All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.kafka.common.security.ssl.SslFactory Maven / Gradle / Ivy

There is a newer version: 3.7.0
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one or more
 * contributor license agreements. See the NOTICE file distributed with
 * this work for additional information regarding copyright ownership.
 * The ASF licenses this file to You under the Apache License, Version 2.0
 * (the "License"); you may not use this file except in compliance with
 * the License. You may obtain a copy of the License at
 *
 *    http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.apache.kafka.common.security.ssl;

import org.apache.kafka.common.KafkaException;
import org.apache.kafka.common.Reconfigurable;
import org.apache.kafka.common.config.ConfigException;
import org.apache.kafka.common.config.SslConfigs;
import org.apache.kafka.common.config.internals.BrokerSecurityConfigs;
import org.apache.kafka.common.network.Mode;
import org.apache.kafka.common.security.auth.SslEngineFactory;
import org.apache.kafka.common.utils.Utils;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import javax.net.ssl.SSLEngine;
import javax.net.ssl.SSLEngineResult;
import javax.net.ssl.SSLException;
import java.io.Closeable;
import java.net.InetSocketAddress;
import java.net.Socket;
import java.nio.ByteBuffer;
import java.security.cert.Certificate;
import java.security.cert.X509Certificate;
import java.security.GeneralSecurityException;
import java.security.KeyStore;
import java.security.Principal;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
import java.util.Enumeration;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Objects;
import java.util.Set;
import java.util.HashSet;

public class SslFactory implements Reconfigurable, Closeable {
    private static final Logger log = LoggerFactory.getLogger(SslFactory.class);

    private final Mode mode;
    private final String clientAuthConfigOverride;
    private final boolean keystoreVerifiableUsingTruststore;
    private String endpointIdentification;
    private SslEngineFactory sslEngineFactory;
    private Map sslEngineFactoryConfig;

    public SslFactory(Mode mode) {
        this(mode, null, false);
    }

    /**
     * Create an SslFactory.
     *
     * @param mode                                  Whether to use client or server mode.
     * @param clientAuthConfigOverride              The value to override ssl.client.auth with, or null
     *                                              if we don't want to override it.
     * @param keystoreVerifiableUsingTruststore     True if we should require the keystore to be verifiable
     *                                              using the truststore.
     */
    public SslFactory(Mode mode,
                      String clientAuthConfigOverride,
                      boolean keystoreVerifiableUsingTruststore) {
        this.mode = mode;
        this.clientAuthConfigOverride = clientAuthConfigOverride;
        this.keystoreVerifiableUsingTruststore = keystoreVerifiableUsingTruststore;
    }

    @SuppressWarnings("unchecked")
    @Override
    public void configure(Map configs) throws KafkaException {
        if (sslEngineFactory != null) {
            throw new IllegalStateException("SslFactory was already configured.");
        }
        this.endpointIdentification = (String) configs.get(SslConfigs.SSL_ENDPOINT_IDENTIFICATION_ALGORITHM_CONFIG);

        // The input map must be a mutable RecordingMap in production.
        Map nextConfigs = (Map) configs;
        if (clientAuthConfigOverride != null) {
            nextConfigs.put(BrokerSecurityConfigs.SSL_CLIENT_AUTH_CONFIG, clientAuthConfigOverride);
        }
        SslEngineFactory builder = instantiateSslEngineFactory(nextConfigs);
        if (keystoreVerifiableUsingTruststore) {
            try {
                SslEngineValidator.validate(builder, builder);
            } catch (Exception e) {
                throw new ConfigException("A client SSLEngine created with the provided settings " +
                        "can't connect to a server SSLEngine created with those settings.", e);
            }
        }
        this.sslEngineFactory = builder;
    }

    @Override
    public Set reconfigurableConfigs() {
        return sslEngineFactory.reconfigurableConfigs();
    }

    @Override
    public void validateReconfiguration(Map newConfigs) {
        createNewSslEngineFactory(newConfigs);
    }

