1 package org.cacert.gigi.ping;
3 import java.io.IOException;
4 import java.io.InputStream;
5 import java.io.OutputStream;
6 import java.math.BigInteger;
7 import java.net.InetSocketAddress;
8 import java.net.Socket;
9 import java.nio.ByteBuffer;
10 import java.nio.channels.SocketChannel;
11 import java.security.GeneralSecurityException;
12 import java.security.KeyManagementException;
13 import java.security.KeyStore;
14 import java.security.KeyStoreException;
15 import java.security.SecureRandom;
16 import java.util.Arrays;
18 import javax.net.ssl.SNIHostName;
19 import javax.net.ssl.SNIServerName;
20 import javax.net.ssl.SSLContext;
21 import javax.net.ssl.SSLEngine;
22 import javax.net.ssl.SSLEngineResult.HandshakeStatus;
23 import javax.net.ssl.SSLEngineResult.Status;
24 import javax.net.ssl.SSLException;
25 import javax.net.ssl.SSLParameters;
26 import javax.net.ssl.TrustManager;
27 import javax.net.ssl.TrustManagerFactory;
28 import javax.net.ssl.X509TrustManager;
29 import javax.security.cert.CertificateException;
30 import javax.security.cert.X509Certificate;
32 import org.cacert.gigi.dbObjects.CACertificate;
33 import org.cacert.gigi.dbObjects.Certificate;
34 import org.cacert.gigi.dbObjects.CertificateOwner;
35 import org.cacert.gigi.dbObjects.Domain;
37 import sun.security.x509.AVA;
38 import sun.security.x509.X500Name;
40 public class SSLPinger extends DomainPinger {
42 private static final String OID_EKU_serverAuth = "1.3.6.1.5.5.7.3.1";
44 public static final String[] TYPES = new String[] {
45 "xmpp", "server-xmpp", "smtp", "imap"
48 private KeyStore truststore;
50 public SSLPinger(KeyStore truststore) {
51 this.truststore = truststore;
55 public void ping(Domain domain, String configuration, CertificateOwner u, int confId) {
56 try (SocketChannel sch = SocketChannel.open()) {
57 sch.socket().setSoTimeout(5000);
58 String[] parts = configuration.split(":", 4);
59 sch.socket().connect(new InetSocketAddress(domain.getSuffix(), Integer.parseInt(parts[2])), 5000);
60 if (parts.length == 4) {
63 startXMPP(sch, false, domain.getSuffix());
66 startXMPP(sch, true, domain.getSuffix());
77 String key = parts[0];
78 String value = parts[1];
79 String res = test(sch, domain.getSuffix(), u, value);
80 enterPingResult(confId, res, res, null);
82 } catch (IOException e) {
83 enterPingResult(confId, "error", "connection Failed", null);
89 private void startIMAP(SocketChannel sch) throws IOException {
90 Socket s = sch.socket();
91 InputStream is = s.getInputStream();
92 OutputStream os = s.getOutputStream();
94 os.write("ENABLE STARTTLS\r\n".getBytes("UTF-8"));
99 private void startXMPP(SocketChannel sch, boolean server, String domain) throws IOException {
100 Socket s = sch.socket();
101 InputStream is = s.getInputStream();
102 OutputStream os = s.getOutputStream();
103 os.write(("<stream:stream to=\"" + domain + "\" xmlns=\"jabber:" + (server ? "server" : "client") + "\"" + " xmlns:stream=\"http://etherx.jabber.org/streams\" version=\"1.0\">").getBytes("UTF-8"));
105 os.write("<starttls xmlns=\"urn:ietf:params:xml:ns:xmpp-tls\"/>".getBytes("UTF-8"));
107 scanFor(is, "<proceed");
112 private void scanFor(InputStream is, String scanFor) throws IOException {
114 while (pos < scanFor.length()) {
115 if (is.read() == scanFor.charAt(pos)) {
123 private void startSMTP(SocketChannel sch) throws IOException {
124 Socket s = sch.socket();
125 InputStream is = s.getInputStream();
127 s.getOutputStream().write("EHLO ssl.pinger\r\n".getBytes("UTF-8"));
128 s.getOutputStream().flush();
130 s.getOutputStream().write("HELP\r\n".getBytes("UTF-8"));
131 s.getOutputStream().flush();
133 s.getOutputStream().write("STARTTLS\r\n".getBytes("UTF-8"));
134 s.getOutputStream().flush();
138 private void readSMTP(InputStream is) throws IOException {
140 boolean finish = true;
