io.undertow.servlet.handlers.security.SSLInformationAssociationHandler Maven / Gradle / Ivy
/*
* JBoss, Home of Professional Open Source.
* Copyright 2014 Red Hat, Inc., and individual contributors
* as indicated by the @author tags.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package io.undertow.servlet.handlers.security;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
import io.undertow.server.HttpHandler;
import io.undertow.server.HttpServerExchange;
import io.undertow.server.SSLSessionInfo;
import io.undertow.servlet.handlers.ServletRequestContext;
import io.undertow.util.HexConverter;
import jakarta.servlet.ServletRequest;
/**
* Handler that associates SSL metadata with request
*
* cipher suite - jakarta.servlet.request.cipher_suite String
* bit size of the algorithm - jakarta.servlet.request.key_size Integer
* SSL session id - jakarta.servlet.request.ssl_session_id String
*
* @author Tomaz Cerar (c) 2013 Red Hat Inc.
*/
public class SSLInformationAssociationHandler implements HttpHandler {
private final HttpHandler next;
public SSLInformationAssociationHandler(final HttpHandler next) {
this.next = next;
}
/**
* Given the name of a TLS/SSL cipher suite, return an int representing it effective stream
* cipher key strength. i.e. How much entropy material is in the key material being fed into the
* encryption routines.
*
* http://www.thesprawl.org/research/tls-and-ssl-cipher-suites/
*
*
* @param cipherSuite String name of the TLS cipher suite.
* @return int indicating the effective key entropy bit-length.
*/
public static int getKeyLength(String cipherSuite) {
return SSLSessionInfo.calculateKeySize(cipherSuite);
}
/* ------------------------------------------------------------ */
/**
* Return the chain of X509 certificates used to negotiate the SSL Session.
*
* @param session the javax.net.ssl.SSLSession to use as the source of the cert chain.
* @return the chain of java.security.cert.X509Certificates used to
* negotiate the SSL connection.
* Will be null if the chain is missing or empty.
*/
private X509Certificate[] getCerts(SSLSessionInfo session) {
try {
Certificate[] javaCerts = session.getPeerCertificates();
if (javaCerts == null) {
return null;
}
int x509Certs = 0;
for (Certificate javaCert : javaCerts) {
if (javaCert instanceof X509Certificate) {
++x509Certs;
}
}
if (x509Certs == 0) {
return null;
}
int resultIndex = 0;
X509Certificate[] results = new X509Certificate[x509Certs];
for (Certificate certificate : javaCerts) {
if (certificate instanceof X509Certificate) {
results[resultIndex++] = (X509Certificate) certificate;
}
}
return results;
} catch (Exception e) {
return null;
}
}
@Override
public void handleRequest(HttpServerExchange exchange) throws Exception {
ServletRequest request = exchange.getAttachment(ServletRequestContext.ATTACHMENT_KEY).getServletRequest();
SSLSessionInfo ssl = exchange.getConnection().getSslSessionInfo();
if (ssl != null) {
String cipherSuite = ssl.getCipherSuite();
byte[] sessionId = ssl.getSessionId();
request.setAttribute("jakarta.servlet.request.cipher_suite", cipherSuite);
request.setAttribute("jakarta.servlet.request.key_size", ssl.getKeySize());
request.setAttribute("jakarta.servlet.request.ssl_session_id", sessionId != null? HexConverter.convertToHexString(sessionId) : null);
X509Certificate[] certs = getCerts(ssl);
if (certs != null) {
request.setAttribute("jakarta.servlet.request.X509Certificate", certs);
}
}
next.handleRequest(exchange);
}
}