    @Override
    public void reconfigure(Map newConfigs) throws KafkaException {
        SslEngineFactory newSslEngineFactory = createNewSslEngineFactory(newConfigs);
        if (newSslEngineFactory != this.sslEngineFactory) {
            Utils.closeQuietly(this.sslEngineFactory, "close stale ssl engine factory");
            this.sslEngineFactory = newSslEngineFactory;
            log.info("Created new {} SSL engine builder with keystore {} truststore {}", mode,
                    newSslEngineFactory.keystore(), newSslEngineFactory.truststore());
        }
    }

    private SslEngineFactory instantiateSslEngineFactory(Map configs) {
        @SuppressWarnings("unchecked")
        Class sslEngineFactoryClass =
                (Class) configs.get(SslConfigs.SSL_ENGINE_FACTORY_CLASS_CONFIG);
        SslEngineFactory sslEngineFactory;
        if (sslEngineFactoryClass == null) {
            sslEngineFactory = new DefaultSslEngineFactory();
        } else {
            sslEngineFactory = Utils.newInstance(sslEngineFactoryClass);
        }
        sslEngineFactory.configure(configs);
        this.sslEngineFactoryConfig = configs;
        return sslEngineFactory;
    }

    private SslEngineFactory createNewSslEngineFactory(Map newConfigs) {
        if (sslEngineFactory == null) {
            throw new IllegalStateException("SslFactory has not been configured.");
        }
        Map nextConfigs = new HashMap<>(sslEngineFactoryConfig);
        copyMapEntries(nextConfigs, newConfigs, reconfigurableConfigs());
        if (clientAuthConfigOverride != null) {
            nextConfigs.put(BrokerSecurityConfigs.SSL_CLIENT_AUTH_CONFIG, clientAuthConfigOverride);
        }
        if (!sslEngineFactory.shouldBeRebuilt(nextConfigs)) {
            return sslEngineFactory;
        }
        try {
            SslEngineFactory newSslEngineFactory = instantiateSslEngineFactory(nextConfigs);
            if (sslEngineFactory.keystore() == null) {
                if (newSslEngineFactory.keystore() != null) {
                    throw new ConfigException("Cannot add SSL keystore to an existing listener for " +
                            "which no keystore was configured.");
                }
            } else {
                if (newSslEngineFactory.keystore() == null) {
                    throw new ConfigException("Cannot remove the SSL keystore from an existing listener for " +
                            "which a keystore was configured.");
                }

                CertificateEntries.ensureCompatible(newSslEngineFactory.keystore(), sslEngineFactory.keystore());
            }
            if (sslEngineFactory.truststore() == null && newSslEngineFactory.truststore() != null) {
                throw new ConfigException("Cannot add SSL truststore to an existing listener for which no " +
                        "truststore was configured.");
            }
            if (keystoreVerifiableUsingTruststore) {
                if (sslEngineFactory.truststore() != null || sslEngineFactory.keystore() != null) {
                    SslEngineValidator.validate(sslEngineFactory, newSslEngineFactory);
                }
            }
            return newSslEngineFactory;
        } catch (Exception e) {
            log.debug("Validation of dynamic config update of SSLFactory failed.", e);
            throw new ConfigException("Validation of dynamic config update of SSLFactory failed: " + e);
        }
    }

    public SSLEngine createSslEngine(Socket socket) {
        return createSslEngine(peerHost(socket), socket.getPort());
    }

    /**
     * Prefer `createSslEngine(Socket)` if a `Socket` instance is available. If using this overload,
     * avoid reverse DNS resolution in the computation of `peerHost`.
     */
    public SSLEngine createSslEngine(String peerHost, int peerPort) {
        if (sslEngineFactory == null) {
            throw new IllegalStateException("SslFactory has not been configured.");
        }
        if (mode == Mode.SERVER) {
            return sslEngineFactory.createServerSslEngine(peerHost, peerPort);
        } else {
            return sslEngineFactory.createClientSslEngine(peerHost, peerPort, endpointIdentification);
        }
    }

    /**
     * Returns host/IP address of remote host without reverse DNS lookup to be used as the host
     * for creating SSL engine. This is used as a hint for session reuse strategy and also for
     * hostname verification of server hostnames.
     * 

