/************************************************************************* * Copyright 2009-2013 Eucalyptus Systems, Inc. * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; version 3 of the License. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program. If not, see http://www.gnu.org/licenses/. * * Please contact Eucalyptus Systems, Inc., 6755 Hollister Ave., Goleta * CA 93117, USA or visit http://www.eucalyptus.com/licenses/ if you need * additional information or have any questions. * * This file may incorporate work covered under the following copyright * and permission notice: * * Software License Agreement (BSD License) * * Copyright (c) 2008, Regents of the University of California * All rights reserved. * * Redistribution and use of this software in source and binary forms, * with or without modification, are permitted provided that the * following conditions are met: * * Redistributions of source code must retain the above copyright * notice, this list of conditions and the following disclaimer. * * Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer * in the documentation and/or other materials provided with the * distribution. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER * CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN * ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. USERS OF THIS SOFTWARE ACKNOWLEDGE * THE POSSIBLE PRESENCE OF OTHER OPEN SOURCE LICENSED MATERIAL, * COPYRIGHTED MATERIAL OR PATENTED MATERIAL IN THIS SOFTWARE, * AND IF ANY SUCH MATERIAL IS DISCOVERED THE PARTY DISCOVERING * IT MAY INFORM DR. RICH WOLSKI AT THE UNIVERSITY OF CALIFORNIA, * SANTA BARBARA WHO WILL THEN ASCERTAIN THE MOST APPROPRIATE REMEDY, * WHICH IN THE REGENTS' DISCRETION MAY INCLUDE, WITHOUT LIMITATION, * REPLACEMENT OF THE CODE SO IDENTIFIED, LICENSING OF THE CODE SO * IDENTIFIED, OR WITHDRAWAL OF THE CODE CAPABILITY TO THE EXTENT * NEEDED TO COMPLY WITH ANY SUCH LICENSES OR RIGHTS. ************************************************************************/ package com.eucalyptus.crypto.util; import java.io.ByteArrayInputStream; import java.security.cert.CertificateException; import java.security.cert.CertificateFactory; import java.security.cert.X509Certificate; import java.util.Arrays; import java.util.Calendar; import java.util.Date; import java.util.List; import java.util.Objects; import java.util.concurrent.Callable; import org.apache.axiom.om.OMElement; import org.apache.axiom.om.impl.builder.StAXOMBuilder; import org.apache.axiom.soap.SOAPEnvelope; import org.apache.log4j.Logger; import org.apache.ws.security.SOAPConstants; import org.apache.ws.security.WSConstants; import org.apache.ws.security.WSDocInfo; import org.apache.ws.security.WSSConfig; import org.apache.ws.security.WSSecurityEngineResult; import org.apache.ws.security.WSSecurityException; import org.apache.ws.security.handler.RequestData; import org.apache.ws.security.message.token.BinarySecurity; import org.apache.ws.security.message.token.Reference; import org.apache.ws.security.message.token.SecurityTokenReference; import org.apache.ws.security.message.token.Timestamp; import org.apache.ws.security.message.token.X509Security; import org.apache.ws.security.processor.TimestampProcessor; import org.apache.ws.security.util.WSSecurityUtil; import org.apache.xml.security.c14n.Canonicalizer; import org.apache.xml.security.c14n.InvalidCanonicalizerException; import org.apache.xml.security.exceptions.XMLSecurityException; import org.apache.xml.security.keys.KeyInfo; import org.apache.xml.security.signature.SignedInfo; import org.apache.xml.security.signature.XMLSignature; import org.apache.xml.security.signature.XMLSignatureException; import org.apache.xml.security.signature.XMLSignatureInput; import org.w3c.dom.Element; import org.w3c.dom.Node; import org.w3c.dom.Text; import com.eucalyptus.auth.login.SecurityContext; import