/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at * trunk/opends/resource/legal-notices/OpenDS.LICENSE * or https://OpenDS.dev.java.net/OpenDS.LICENSE. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at * trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable, * add the following below this CDDL HEADER, with the fields enclosed * by brackets "[]" replaced with your own identifying information: * Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END * * * Copyright 2008 Sun Microsystems, Inc. * Portions Copyright 2012 ForgeRock, AS. */ package org.opends.server.extensions; import org.opends.messages.Message; import java.util.ArrayList; import java.util.List; import java.util.Set; import org.opends.server.admin.server.ConfigurationChangeListener; import org.opends.server.admin.std.server.AttributeValuePasswordValidatorCfg; import org.opends.server.admin.std.server.PasswordValidatorCfg; import org.opends.server.api.PasswordValidator; import org.opends.server.types.*; import static org.opends.messages.ExtensionMessages.*; import org.opends.messages.MessageBuilder; /** * This class provides an OpenDS password validator that may be used to ensure * that proposed passwords are not contained in another attribute in the user's * entry. */ public class AttributeValuePasswordValidator extends PasswordValidator<AttributeValuePasswordValidatorCfg> implements ConfigurationChangeListener< AttributeValuePasswordValidatorCfg> { // The current configuration for this password validator. private AttributeValuePasswordValidatorCfg currentConfig; /** * Creates a new instance of this attribute value password validator. */ public AttributeValuePasswordValidator() { super(); // No implementation is required here. All initialization should be // performed in the initializePasswordValidator() method. } /** * {@inheritDoc} */ @Override() public void initializePasswordValidator( AttributeValuePasswordValidatorCfg configuration) { configuration.addAttributeValueChangeListener(this); currentConfig = configuration; } /** * {@inheritDoc} */ @Override() public void finalizePasswordValidator() { currentConfig.removeAttributeValueChangeListener(this); } /** * Search for substrings of the password in an Attribute. The search is * case-insensitive. * * @param password the password * @param minSubstringLength the minimum substring length to check * @param a the attribute to search * @return true if an attribute value matches a substring of the password, * false otherwise. */ private boolean containsSubstring(String password, int minSubstringLength, Attribute a) { final int passwordLength = password.length(); for (int i = 0; i < passwordLength; i++) { for (int j = i + minSubstringLength; j <= passwordLength; j++) { Attribute substring = Attributes.create(a.getAttributeType(), password.substring(i, j)); for (AttributeValue val : a) { if (substring.contains(val)) return true; } } } return false; } /** * {@inheritDoc} */ @Override() public boolean passwordIsAcceptable(ByteString newPassword, Set<ByteString> currentPasswords, Operation operation, Entry userEntry, MessageBuilder invalidReason) { // Get a handle to the current configuration. AttributeValuePasswordValidatorCfg config = currentConfig; // Get the string representation (both forward and reversed) for the // password. String password = newPassword.toString(); String reversed = new StringBuilder(password).reverse().toString(); // Check to see if we should verify the whole password or the substrings. int minSubstringLength = password.length(); if (config.isCheckSubstrings()) { // We apply the minimal substring length only if the provided value // is smaller then the actual password length if (config.getMinSubstringLength() < password.length()) { minSubstringLength = config.getMinSubstringLength(); } } // If we should check a specific set of attributes, then do that now. // Otherwise, check all user attributes. Set<AttributeType> matchAttributes = config.getMatchAttribute(); if ((matchAttributes == null) || matchAttributes.isEmpty()) { matchAttributes = userEntry.getUserAttributes().keySet(); } for (AttributeType t : matchAttributes) { List<Attribute> attrList = userEntry.getAttribute(t); if ((attrList == null) || attrList.isEmpty()) { continue; } AttributeValue vf = AttributeValues.create(t, password); AttributeValue vr = AttributeValues.create(t, reversed); for (Attribute a : attrList) { if (a.contains(vf) || (config.isTestReversedPassword() && a.contains(vr)) || (config.isCheckSubstrings() && containsSubstring(password, minSubstringLength, a))) { invalidReason.append(ERR_ATTRVALUE_VALIDATOR_PASSWORD_IN_ENTRY.get()); return false; } } } // If we've gotten here, then the password is acceptable. return true; } /** * {@inheritDoc} */ @Override() public boolean isConfigurationAcceptable(PasswordValidatorCfg configuration, List<Message> unacceptableReasons) { AttributeValuePasswordValidatorCfg config = (AttributeValuePasswordValidatorCfg) configuration; return isConfigurationChangeAcceptable(config, unacceptableReasons); } /** * {@inheritDoc} */ public boolean isConfigurationChangeAcceptable( AttributeValuePasswordValidatorCfg configuration, List<Message> unacceptableReasons) { // If we've gotten this far, then we'll accept the change. return true; } /** * {@inheritDoc} */ public ConfigChangeResult applyConfigurationChange( AttributeValuePasswordValidatorCfg configuration) { ResultCode resultCode = ResultCode.SUCCESS; boolean adminActionRequired = false; ArrayList<Message> messages = new ArrayList<Message>(); currentConfig = configuration; return new ConfigChangeResult(resultCode, adminActionRequired, messages); } }