/** * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.apache.zookeeper.server; import java.security.Principal; import java.security.PrivilegedActionException; import java.security.PrivilegedExceptionAction; import javax.security.auth.Subject; import javax.security.sasl.Sasl; import javax.security.sasl.SaslException; import javax.security.sasl.SaslServer; import org.apache.zookeeper.Login; import org.ietf.jgss.GSSContext; import org.ietf.jgss.GSSCredential; import org.ietf.jgss.GSSException; import org.ietf.jgss.GSSManager; import org.ietf.jgss.GSSName; import org.ietf.jgss.Oid; import org.slf4j.Logger; import org.slf4j.LoggerFactory; public class ZooKeeperSaslServer { public static final String LOGIN_CONTEXT_NAME_KEY = "zookeeper.sasl.serverconfig"; public static final String DEFAULT_LOGIN_CONTEXT_NAME = "Server"; private static final Logger LOG = LoggerFactory.getLogger(ZooKeeperSaslServer.class); private SaslServer saslServer; ZooKeeperSaslServer(final Login login) { saslServer = createSaslServer(login); } private SaslServer createSaslServer(final Login login) { synchronized (login) { Subject subject = login.getSubject(); if (subject != null) { // server is using a JAAS-authenticated subject: determine service principal name and hostname from zk server's subject. if (subject.getPrincipals().size() > 0) { try { final Object[] principals = subject.getPrincipals().toArray(); final Principal servicePrincipal = (Principal)principals[0]; // e.g. servicePrincipalNameAndHostname := "zookeeper/myhost.foo.com@FOO.COM" final String servicePrincipalNameAndHostname = servicePrincipal.getName(); int indexOf = servicePrincipalNameAndHostname.indexOf("/"); // e.g. serviceHostnameAndKerbDomain := "myhost.foo.com@FOO.COM" final String serviceHostnameAndKerbDomain = servicePrincipalNameAndHostname.substring(indexOf+1,servicePrincipalNameAndHostname.length()); int indexOfAt = serviceHostnameAndKerbDomain.indexOf("@"); // Handle Kerberos Service as well as User Principal Names final String servicePrincipalName, serviceHostname; if (indexOf > 0){ // e.g. servicePrincipalName := "zookeeper" servicePrincipalName = servicePrincipalNameAndHostname.substring(0, indexOf); // e.g. serviceHostname := "myhost.foo.com" serviceHostname = serviceHostnameAndKerbDomain.substring(0, indexOfAt); } else { servicePrincipalName = servicePrincipalNameAndHostname.substring(0, indexOfAt); serviceHostname = null; } final String mech = "GSSAPI"; // TODO: should depend on zoo.cfg specified mechs, but if subject is non-null, it can be assumed to be GSSAPI. LOG.debug("serviceHostname is '"+ serviceHostname + "'"); LOG.debug("servicePrincipalName is '"+ servicePrincipalName + "'"); LOG.debug("SASL mechanism(mech) is '"+ mech +"'"); boolean usingNativeJgss = Boolean.getBoolean("sun.security.jgss.native"); if (usingNativeJgss) { // http://docs.oracle.com/javase/6/docs/technotes/guides/security/jgss/jgss-features.html // """ // In addition, when performing operations as a particular // Subject, e.g. Subject.doAs(...) or // Subject.doAsPrivileged(...), the to-be-used // GSSCredential should be added to Subject's // private credential set. Otherwise, the GSS operations // will fail since no credential is found. // """ try { GSSManager manager = GSSManager.getInstance(); Oid krb5Mechanism = new Oid("1.2.840.113554.1.2.2"); GSSName gssName = manager.createName( servicePrincipalName + "@" + serviceHostname, GSSName.NT_HOSTBASED_SERVICE); GSSCredential cred = manager.createCredential(gssName, GSSContext.DEFAULT_LIFETIME, krb5Mechanism, GSSCredential.ACCEPT_ONLY); subject.getPrivateCredentials().add(cred); if (LOG.isDebugEnabled()) { LOG.debug("Added private credential to subject: " + cred); } } catch (GSSException ex) { LOG.warn("Cannot add private credential to subject; " + "clients authentication may fail", ex); } } try { return Subject.doAs(subject,new PrivilegedExceptionAction<SaslServer>() { public SaslServer run() { try { SaslServer saslServer; saslServer = Sasl.createSaslServer(mech, servicePrincipalName, serviceHostname, null, login.callbackHandler); return saslServer; } catch (SaslException e) { LOG.error("Zookeeper Server failed to create a SaslServer to interact with a client during session initiation: " + e); e.printStackTrace(); return null; } } } ); } catch (PrivilegedActionException e) { // TODO: exit server at this point(?) LOG.error("Zookeeper Quorum member experienced a PrivilegedActionException exception while creating a SaslServer using a JAAS principal context:" + e); e.printStackTrace(); } } catch (IndexOutOfBoundsException e) { LOG.error("server principal name/hostname determination error: ", e); } } else { // JAAS non-GSSAPI authentication: assuming and supporting only DIGEST-MD5 mechanism for now. // TODO: use 'authMech=' value in zoo.cfg. try { SaslServer saslServer = Sasl.createSaslServer("DIGEST-MD5","zookeeper","zk-sasl-md5",null, login.callbackHandler); return saslServer; } catch (SaslException e) { LOG.error("Zookeeper Quorum member failed to create a SaslServer to interact with a client during session initiation", e); } } } } LOG.error("failed to create saslServer object."); return null; } public byte[] evaluateResponse(byte[] response) throws SaslException { return saslServer.evaluateResponse(response); } public boolean isComplete() { return saslServer.isComplete(); } public String getAuthorizationID() { return saslServer.getAuthorizationID(); } }