net.lightbody.bmp.proxy.jetty.http.ClientCertAuthenticator Maven / Gradle / Ivy
// ========================================================================
// $Id: ClientCertAuthenticator.java,v 1.15 2006/02/28 12:45:01 gregwilkins Exp $
// Copyright 2002-2004 Mort Bay Consulting Pty. Ltd.
// ------------------------------------------------------------------------
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
// http://www.apache.org/licenses/LICENSE-2.0
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// ========================================================================
package net.lightbody.bmp.proxy.jetty.http;
import net.lightbody.bmp.proxy.jetty.log.LogFactory;
import org.apache.commons.logging.Log;
import javax.net.ssl.SSLSocket;
import java.io.IOException;
import java.security.Principal;
/* ------------------------------------------------------------ */
/** Client Certificate Authenticator.
* This Authenticator uses a client certificate to authenticate the user.
* Each client certificate supplied is tried against the realm using the
* Principal name as the username and a string representation of the
* certificate as the credential.
* @version $Id: ClientCertAuthenticator.java,v 1.15 2006/02/28 12:45:01 gregwilkins Exp $
* @author Greg Wilkins (gregw)
*/
public class ClientCertAuthenticator implements Authenticator
{
private static Log log = LogFactory.getLog(ClientCertAuthenticator.class);
private int _maxHandShakeSeconds =60;
/* ------------------------------------------------------------ */
public ClientCertAuthenticator()
{
log.warn("Client Cert Authentication is EXPERIMENTAL");
}
/* ------------------------------------------------------------ */
public int getMaxHandShakeSeconds()
{
return _maxHandShakeSeconds;
}
/* ------------------------------------------------------------ */
/**
* @param maxHandShakeSeconds Maximum time to wait for SSL handshake if
* Client certification is required.
*/
public void setMaxHandShakeSeconds(int maxHandShakeSeconds)
{
_maxHandShakeSeconds = maxHandShakeSeconds;
}
/* ------------------------------------------------------------ */
/**
* @return UserPrinciple if authenticated or null if not. If
* Authentication fails, then the authenticator may have committed
* the response as an auth challenge or redirect.
* @exception IOException
*/
public Principal authenticate(UserRealm realm,
String pathInContext,
HttpRequest request,
HttpResponse response)
throws IOException
{
java.security.cert.X509Certificate[] certs =
(java.security.cert.X509Certificate[])
request.getAttribute("javax.servlet.request.X509Certificate");
if (response!=null && (certs==null || certs.length==0 || certs[0]==null))
{
// No certs available so lets try and force the issue
// Get the SSLSocket
Object s = HttpConnection.getHttpConnection().getConnection();
if (!(s instanceof SSLSocket))
return null;
SSLSocket socket = (SSLSocket)s;
if (!socket.getNeedClientAuth())
{
// Need to re-handshake
socket.setNeedClientAuth(true);
socket.startHandshake();
// Need to wait here - but not forever. The Handshake
// Listener API does not look like a good option to
// avoid waiting forever. So we will take a slightly
// busy timelimited approach. For now:
for (int i=(_maxHandShakeSeconds*4);i-->0;)
{
certs = (java.security.cert.X509Certificate[])
request.getAttribute("javax.servlet.request.X509Certificate");
if (certs!=null && certs.length>0 && certs[0]!=null)
break;
try{Thread.sleep(250);} catch (Exception e) {break;}
}
}
}
if (certs==null || certs.length==0 || certs[0]==null)
return null;
Principal principal = certs[0].getSubjectDN();
if (principal==null)
principal=certs[0].getIssuerDN();
String username=principal==null?"clientcert":principal.getName();
Principal user = realm.authenticate(username,certs,request);
request.setAuthType(SecurityConstraint.__CERT_AUTH);
if (user!=null)
request.setAuthUser(user.getName());
request.setUserPrincipal(user);
return user;
}
/* ------------------------------------------------------------ */
public String getAuthMethod()
{
return SecurityConstraint.__CERT_AUTH;
}
}
© 2015 - 2025 Weber Informatics LLC | Privacy Policy