com.eucalyptus.binding.HoldMe; import com.eucalyptus.records.Logs; import com.eucalyptus.ws.StackConfiguration; import com.eucalyptus.ws.WebServicesException; import com.google.common.cache.Cache; import com.google.common.cache.CacheBuilder; import com.google.common.cache.CacheBuilderSpec; /** * */ public class WSSecurity { private static Logger LOG = Logger.getLogger( WSSecurity.class ); private static CertificateFactory factory; private static final String SYSTEM_PROPERTY_SKIP_SECURITY_CHECK = "com.eucalyptus.crypto.util.skipWsSecurityConfigurationChecks"; private static final Cache<CertificateKey,X509Certificate> cache = cache( System.getProperty( "com.eucalyptus.crypto.util.wsCertCache", "maximumSize=100" ) ); static { System.setProperty( "org.apache.xml.security.resource.config", "/xml-security-config.xml" ); org.apache.xml.security.Init.init( ); if ( !acceptXmlSecurityConfiguration() ) { LOG.fatal("XML Security configuration not applied, set system property "+SYSTEM_PROPERTY_SKIP_SECURITY_CHECK+"=true to skip check"); throw new RuntimeException("XML Security Configuration not applied"); } } public static void init() { // currently the static initializer does the work } public static CertificateFactory getCertificateFactory( ) { if ( factory == null ) { try { factory = CertificateFactory.getInstance( "X.509"/*, "BC"*/); } catch ( CertificateException e ) { LOG.error( e, e ); } /*catch ( NoSuchProviderException e ) { LOG.error( e, e ); }*/ } return factory; } private static boolean useBc = false; public static X509Certificate verifyWSSec( final SOAPEnvelope envelope ) throws Exception { final Element secNode = WSSecurity.getSecurityElement( envelope ); final XMLSignature sig = WSSecurity.getXMLSignature( secNode ); String sigValue = new String( sig.getSignatureValue( ) ); SecurityContext.enqueueSignature( sigValue ); X509Certificate cert = null; try { cert = WSSecurity.verifySignature( secNode, sig ); Logs.exhaust( ).debug( cert ); } catch ( Exception ex ) { Logs.exhaust( ).error( ex , ex ); throw new WebServicesException( "Authentication failed: " + ex.getMessage( ), ex ); } return cert; } public static X509Certificate verifySignature( final Element securityNode, final XMLSignature sig ) throws WSSecurityException, XMLSignatureException, XMLSecurityException { final SecurityTokenReference secRef = WSSecurity.getSecurityTokenReference( sig.getKeyInfo( ) ); final Reference tokenRef = secRef.getReference( ); Element bstDirect = WSSecurityUtil.findElementById( securityNode.getOwnerDocument(), tokenRef.getURI(), true ); if ( bstDirect == null ) { throw new WSSecurityException( WSSecurityException.INVALID_SECURITY, "noCert" ); } BinarySecurity token = new BinarySecurity( bstDirect ); String type = token.getValueType( ); final X509Certificate cert; try { if ( useBc ) { Node node = bstDirect.getFirstChild( ); String certStr = ( "-----BEGIN CERTIFICATE-----\n" + ( node == null || !( node instanceof Text ) ? null : ( ( Text ) node ).getData( ) ) + "\n-----END CERTIFICATE-----\n" ); cert = PEMFiles.getCert( certStr.getBytes( ) ); } else { final X509Security x509 = new X509Security( bstDirect ); final byte[] bstToken = x509.getToken( ); cert = cache.get( new CertificateKey( bstToken ), new Callable<X509Certificate>( ) { @Override public X509Certificate call( ) throws Exception { CertificateFactory factory = getCertificateFactory( ); return ( X509Certificate ) factory.generateCertificate( new ByteArrayInputStream( bstToken ) ); } } ); } } catch ( Exception e ) { LOG.error( e, e ); throw new WSSecurityException( WSSecurityException.UNSUPPORTED_SECURITY_TOKEN, "unsupportedBinaryTokenType", new Object[] { type } ); } if ( !sig.checkSignatureValue( cert ) ) { throw new WSSecurityException( WSSecurityException.FAILED_CHECK ); } verifyReferences(sig); return cert; } /** * Verifies that signed