142 char c = (char) is.read();
146 } else if (c == '-') {
149 throw new Error("Invalid smtp: " + c);
163 private String test(SocketChannel sch, String domain, CertificateOwner subject, String tok) {
164 System.out.println("SSL- connecting");
167 sch.socket().setSoTimeout(5000);
168 SSLContext sc = SSLContext.getInstance("SSL");
170 TrustManagerFactory tmf = TrustManagerFactory.getInstance("X509");
171 tmf.init(truststore);
172 sc.init(null, new TrustManager[] {
173 new X509TrustManager() {
176 public java.security.cert.X509Certificate[] getAcceptedIssuers() {
181 public void checkServerTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {
182 java.security.cert.X509Certificate c = chain[0];
183 if (c.getExtendedKeyUsage() == null || !c.getExtendedKeyUsage().contains(OID_EKU_serverAuth)) {
184 throw new java.security.cert.CertificateException("Extended Key Usage for SSL Server Authentication missing");
189 public void checkClientTrusted(java.security.cert.X509Certificate[] chain, String authType) throws java.security.cert.CertificateException {}
191 }, new SecureRandom());
192 } catch (KeyManagementException e) {
194 } catch (KeyStoreException e) {
197 SSLEngine se = sc.createSSLEngine();
198 ByteBuffer enc_in = ByteBuffer.allocate(se.getSession().getPacketBufferSize());
199 ByteBuffer enc_out = ByteBuffer.allocate(se.getSession().getPacketBufferSize());
200 ByteBuffer dec_in = ByteBuffer.allocate(se.getSession().getApplicationBufferSize());
201 ByteBuffer dec_out = ByteBuffer.allocate(se.getSession().getApplicationBufferSize());
202 se.setUseClientMode(true);
203 SSLParameters sp = se.getSSLParameters();
204 sp.setServerNames(Arrays.<SNIServerName>asList(new SNIHostName(domain)));
205 se.setSSLParameters(sp);
208 while (se.getHandshakeStatus() != HandshakeStatus.FINISHED && se.getHandshakeStatus() != HandshakeStatus.NOT_HANDSHAKING) {
209 switch (se.getHandshakeStatus()) {
212 se.wrap(dec_out, enc_out);
214 while (enc_out.remaining() > 0) {
220 if (enc_in.remaining() == 0) {
225 while (se.unwrap(enc_in, dec_in).getStatus() == Status.BUFFER_UNDERFLOW) {
226 enc_in.position(enc_in.limit());
227 enc_in.limit(enc_in.capacity());
235 se.getDelegatedTask().run();
237 case NOT_HANDSHAKING:
243 System.out.println("SSL- connected");
244 X509Certificate[] peerCertificateChain = se.getSession().getPeerCertificateChain();
245 X509Certificate first = peerCertificateChain[0];
246 if (first.getIssuerDN().equals(first.getSubjectDN())) {
247 first.verify(first.getPublicKey());
248 X500Name p = (X500Name) first.getSubjectDN();
249 X500Name n = new X500Name(p.getEncoded());
250 for (AVA i : n.allAvas()) {
251 if (i.getObjectIdentifier().equals((Object) X500Name.orgUnitName_oid)) {
252 String toke = i.getDerValue().getAsString();
253 if (tok.equals(toke)) {
254 return PING_SUCCEDED;
256 return "Self-signed certificate is wrong";
262 BigInteger serial = first.getSerialNumber();
263 Certificate c = Certificate.getBySerial(serial.toString(16));
265 return "Certificate not found: Serial " + serial.toString(16) + " missing.";
267 CACertificate p = c.getParent();
268 if ( !first.getIssuerDN().equals(p.getCertificate().getSubjectDN())) {
269 return "Broken certificate supplied";
271 first.verify(p.getCertificate().getPublicKey());
272 if (c.getOwner().getId() != subject.getId()) {
273 return "Owner mismatch";
275 return PING_SUCCEDED;
276 } catch (GeneralSecurityException e) {
277 // e.printStackTrace();
278 return "Security failed";
279 } catch (SSLException e) {
280 // e.printStackTrace(); TODO log for user debugging?
281 return "Security failed";
282 } catch (IOException e) {
283 // e.printStackTrace(); TODO log for user debugging?
284 return "Connection closed";
285 } catch (CertificateException e) {
286 // e.printStackTrace();
287 return "Security failed";