* Scenarios: *

    *
  • Server-side *
      *
    • Server accepts connection from a client. Server knows only client IP * address. We want to avoid reverse DNS lookup of the client IP address since the server * does not verify or use client hostname. The IP address can be used directly.
    • *
    *
  • *
  • Client-side *
      *
    • Client connects to server using hostname. No lookup is necessary * and the hostname should be used to create the SSL engine. This hostname is validated * against the hostname in SubjectAltName (dns) or CommonName in the certificate if * hostname verification is enabled. Authentication fails if hostname does not match.
    • *
    • Client connects to server using IP address, but certificate contains only * SubjectAltName (dns). Use of reverse DNS lookup to determine hostname introduces * a security vulnerability since authentication would be reliant on a secure DNS. * Hence hostname verification should fail in this case.
    • *
    • Client connects to server using IP address and certificate contains * SubjectAltName (ipaddress). This could be used when Kafka is on a private network. * If reverse DNS lookup is used, authentication would succeed using IP address if lookup * fails and IP address is used, but authentication would fail if lookup succeeds and * dns name is used. For consistency and to avoid dependency on a potentially insecure * DNS, reverse DNS lookup should be avoided and the IP address specified by the client for * connection should be used to create the SSL engine.
    • *
  • *
*/ private String peerHost(Socket socket) { return new InetSocketAddress(socket.getInetAddress(), 0).getHostString(); } public SslEngineFactory sslEngineFactory() { return sslEngineFactory; } /** * Copy entries from one map into another. * * @param destMap The map to copy entries into. * @param srcMap The map to copy entries from. * @param keySet Only entries with these keys will be copied. * @param The map key type. * @param The map value type. */ private static void copyMapEntries(Map destMap, Map srcMap, Set keySet) { for (K k : keySet) { copyMapEntry(destMap, srcMap, k); } } /** * Copy entry from one map into another. * * @param destMap The map to copy entries into. * @param srcMap The map to copy entries from. * @param key The entry with this key will be copied * @param The map key type. * @param The map value type. */ private static void copyMapEntry(Map destMap, Map srcMap, K key) { if (srcMap.containsKey(key)) { destMap.put(key, srcMap.get(key)); } } @Override public void close() { Utils.closeQuietly(sslEngineFactory, "close engine factory"); } static class CertificateEntries { private final String alias; private final Principal subjectPrincipal; private final Set> subjectAltNames; static List create(KeyStore keystore) throws GeneralSecurityException { Enumeration aliases = keystore.aliases(); List entries = new ArrayList<>(); while (aliases.hasMoreElements()) { String alias = aliases.nextElement(); Certificate cert = keystore.getCertificate(alias); if (cert instanceof X509Certificate) entries.add(new CertificateEntries(alias, (X509Certificate) cert)); } return entries; } static void ensureCompatible(KeyStore newKeystore, KeyStore oldKeystore) throws GeneralSecurityException { List newEntries = CertificateEntries.create(newKeystore); List oldEntries = CertificateEntries.create(oldKeystore); if (newEntries.size() != oldEntries.size()) { throw new ConfigException(String.format("Keystore entries do not match, existing store contains %d entries, new store contains %d entries", oldEntries.size(), newEntries.size())); } for (int i = 0; i < newEntries.size(); i++) { CertificateEntries newEntry = newEntries.get(i); CertificateEntries oldEntry = oldEntries.get(i); Principal newPrincipal = newEntry.subjectPrincipal; Principal oldPrincipal = oldEntry.subjectPrincipal; // Compare principal objects to compare canonical names (e.g. to ignore leading/trailing whitespaces). // Canonical names may differ if the tags of a field changes from one with a printable string representation // to one without or vice-versa due to optional conversion to hex representation based on the tag. So we // also compare Principal.getName which compares the RFC2253 name. If either matches, allow dynamic update. if (!Objects.equals(newPrincipal, oldPrincipal) && !newPrincipal.getName().equalsIgnoreCase(oldPrincipal.getName())) { throw new ConfigException(String.format("Keystore DistinguishedName does not match: " + " existing={alias=%s, DN=%s}, new={alias=%s, DN=%s}", oldEntry.alias, oldEntry.subjectPrincipal, newEntry.alias, newEntry.subjectPrincipal)); } if (!newEntry.subjectAltNames.containsAll(oldEntry.subjectAltNames)) { throw new ConfigException(String.format("Keystore SubjectAltNames do not match: " + " existing={alias=%s, SAN=%s}, new={alias=%s, SAN=%s}", oldEntry.alias, oldEntry.subjectAltNames, newEntry.alias, newEntry.subjectAltNames)); } } } CertificateEntries(String alias, X509Certificate cert) throws GeneralSecurityException { this.alias = alias; this.subjectPrincipal = cert.getSubjectX500Principal(); Collection> altNames = cert.getSubjectAlternativeNames(); // use a set for comparison this.subjectAltNames = altNames != null ? new HashSet<>(altNames) : Collections.emptySet(); } @Override public int hashCode() { return Objects.hash(subjectPrincipal, subjectAltNames); } @Override public boolean equals(Object obj) { if (!