All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.unboundid.util.ssl.HostNameTrustManager Maven / Gradle / Ivy

Go to download

The UnboundID LDAP SDK for Java is a fast, comprehensive, and easy-to-use Java API for communicating with LDAP directory servers and performing related tasks like reading and writing LDIF, encoding and decoding data using base64 and ASN.1 BER, and performing secure communication. This package contains the Standard Edition of the LDAP SDK, which is a complete, general-purpose library for communicating with LDAPv3 directory servers.

There is a newer version: 7.0.1
Show newest version
/*
 * Copyright 2012-2023 Ping Identity Corporation
 * All Rights Reserved.
 */
/*
 * Copyright 2012-2023 Ping Identity Corporation
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
/*
 * Copyright (C) 2012-2023 Ping Identity Corporation
 *
 * This program is free software; you can redistribute it and/or modify
 * it under the terms of the GNU General Public License (GPLv2 only)
 * or the terms of the GNU Lesser General Public License (LGPLv2.1 only)
 * as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful,
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 * GNU General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, see .
 */
package com.unboundid.util.ssl;



import java.security.cert.CertificateException;
import java.security.cert.X509Certificate;
import java.util.Collection;
import java.util.Collections;
import java.util.LinkedHashSet;
import java.util.Set;
import javax.net.ssl.X509TrustManager;

import com.unboundid.util.NotMutable;
import com.unboundid.util.NotNull;
import com.unboundid.util.StaticUtils;
import com.unboundid.util.ThreadSafety;
import com.unboundid.util.ThreadSafetyLevel;
import com.unboundid.util.Validator;

import static com.unboundid.util.ssl.SSLMessages.*;



/**
 * This class provides an SSL trust manager that will only accept certificates
 * whose hostname (as contained in the CN subject attribute or a subjectAltName
 * extension) matches an expected value.  Only the dNSName, iPAddress, and
 * uniformResourceIdentifier subjectAltName formats are supported.
 * 

* This implementation optionally supports wildcard certificates, which have a * hostname that starts with an asterisk followed by a period and domain or * subdomain. For example, "*.example.com" could be considered a match for * anything in the "example.com" domain. If wildcards are allowed, then only * the CN subject attribute and dNSName subjectAltName extension will be * examined, and only the leftmost element of a hostname may be a wildcard * character. *

