From d0470c5987aaecbc444c7100319df69b6f740680 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Felix=20D=C3=B6rre?= Date: Mon, 22 Aug 2016 11:23:02 +0200 Subject: [PATCH] add: defense-in-depth mechanism to prevent unauthorized adding of groups enforce that users must not add anyone to support-managed groups Change-Id: I284842efba231ed7733837226626d80877e10cd7 --- src/org/cacert/gigi/dbObjects/Group.java | 39 ++++++++++++------- .../cacert/gigi/dbObjects/SupportedUser.java | 2 +- src/org/cacert/gigi/dbObjects/User.java | 17 ++++++-- src/org/cacert/gigi/output/GroupSelector.java | 14 ++++--- tests/org/cacert/gigi/TestOrga.java | 8 ++-- .../cacert/gigi/TestUserGroupMembership.java | 23 +++++------ tests/org/cacert/gigi/api/IssueCert.java | 4 +- tests/org/cacert/gigi/api/TestFindAgent.java | 10 ++--- .../pages/account/TestCertificateRequest.java | 6 +-- .../admin/TestSEAdminNotificationMail.java | 6 ++- .../pages/admin/TestSEAdminPageDetails.java | 5 ++- .../TestSEAdminPageUserDomainSearch.java | 3 +- .../admin/TestSEAdminPageUserMailSearch.java | 5 ++- .../pages/admin/TestSEAdminTicketSetting.java | 6 ++- .../cacert/gigi/pages/orga/TestOrgDomain.java | 2 +- .../gigi/pages/orga/TestOrgManagement.java | 2 +- tests/org/cacert/gigi/pages/wot/TestTTP.java | 2 +- .../cacert/gigi/pages/wot/TestTTPAdmin.java | 11 +++--- .../cacert/gigi/testUtils/BusinessTest.java | 19 +++++++++ .../cacert/gigi/testUtils/ManagedTest.java | 26 ++++++++++--- tests/org/cacert/gigi/testUtils/OrgTest.java | 4 +- .../gigi/testUtils/RestrictedApiTest.java | 2 +- .../org/cacert/gigi/pages/Manager.java | 30 +++++++++++++- 23 files changed, 170 insertions(+), 76 deletions(-) diff --git a/src/org/cacert/gigi/dbObjects/Group.java b/src/org/cacert/gigi/dbObjects/Group.java index 13080efb..287187a2 100644 --- a/src/org/cacert/gigi/dbObjects/Group.java +++ b/src/org/cacert/gigi/dbObjects/Group.java @@ -6,18 +6,18 @@ import org.cacert.gigi.output.template.Outputable; import org.cacert.gigi.output.template.TranslateCommand; public enum Group { - SUPPORTER("supporter", "supporter", true, true), // - ARBITRATOR("arbitrator", "arbitrator", true, true), // - BLOCKEDASSURER("blockedassurer", "may not verify", true, false), // - BLOCKEDASSUREE("blockedassuree", "may not be verified", true, false), // - BLOCKEDLOGIN("blockedlogin", "may not login", true, false), // - BLOCKEDCERT("blockedcert", "may not issue certificates", true, false), // - TTP_ASSURER("ttp-assurer", "may verify via TTP", true, true), // - TTP_APPLICANT("ttp-applicant", "requests to be verified via ttp", true, false), // - CODESIGNING("codesigning", "may issue codesigning certificates", true, false), // - ORGASSURER("orgassurer", "may verify organisations", true, true), // - NUCLEUS_ASSURER("nucleus-assurer", "may enter nucleus verifications", true, true), // - LOCATE_AGENT("locate-agent", "wants access to the locate agent system", false, false); + SUPPORTER("supporter", "supporter", true, false, true), // + ARBITRATOR("arbitrator", "arbitrator", true, false, true), // + BLOCKEDASSURER("blockedassurer", "may not verify", true, false, false), // + BLOCKEDASSUREE("blockedassuree", "may not be verified", true, false, false), // + BLOCKEDLOGIN("blockedlogin", "may not login", true, false, false), // + BLOCKEDCERT("blockedcert", "may not issue certificates", true, false, false), // + TTP_ASSURER("ttp-assurer", "may verify via TTP", true, false, true), // + TTP_APPLICANT("ttp-applicant", "requests to be verified via ttp", false, true, false), // + CODESIGNING("codesigning", "may issue codesigning certificates", true, false, false), // + ORGASSURER("orgassurer", "may verify organisations", true, false, true), // + NUCLEUS_ASSURER("nucleus-assurer", "may enter nucleus verifications", true, false, true), // + LOCATE_AGENT("locate-agent", "wants access to the locate agent system", false, true, false); private final String dbName; @@ -25,6 +25,8 @@ public enum Group { private final boolean managedBySupport; + private final boolean managedByUser; + private final boolean isSelfViewable; /** @@ -40,9 +42,16 @@ public enum Group { * @param isSelfViewable * true iff user should be able to see others in the same group */ - private Group(String name, String display, boolean managedBySupport, boolean isSelfViewable) { + private Group(String name, String display, boolean managedBySupport, boolean managedByUser, boolean isSelfViewable) { dbName = name; tc = new TranslateCommand(display); + if (managedByUser && managedBySupport) { + throw new IllegalArgumentException("We do not allow groups to be user and support managable."); + } + if (managedByUser && isSelfViewable) { + throw new IllegalArgumentException("We do not allow groups to be self-viewable and managable by user."); + } + this.managedByUser = managedByUser; this.managedBySupport = managedBySupport; this.isSelfViewable = isSelfViewable; } @@ -55,6 +64,10 @@ public enum Group { return managedBySupport; } + public boolean isManagedByUser() { + return managedByUser; + } + public boolean isSelfViewable() { return isSelfViewable; } diff --git a/src/org/cacert/gigi/dbObjects/SupportedUser.java b/src/org/cacert/gigi/dbObjects/SupportedUser.java index a663215a..a4a3ba12 100644 --- a/src/org/cacert/gigi/dbObjects/SupportedUser.java +++ b/src/org/cacert/gigi/dbObjects/SupportedUser.java @@ -85,7 +85,7 @@ public class SupportedUser { return target; } - public void grant(Group toMod) { + public void grant(Group toMod) throws GigiApiException { target.grantGroup(supporter, toMod); } diff --git a/src/org/cacert/gigi/dbObjects/User.java b/src/org/cacert/gigi/dbObjects/User.java index 3c9b972d..69b76ad2 100644 --- a/src/org/cacert/gigi/dbObjects/User.java +++ b/src/org/cacert/gigi/dbObjects/User.java @@ -45,7 +45,7 @@ public class User extends CertificateOwner { private Locale locale; - private final Set groups = new HashSet<>(); + private Set groups = new HashSet<>(); public static final int MINIMUM_AGE = 16; @@ -93,15 +93,21 @@ public class User extends CertificateOwner { locale = Language.getLocaleFromString(localeStr); } + refreshGroups(); + } + + public synchronized void refreshGroups() { + HashSet hs = new HashSet<>(); try (GigiPreparedStatement psg = new GigiPreparedStatement("SELECT `permission` FROM `user_groups` WHERE `user`=? AND `deleted` is NULL")) { - psg.setInt(1, rs.getInt("id")); + psg.setInt(1, getId()); try (GigiResultSet rs2 = psg.executeQuery()) { while (rs2.next()) { - groups.add(Group.getByString(rs2.getString(1))); + hs.add(Group.getByString(rs2.getString(1))); } } } + groups = hs; } public User(String email, String password, DayDate dob, Locale locale, Country residenceCountry, NamePart... preferred) throws GigiApiException { @@ -438,7 +444,10 @@ public class User extends CertificateOwner { return Collections.unmodifiableSet(groups); } - public void grantGroup(User granter, Group toGrant) { + public void grantGroup(User granter, Group toGrant) throws GigiApiException { + if (toGrant.isManagedBySupport() && !granter.isInGroup(Group.SUPPORTER)) { + throw new GigiApiException("Group may only be managed by supporter"); + } groups.add(toGrant); try (GigiPreparedStatement ps = new GigiPreparedStatement("INSERT INTO `user_groups` SET `user`=?, `permission`=?::`userGroup`, `grantedby`=?")) { ps.setInt(1, getId()); diff --git a/src/org/cacert/gigi/output/GroupSelector.java b/src/org/cacert/gigi/output/GroupSelector.java index a12a5cd4..850e1d5a 100644 --- a/src/org/cacert/gigi/output/GroupSelector.java +++ b/src/org/cacert/gigi/output/GroupSelector.java @@ -17,18 +17,18 @@ public class GroupSelector implements Outputable { private Group value = null; - private final boolean supportFlag; + private final boolean bySupporter; - public GroupSelector(String name, boolean supportFlag) { + public GroupSelector(String name, boolean bySupporter) { this.name = HTMLEncoder.encodeHTML(name); - this.supportFlag = supportFlag; + this.bySupporter = bySupporter; } public void update(HttpServletRequest r) throws GigiApiException { String vS = r.getParameter(name); value = null; for (Group g : Group.values()) { - if (g.getDatabaseName().equals(vS) && g.isManagedBySupport() == supportFlag) { + if (g.getDatabaseName().equals(vS) && mayManage(g)) { value = g; } } @@ -38,7 +38,7 @@ public class GroupSelector implements Outputable { public void output(PrintWriter out, Language l, Map vars) { out.println("