Timestamp is not expired and that signed Body * is subelement of root SOAP element (that's what expected by * subsequent request processing logic) * * @param sig * @return * @throws WSSecurityException * @throws XMLSignatureException */ private static boolean verifyReferences(XMLSignature sig) throws WSSecurityException, XMLSignatureException, XMLSecurityException { if ( sig.getSignedInfo() == null ) throw new WSSecurityException( WSSecurityException.SECURITY_TOKEN_UNAVAILABLE, "SignedInfo" ); SignedInfo si = sig.getSignedInfo(); boolean tsSigned = false; boolean bdSigned = false; for(int i = 0; i < si.getLength(); i++) { org.apache.xml.security.signature.Reference ref = si.item(i); String uri = ref.getURI(); if("".compareTo(uri) == 0) { throw new XMLSignatureException("signature.Transform.NotYetImplemented", new Object[]{"XPath"}); } XMLSignatureInput xmlInput = ref.getContentsBeforeTransformation(); if(xmlInput.isElement()) { Node subNode = xmlInput.getSubNode(); String name = subNode.getLocalName(); LOG.debug("Reference: name = " + subNode.getNodeName() + ", type = " + subNode.getNodeType()); if(WSConstants.TIMESTAMP_TOKEN_LN.compareTo(name) == 0) { verifyTimestamp(subNode); tsSigned = true; } else if(WSConstants.ELEM_BODY.compareTo(name) == 0) { verifyBodyLocation(subNode); bdSigned = true; } } else { throw new XMLSignatureException("generic.NotYetImplemented", new Object[]{"References to multiple elements"}); } } if(!tsSigned) throw new WSSecurityException(WSSecurityException.FAILED_CHECK, "requiredElementNotSigned", new Object[]{WSConstants.TIMESTAMP_TOKEN_LN}); if(!bdSigned) throw new WSSecurityException(WSSecurityException.FAILED_CHECK, "requiredElementNotSigned", new Object[]{WSConstants.ELEM_BODY}); return true; } private static void verifyTimestamp(Node node) throws WSSecurityException { TimestampProcessor tsProc = new TimestampProcessor(); if ( LOG.isTraceEnabled( ) ) { LOG.trace("Timestamp: " + node); } // can't call handleTimestamp() directly because // the config will not be set in that case // all null-params are not used by handleToken() final RequestData data = new RequestData( ); data.setWssConfig( WSSConfig.getNewInstance( ) ); final WSDocInfo docInfo = new WSDocInfo( node.getOwnerDocument( ) ); final List<WSSecurityEngineResult> retResults = tsProc.handleToken( (Element) node, data, docInfo ); // need to make sure that the timestamp's valid period // is at least as long as the request caching time Timestamp ts = (Timestamp)retResults.get(0).get( WSSecurityEngineResult.TAG_TIMESTAMP ); if ( LOG.isTraceEnabled( ) ) { LOG.trace("timestamp: " + ts); } Date expires = ts.getExpires(); if(!SecurityContext.validateTimestampPeriod(expires)) { LOG.warn("[security] ]Timestamp expiration is further in the future than replay cache expiration"); //throw new WSSecurityException("Timestamp expiration is too far in the future"); } // validate that creation time is not too far in the future Calendar now = Calendar.getInstance(); now.add(Calendar.SECOND, StackConfiguration.CLOCK_SKEW_SEC); if(now.before(ts.getCreated())) { throw new WSSecurityException("Timestamp was created in the future: make sure you clocks are synchronized"); } } /** * Checks that Body element is located inside * the main <soap:Envelope> element * * @param node * @throws WSSecurityException */ private static void verifyBodyLocation(Node node) throws WSSecurityException { Node parent = node.getParentNode(); if(parent == null || (WSConstants.ELEM_ENVELOPE.compareTo(parent.getLocalName()) != 0)) throw new WSSecurityException("Unexpected parent element for signed <Body>"); int depth = 0; while(parent != null) { depth++; parent = parent.getParentNode(); } if(depth != 2) { LOG.debug("depth of " + node.getNodeName() + " is " + depth); throw new WSSecurityException("Unexpected location of signed <Body>"); } } public static XMLSignature