(obj instanceof CertificateEntries)) return false; CertificateEntries other = (CertificateEntries) obj; return Objects.equals(subjectPrincipal, other.subjectPrincipal) && Objects.equals(subjectAltNames, other.subjectAltNames); } @Override public String toString() { return "subjectPrincipal=" + subjectPrincipal + ", subjectAltNames=" + subjectAltNames; } } /** * Validator used to verify dynamic update of keystore used in inter-broker communication. * The validator checks that a successful handshake can be performed using the keystore and * truststore configured on this SslFactory. */ private static class SslEngineValidator { private static final ByteBuffer EMPTY_BUF = ByteBuffer.allocate(0); private final SSLEngine sslEngine; private SSLEngineResult handshakeResult; private ByteBuffer appBuffer; private ByteBuffer netBuffer; static void validate(SslEngineFactory oldEngineBuilder, SslEngineFactory newEngineBuilder) throws SSLException { validate(createSslEngineForValidation(oldEngineBuilder, Mode.SERVER), createSslEngineForValidation(newEngineBuilder, Mode.CLIENT)); validate(createSslEngineForValidation(newEngineBuilder, Mode.SERVER), createSslEngineForValidation(oldEngineBuilder, Mode.CLIENT)); } private static SSLEngine createSslEngineForValidation(SslEngineFactory sslEngineFactory, Mode mode) { // Use empty hostname, disable hostname verification if (mode == Mode.SERVER) { return sslEngineFactory.createServerSslEngine("", 0); } else { return sslEngineFactory.createClientSslEngine("", 0, ""); } } static void validate(SSLEngine clientEngine, SSLEngine serverEngine) throws SSLException { SslEngineValidator clientValidator = new SslEngineValidator(clientEngine); SslEngineValidator serverValidator = new SslEngineValidator(serverEngine); try { clientValidator.beginHandshake(); serverValidator.beginHandshake(); while (!serverValidator.complete() || !clientValidator.complete()) { clientValidator.handshake(serverValidator); serverValidator.handshake(clientValidator); } } finally { clientValidator.close(); serverValidator.close(); } } private SslEngineValidator(SSLEngine engine) { this.sslEngine = engine; appBuffer = ByteBuffer.allocate(sslEngine.getSession().getApplicationBufferSize()); netBuffer = ByteBuffer.allocate(sslEngine.getSession().getPacketBufferSize()); } void beginHandshake() throws SSLException { sslEngine.beginHandshake(); } void handshake(SslEngineValidator peerValidator) throws SSLException { SSLEngineResult.HandshakeStatus handshakeStatus = sslEngine.getHandshakeStatus(); while (true) { switch (handshakeStatus) { case NEED_WRAP: if (netBuffer.position() != 0) // Wait for peer to consume previously wrapped data return; handshakeResult = sslEngine.wrap(EMPTY_BUF, netBuffer); switch (handshakeResult.getStatus()) { case OK: break; case BUFFER_OVERFLOW: netBuffer.compact(); netBuffer = Utils.ensureCapacity(netBuffer, sslEngine.getSession().getPacketBufferSize()); netBuffer.flip(); break; case BUFFER_UNDERFLOW: case CLOSED: default: throw new SSLException("Unexpected handshake status: " + handshakeResult.getStatus()); } return; case NEED_UNWRAP: if (peerValidator.netBuffer.position() == 0) // no data to unwrap, return to process peer return; peerValidator.netBuffer.flip(); // unwrap the data from peer handshakeResult = sslEngine.unwrap(peerValidator.netBuffer, appBuffer); peerValidator.netBuffer.compact(); handshakeStatus = handshakeResult.getHandshakeStatus(); switch (handshakeResult.getStatus()) { case OK: break; case BUFFER_OVERFLOW: appBuffer = Utils.ensureCapacity(appBuffer, sslEngine.getSession().getApplicationBufferSize()); break; case BUFFER_UNDERFLOW: netBuffer = Utils.ensureCapacity(netBuffer, sslEngine.getSession().getPacketBufferSize()); break; case CLOSED: default: throw new SSLException("Unexpected handshake status: " + handshakeResult.getStatus()); } break; case NEED_TASK: sslEngine.getDelegatedTask().run(); handshakeStatus = sslEngine.getHandshakeStatus(); break; case FINISHED: return; case NOT_HANDSHAKING: if (handshakeResult.getHandshakeStatus() != SSLEngineResult.HandshakeStatus.FINISHED) throw new SSLException("Did not finish handshake"); return; default: throw new IllegalStateException("Unexpected handshake status " + handshakeStatus); } } } boolean complete() { return sslEngine.getHandshakeStatus() == SSLEngineResult.HandshakeStatus.FINISHED || sslEngine.getHandshakeStatus() == SSLEngineResult.HandshakeStatus.NOT_HANDSHAKING; } void close() { sslEngine.closeOutbound(); try { sslEngine.closeInbound(); } catch (Exception e) { // ignore } } } }




© 2015 - 2024 Weber Informatics LLC | Privacy Policy