* Note that no other elements of the certificate are examined, so it is * strongly recommended that this trust manager be used in an * {@link AggregateTrustManager} in conjunction with other trust managers that * perform other forms of validation. */ @NotMutable() @ThreadSafety(level=ThreadSafetyLevel.COMPLETELY_THREADSAFE) public final class HostNameTrustManager implements X509TrustManager { /** * A pre-allocated empty certificate array. */ @NotNull private static final X509Certificate[] NO_CERTIFICATES = new X509Certificate[0]; // Indicates whether to allow wildcard certificates (which private final boolean allowWildcards; // Indicates whether to check the CN attribute in the peer certificate's // subject DN if the certificate also contains a subject alternative name // extension that contains at least dNSName, uniformResourceIdentifier, or // iPAddress value. private final boolean checkCNWhenSubjectAltNameIsPresent; // The set of hostname values that will be considered acceptable. @NotNull private final Set acceptableHostNames; /** * Creates a new hostname trust manager with the provided information. * * @param allowWildcards Indicates whether to allow wildcard * certificates which contain an asterisk as the * first component of a CN subject attribute or * dNSName subjectAltName extension. * @param acceptableHostNames The set of hostnames and/or IP addresses that * will be considered acceptable. Only * certificates with a CN or subjectAltName value * that exactly matches one of these names * (ignoring differences in capitalization) will * be considered acceptable. It must not be * {@code null} or empty. */ public HostNameTrustManager(final boolean allowWildcards, @NotNull final String... acceptableHostNames) { this(allowWildcards, StaticUtils.toList(acceptableHostNames)); } /** * Creates a new hostname trust manager with the provided information. * * @param allowWildcards Indicates whether to allow wildcard * certificates which contain an asterisk as the * first component of a CN subject attribute or * dNSName subjectAltName extension. * @param acceptableHostNames The set of hostnames and/or IP addresses that * will be considered acceptable. Only * certificates with a CN or subjectAltName value * that exactly matches one of these names * (ignoring differences in capitalization) will * be considered acceptable. It must not be * {@code null} or empty. */ public HostNameTrustManager(final boolean allowWildcards, @NotNull final Collection acceptableHostNames) { this(allowWildcards, HostNameSSLSocketVerifier. DEFAULT_CHECK_CN_WHEN_SUBJECT_ALT_NAME_IS_PRESENT, acceptableHostNames); } /** * Creates a new hostname trust manager with the provided information. * * @param allowWildcards * Indicates whether to allow wildcard certificates that contain * an asterisk in the leftmost component of a hostname in the * dNSName or uniformResourceIdentifier of the subject * alternative name extension, or in the CN attribute of the * subject DN. * @param checkCNWhenSubjectAltNameIsPresent * Indicates whether to check the CN attribute in the peer * certificate's subject DN if the certificate also contains a * subject alternative name extension that contains at least one * dNSName, uniformResourceIdentifier, or iPAddress value. * Although RFC 6125 section 6.4.4 indicates that the CN * attribute should not be checked in certificates that have an * appropriate subject alternative name extension, LDAP clients * historically treat both sources as equally valid. * @param acceptableHostNames * The set of hostnames and/or IP addresses that will be * considered acceptable. Only certificates with a CN or * subjectAltName value that exactly matches one of these names * (ignoring differences in capitalization) will be considered * acceptable. It must not be {@code null} or empty. */ public HostNameTrustManager(final boolean allowWildcards, final boolean checkCNWhenSubjectAltNameIsPresent, @NotNull final Collection acceptableHostNames) { Validator.ensureNotNull(acceptableHostNames); Validator.ensureFalse(acceptableHostNames.isEmpty(), "The set of acceptable host names must not be empty."); this.allowWildcards = allowWildcards; this.checkCNWhenSubjectAltNameIsPresent = checkCNWhenSubjectAltNameIsPresent; final LinkedHashSet nameSet = new LinkedHashSet<>( StaticUtils.computeMapCapacity(acceptableHostNames.size())); for (final String s : acceptableHostNames) { nameSet.add(StaticUtils.toLowerCase(s)); } this.acceptableHostNames = Collections.unmodifiableSet(nameSet); } /** * Indicates whether wildcard certificates should be allowed, which may * match multiple hosts in a given domain or subdomain. * * @return {@code true} if wildcard certificates should be allowed, or * {@code false} if not. */ public boolean allowWildcards() { return allowWildcards; } /** * Retrieves the set of hostnames that will be considered acceptable. * * @return The set of hostnames that will be considered acceptable. */ @NotNull() public Set getAcceptableHostNames() { return acceptableHostNames; } /** * Checks to determine whether the provided client certificate chain should be * trusted. * * @param chain The client certificate chain for which to make the * determination. * @param authType The authentication type based on the client certificate. * * @throws CertificateException If the provided client certificate chain * should not be trusted. */ @Override() public void checkClientTrusted(@NotNull final X509Certificate[] chain, @NotNull final String authType) throws CertificateException { final StringBuilder buffer = new StringBuilder(); for (final String s : acceptableHostNames) { buffer.setLength(0); if (HostNameSSLSocketVerifier.certificateIncludesHostname(s, chain[0], allowWildcards, checkCNWhenSubjectAltNameIsPresent, buffer)) { return; } } throw new CertificateException( ERR_HOSTNAME_NOT_FOUND.get(buffer.toString())); } /** * Checks to determine whether the provided server certificate chain should be * trusted. * * @param chain The server certificate chain for which to make the * determination. * @param authType The key exchange algorithm used. * * @throws CertificateException If the provided server certificate chain * should not be trusted. */ @Override() public void checkServerTrusted(@NotNull final X509Certificate[] chain, @NotNull final String authType) throws CertificateException { final StringBuilder buffer = new StringBuilder(); for (final String s : acceptableHostNames) { buffer.setLength(0); if (HostNameSSLSocketVerifier.certificateIncludesHostname(s, chain[0], allowWildcards, checkCNWhenSubjectAltNameIsPresent, buffer)) { return; } } throw new CertificateException( ERR_HOSTNAME_NOT_FOUND.get(buffer.toString())); } /** * Retrieves the accepted issuer certificates for this trust manager. This * will always return an empty array. * * @return The accepted issuer certificates for this trust manager. */ @Override() @NotNull() public X509Certificate[] getAcceptedIssuers() { return NO_CERTIFICATES; } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy