/* * Copyright (c) 2003, 2008, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. Oracle designates this * particular file as subject to the "Classpath" exception as provided * by Oracle in the LICENSE file that accompanied this code. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ package javax.rmi.ssl; import java.io.IOException; import java.net.ServerSocket; import java.net.Socket; import java.rmi.server.RMIServerSocketFactory; import java.util.Arrays; import java.util.List; import javax.net.ssl.SSLContext; import javax.net.ssl.SSLServerSocketFactory; import javax.net.ssl.SSLSocket; import javax.net.ssl.SSLSocketFactory; /** * <p>An <code>SslRMIServerSocketFactory</code> instance is used by the RMI * runtime in order to obtain server sockets for RMI calls via SSL.</p> * * <p>This class implements <code>RMIServerSocketFactory</code> over * the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) * protocols.</p> * * <p>This class creates SSL sockets using the default * <code>SSLSocketFactory</code> (see {@link * SSLSocketFactory#getDefault}) or the default * <code>SSLServerSocketFactory</code> (see {@link * SSLServerSocketFactory#getDefault}) unless the * constructor taking an <code>SSLContext</code> is * used in which case the SSL sockets are created using * the <code>SSLSocketFactory</code> returned by * {@link SSLContext#getSocketFactory} or the * <code>SSLServerSocketFactory</code> returned by * {@link SSLContext#getServerSocketFactory}. * * When an <code>SSLContext</code> is not supplied all the instances of this * class share the same keystore, and the same truststore (when client * authentication is required by the server). This behavior can be modified * by supplying an already initialized <code>SSLContext</code> instance. * * @see javax.net.ssl.SSLSocketFactory * @see javax.net.ssl.SSLServerSocketFactory * @see javax.rmi.ssl.SslRMIClientSocketFactory * @since 1.5 */ public class SslRMIServerSocketFactory implements RMIServerSocketFactory { /** * <p>Creates a new <code>SslRMIServerSocketFactory</code> with * the default SSL socket configuration.</p> * * <p>SSL connections accepted by server sockets created by this * factory have the default cipher suites and protocol versions * enabled and do not require client authentication.</p> */ public SslRMIServerSocketFactory() { this(null, null, false); } /** * <p>Creates a new <code>SslRMIServerSocketFactory</code> with * the specified SSL socket configuration.</p> * * @param enabledCipherSuites names of all the cipher suites to * enable on SSL connections accepted by server sockets created by * this factory, or <code>null</code> to use the cipher suites * that are enabled by default * * @param enabledProtocols names of all the protocol versions to * enable on SSL connections accepted by server sockets created by * this factory, or <code>null</code> to use the protocol versions * that are enabled by default * * @param needClientAuth <code>true</code> to require client * authentication on SSL connections accepted by server sockets * created by this factory; <code>false</code> to not require * client authentication * * @exception IllegalArgumentException when one or more of the cipher * suites named by the <code>enabledCipherSuites</code> parameter is * not supported, when one or more of the protocols named by the * <code>enabledProtocols</code> parameter is not supported or when * a problem is encountered while trying to check if the supplied * cipher suites and protocols to be enabled are supported. * * @see SSLSocket#setEnabledCipherSuites * @see SSLSocket#setEnabledProtocols * @see SSLSocket#setNeedClientAuth */ public SslRMIServerSocketFactory( String[] enabledCipherSuites, String[] enabledProtocols, boolean needClientAuth) throws IllegalArgumentException { this(null, enabledCipherSuites, enabledProtocols, needClientAuth); } /** * <p>Creates a new <code>SslRMIServerSocketFactory</code> with the * specified <code>SSLContext</code> and SSL socket configuration.</p> * * @param context the SSL context to be used for creating SSL sockets. * If <code>context</code> is null the default <code>SSLSocketFactory</code> * or the default <code>SSLServerSocketFactory</code> will be used to * create SSL sockets. Otherwise, the socket factory returned by * <code>SSLContext.getSocketFactory()</code> or * <code>SSLContext.getServerSocketFactory()</code> will be used instead. * * @param enabledCipherSuites names of all the cipher suites to * enable on SSL connections accepted by server sockets created by * this factory, or <code>null</code> to use the cipher suites * that are enabled by default * * @param enabledProtocols names of all the protocol versions to * enable on SSL connections accepted by server sockets created by * this factory, or <code>null</code> to use the protocol versions * that are enabled by default * * @param needClientAuth <code>true</code> to require client * authentication on SSL connections accepted by server sockets * created by this factory; <code>false</code> to not require * client authentication * * @exception IllegalArgumentException when one or more of the cipher * suites named by the <code>enabledCipherSuites</code> parameter is * not supported, when one or more of the protocols named by the * <code>enabledProtocols</code> parameter is not supported or when * a problem is encountered while trying to check if the supplied * cipher suites and protocols to be enabled are supported. * * @see SSLSocket#setEnabledCipherSuites * @see SSLSocket#setEnabledProtocols * @see SSLSocket#setNeedClientAuth * @since 1.7 */ public SslRMIServerSocketFactory( SSLContext context, String[] enabledCipherSuites, String[] enabledProtocols, boolean needClientAuth) throws IllegalArgumentException { // Initialize the configuration parameters. // this.enabledCipherSuites = enabledCipherSuites == null ? null : enabledCipherSuites.clone(); this.enabledProtocols = enabledProtocols == null ? null : enabledProtocols.clone(); this.needClientAuth = needClientAuth; // Force the initialization of the default at construction time, // rather than delaying it to the first time createServerSocket() // is called. // this.context = context; final SSLSocketFactory sslSocketFactory = context == null ? getDefaultSSLSocketFactory() : context.getSocketFactory(); SSLSocket sslSocket = null; if (this.enabledCipherSuites != null || this.enabledProtocols != null) { try { sslSocket = (SSLSocket) sslSocketFactory.createSocket(); } catch (Exception e) { final String msg = "Unable to check if the cipher suites " + "and protocols to enable are supported"; throw (IllegalArgumentException) new IllegalArgumentException(msg).initCause(e); } } // Check if all the cipher suites and protocol versions to enable // are supported by the underlying SSL/TLS implementation and if // true create lists from arrays. // if (this.enabledCipherSuites != null) { sslSocket.setEnabledCipherSuites(this.enabledCipherSuites); enabledCipherSuitesList = Arrays.asList(this.enabledCipherSuites); } if (this.enabledProtocols != null) { sslSocket.setEnabledProtocols(this.enabledProtocols); enabledProtocolsList = Arrays.asList(this.enabledProtocols); } } /** * <p>Returns the names of the cipher suites enabled on SSL * connections accepted by server sockets created by this factory, * or <code>null</code> if this factory uses the cipher suites * that are enabled by default.</p> * * @return an array of cipher suites enabled, or <code>null</code> * * @see SSLSocket#setEnabledCipherSuites */ public final String[] getEnabledCipherSuites() { return enabledCipherSuites == null ? null : enabledCipherSuites.clone(); } /** * <p>Returns the names of the protocol versions enabled on SSL * connections accepted by server sockets created by this factory, * or <code>null</code> if this factory uses the protocol versions * that are enabled by default.</p> * * @return an array of protocol versions enabled, or * <code>null</code> * * @see SSLSocket#setEnabledProtocols */ public final String[] getEnabledProtocols() { return enabledProtocols == null ? null : enabledProtocols.clone(); } /** * <p>Returns <code>true</code> if client authentication is * required on SSL connections accepted by server sockets created * by this factory.</p> * * @return <code>true</code> if client authentication is required * * @see SSLSocket#setNeedClientAuth */ public final boolean getNeedClientAuth() { return needClientAuth; } /** * <p>Creates a server socket that accepts SSL connections * configured according to this factory's SSL socket configuration * parameters.</p> */ public ServerSocket createServerSocket(int port) throws IOException { final SSLSocketFactory sslSocketFactory = context == null ? getDefaultSSLSocketFactory() : context.getSocketFactory(); return new ServerSocket(port) { public Socket accept() throws IOException { Socket socket = super.accept(); SSLSocket sslSocket = (SSLSocket) sslSocketFactory.createSocket( socket, socket.getInetAddress().getHostName(), socket.getPort(), true); sslSocket.setUseClientMode(false); if (enabledCipherSuites != null) { sslSocket.setEnabledCipherSuites(enabledCipherSuites); } if (enabledProtocols != null) { sslSocket.setEnabledProtocols(enabledProtocols); } sslSocket.setNeedClientAuth(needClientAuth); return sslSocket; } }; } /** * <p>Indicates whether some other object is "equal to" this one.</p> * * <p>Two <code>SslRMIServerSocketFactory</code> objects are equal * if they have been constructed with the same SSL context and * SSL socket configuration parameters.</p> * * <p>A subclass should override this method (as well as * {@link #hashCode()}) if it adds instance state that affects * equality.</p> */ public boolean equals(Object obj) { if (obj == null) return false; if (obj == this) return true; if (!(obj instanceof SslRMIServerSocketFactory)) return false; SslRMIServerSocketFactory that = (SslRMIServerSocketFactory) obj; return (getClass().equals(that.getClass()) && checkParameters(that)); } private boolean checkParameters(SslRMIServerSocketFactory that) { // SSL context // if (context == null ? that.context != null : !context.equals(that.context)) return false; // needClientAuth flag // if (needClientAuth != that.needClientAuth) return false; // enabledCipherSuites // if ((enabledCipherSuites == null && that.enabledCipherSuites != null) || (enabledCipherSuites != null && that.enabledCipherSuites == null)) return false; if (enabledCipherSuites != null && that.enabledCipherSuites != null) { List<String> thatEnabledCipherSuitesList = Arrays.asList(that.enabledCipherSuites); if (!enabledCipherSuitesList.equals(thatEnabledCipherSuitesList)) return false; } // enabledProtocols // if ((enabledProtocols == null && that.enabledProtocols != null) || (enabledProtocols != null && that.enabledProtocols == null)) return false; if (enabledProtocols != null && that.enabledProtocols != null) { List<String> thatEnabledProtocolsList = Arrays.asList(that.enabledProtocols); if (!enabledProtocolsList.equals(thatEnabledProtocolsList)) return false; } return true; } /** * <p>Returns a hash code value for this * <code>SslRMIServerSocketFactory</code>.</p> * * @return a hash code value for this * <code>SslRMIServerSocketFactory</code>. */ public int hashCode() { return getClass().hashCode() + (context == null ? 0 : context.hashCode()) + (needClientAuth ? Boolean.TRUE.hashCode() : Boolean.FALSE.hashCode()) + (enabledCipherSuites == null ? 0 : enabledCipherSuitesList.hashCode()) + (enabledProtocols == null ? 0 : enabledProtocolsList.hashCode()); } // We use a static field because: // // SSLSocketFactory.getDefault() always returns the same object // (at least on Sun's implementation), and we want to make sure // that the Javadoc & the implementation stay in sync. // // If someone needs to have different SslRMIServerSocketFactory // factories with different underlying SSLSocketFactory objects // using different keystores and truststores, he/she can always // use the constructor that takes an SSLContext as input. // private static SSLSocketFactory defaultSSLSocketFactory = null; private static synchronized SSLSocketFactory getDefaultSSLSocketFactory() { if (defaultSSLSocketFactory == null) defaultSSLSocketFactory = (SSLSocketFactory) SSLSocketFactory.getDefault(); return defaultSSLSocketFactory; } private final String[] enabledCipherSuites; private final String[] enabledProtocols; private final boolean needClientAuth; private List<String> enabledCipherSuitesList; private List<String> enabledProtocolsList; private SSLContext context; }