getXmlSignature( final Element signatureNode ) throws WSSecurityException { try { final XMLSignature sig = new XMLSignature( signatureNode, null, true ); sig.addResourceResolver( new WssIdResolver( ) ); return sig; } catch ( XMLSecurityException e ) { throw new WSSecurityException( WSSecurityException.FAILED_CHECK, "noXMLSig", null, e ); } } public static SecurityTokenReference getSecurityTokenReference( KeyInfo info ) throws WSSecurityException { Node secTokenRef = WSSecurityUtil.getDirectChildElement( info.getElement(), SecurityTokenReference.SECURITY_TOKEN_REFERENCE, WSConstants.WSSE_NS ); if ( secTokenRef == null ) { throw new WSSecurityException( WSSecurityException.INVALID_SECURITY, "unsupportedKeyInfo" ); } SecurityTokenReference secRef; try { secRef = new SecurityTokenReference( ( Element ) secTokenRef ); } catch ( WSSecurityException e1 ) { LOG.error( e1, e1 ); throw e1; } if ( !secRef.containsReference( ) ) throw new WSSecurityException( WSSecurityException.FAILED_CHECK ); return secRef; } public static Element getSignatureElement( final Element securityNode ) { final Element signatureNode = ( Element ) WSSecurityUtil.getDirectChildElement( securityNode, WSConstants.SIG_LN, WSConstants.SIG_NS ); return signatureNode; } private static Element getSecurityElement( final Element env ) { final SOAPConstants soapConstants = WSSecurityUtil.getSOAPConstants( env ); final Element soapHeaderElement = ( Element ) WSSecurityUtil.getDirectChildElement( env, soapConstants.getHeaderQName( ).getLocalPart( ), soapConstants.getEnvelopeURI( ) ); if ( soapHeaderElement != null ) { final Element securityNode = ( Element ) WSSecurityUtil.getDirectChildElement( soapHeaderElement, WSConstants.WSSE_LN, WSConstants.WSSE_NS ); return securityNode; } return null; } public static Element getSecurityElement( SOAPEnvelope envelope ) { // get security header final StAXOMBuilder doomBuilder = HoldMe.getStAXOMBuilder( HoldMe.getDOOMFactory( ), envelope.getXMLStreamReader( ) ); final OMElement elem = doomBuilder.getDocumentElement( ); elem.build( ); final Element env = ( ( Element ) elem ); final Element securityNode = getSecurityElement( env ); return securityNode; } public static XMLSignature getXMLSignature( final Element securityNode ) throws WSSecurityException, XMLSignatureException { if ( securityNode != null ) { XMLSignature sig = checkSignature( securityNode ); return sig; } else { throw new XMLSignatureException( "No BST Element." ); } } private static XMLSignature checkSignature( final Element securityNode ) throws WSSecurityException, XMLSignatureException { final Element signatureNode = getSignatureElement( securityNode ); final XMLSignature sig = getXmlSignature( signatureNode ); if ( sig.getKeyInfo( ) == null ) throw new WSSecurityException( WSSecurityException.SECURITY_TOKEN_UNAVAILABLE ); return sig; } private static boolean acceptXmlSecurityConfiguration() { return Boolean.parseBoolean(System.getProperty(SYSTEM_PROPERTY_SKIP_SECURITY_CHECK)) || isValidXmlSecurityConfiguration(); } private static boolean isValidXmlSecurityConfiguration() { try { Canonicalizer.getInstance( "http://www.w3.org/2006/12/xml-c14n11" ); return false; } catch (InvalidCanonicalizerException e) { return true; } } private static Cache<CertificateKey,X509Certificate> cache( final String cacheSpec ) { return CacheBuilder .from( CacheBuilderSpec.parse( cacheSpec ) ) .build( ); } private static final class CertificateKey { private final byte[] encoded; public CertificateKey( final byte[] encoded ) { this.encoded = encoded; } @Override public boolean equals( final Object o ) { if ( this == o ) return true; if ( o == null || getClass( ) != o.getClass( ) ) return false; final CertificateKey that = (CertificateKey) o; return Arrays.equals( encoded, that.encoded ); } @Override public int hashCode() { return Arrays.hashCode( encoded ); } } }