String domain) throws IOException {
98 Socket s = sch.socket();
99 InputStream is = s.getInputStream();
100 OutputStream os = s.getOutputStream();
101 os.write(("<stream:stream to=\"" + domain + "\" xmlns=\"jabber:" + (server ? "server" : "client") + "\"" + " xmlns:stream=\"http://etherx.jabber.org/streams\" version=\"1.0\">").getBytes("UTF-8"));
103 os.write("<starttls xmlns=\"urn:ietf:params:xml:ns:xmpp-tls\"/>".getBytes("UTF-8"));
105 scanFor(is, "<proceed");
110 private void scanFor(InputStream is, String scanFor) throws IOException {
112 while (pos < scanFor.length()) {
113 if (is.read() == scanFor.charAt(pos)) {
121 private void startSMTP(SocketChannel sch) throws IOException {
122 Socket s = sch.socket();
123 InputStream is = s.getInputStream();
125 s.getOutputStream().write("EHLO ssl.pinger\r\n".getBytes("UTF-8"));
126 s.getOutputStream().flush();
128 s.getOutputStream().write("HELP\r\n".getBytes("UTF-8"));
129 s.getOutputStream().flush();
131 s.getOutputStream().write("STARTTLS\r\n".getBytes("UTF-8"));
132 s.getOutputStream().flush();
136 private void readSMTP(InputStream is) throws IOException {
138 boolean finish = true;
140 char c = (char) is.read();
144 } else if (c == '-') {
147 throw new Error("Invalid smtp: " + c);
161 private String test(SocketChannel sch, String domain, CertificateOwner subject, String tok) {
162 System.out.println("SSL- connecting");
165 sch.socket().setSoTimeout(5000);
166 SSLContext sc = SSLContext.getInstance("SSL");
168 TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509");
169 tmf.init(truststore);
170 sc.init(null, new TrustManager[] {
171 new X509TrustManager() {
174 public java.security.cert.X509Certificate[] getAcceptedIssuers() {
179 public void checkServerTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {
180 java.security.cert.X509Certificate c = chain[0];
181 if ( !c.getExtendedKeyUsage().contains("1.3.6.1.5.5.7.3.1")) {
182 throw new java.security.cert.CertificateException("Illegal EKU");
187 public void checkClientTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {}
189 }, new SecureRandom());
190 } catch (KeyManagementException e) {
192 } catch (KeyStoreException e) {
195 SSLEngine se = sc.createSSLEngine();
196 ByteBuffer enc_in = ByteBuffer.allocate(se.getSession().getPacketBufferSize());
197 ByteBuffer enc_out = ByteBuffer.allocate(se.getSession().getPacketBufferSize());
198 ByteBuffer dec_in = ByteBuffer.allocate(se.getSession().getApplicationBufferSize());
199 ByteBuffer dec_out = ByteBuffer.allocate(se.getSession().getApplicationBufferSize());
200 se.setUseClientMode(true);
201 SSLParameters sp = se.getSSLParameters();
202 sp.setServerNames(Arrays.<SNIServerName>asList(new SNIHostName(domain)));
203 se.setSSLParameters(sp);
206 while (se.getHandshakeStatus() != HandshakeStatus.FINISHED && se.getHandshakeStatus() != HandshakeStatus.NOT_HANDSHAKING) {
207 switch (se.getHandshakeStatus()) {
210 se.wrap(dec_out, enc_out);
212 while (enc_out.remaining() > 0) {
218 if (enc_in.remaining() == 0) {
223 while (se.unwrap(enc_in, dec_in).getStatus() == Status.BUFFER_UNDERFLOW) {
224 enc_in.position(enc_in.limit());
225 enc_in.limit(enc_in.capacity());
233 se.getDelegatedTask().run();
235 case NOT_HANDSHAKING:
241 System.out.println("SSL- connected");
242 X509Certificate[] peerCertificateChain = se.getSession().getPeerCertificateChain();
243 X509Certificate first = peerCertificateChain[0];
244 if (first.getIssuerDN().equals(first.getSubjectDN())) {
245 first.verify(first.getPublicKey());
246 X500Name p = (X500Name) first.getSubjectDN();
247 X500Name n = new X500Name(p.getEncoded());
248 for (AVA i : n.allAvas()) {
249 if (i.getObjectIdentifier().equals((Object) X500Name.orgUnitName_oid)) {
250 String toke = i.getDerValue().getAsString();
251 if (tok.equals(toke)) {
252 return PING_SUCCEDED;
254 return "Self-signed certificate is wrong";
260 BigInteger serial = first.getSerialNumber();
261 Certificate c = Certificate.getBySerial(serial.toString(16));
263 return "Certificate not found: Serial " + serial.toString(16) + " missing.";
265 CACertificate p = c.getParent();
266 if ( !first.getIssuerDN().equals(p.getCertificate().getSubjectDN())) {
267 return "Broken certificate supplied";
269 first.verify(p.getCertificate().getPublicKey());
270 if (c.getOwner().getId() != subject.getId()) {
271 return "Owner mismatch";
273 return PING_SUCCEDED;
274 } catch (GeneralSecurityException e) {
275 // e.printStackTrace();
276 return "Security failed";
277 } catch (SSLException e) {
278 // e.printStackTrace(); TODO log for user debugging?
279 return "Security failed";
280 } catch (IOException e) {
281 // e.printStackTrace(); TODO log for user debugging?
282 return "Connection closed";
283 } catch (CertificateException e) {
284 // e.printStackTrace();
285 return "Security failed";