/vt-ldap/tags/vt-ldap-3.2/src/main/java/edu/vt/middleware/ldap/LdapTLSSocketFactory.java

http://vt-middleware.googlecode.com/ · Java · 683 lines · 314 code · 89 blank · 280 comment · 38 complexity · f8d4a2c85cd88e4db97873b64e88471c MD5 · raw file

  1. /*
  2. $Id: LdapTLSSocketFactory.java 930 2009-10-26 20:44:26Z dfisher $
  3. Copyright (C) 2003-2009 Virginia Tech.
  4. All rights reserved.
  5. SEE LICENSE FOR MORE INFORMATION
  6. Author: Middleware Services
  7. Email: middleware@vt.edu
  8. Version: $Revision: 930 $
  9. Updated: $Date: 2009-10-26 21:44:26 +0100 (Mon, 26 Oct 2009) $
  10. */
  11. package edu.vt.middleware.ldap;
  12. import java.io.File;
  13. import java.io.FileInputStream;
  14. import java.io.IOException;
  15. import java.io.InputStream;
  16. import java.net.InetAddress;
  17. import java.net.Socket;
  18. import java.net.URI;
  19. import java.security.GeneralSecurityException;
  20. import java.security.KeyStore;
  21. import javax.net.SocketFactory;
  22. import javax.net.ssl.KeyManager;
  23. import javax.net.ssl.KeyManagerFactory;
  24. import javax.net.ssl.SSLContext;
  25. import javax.net.ssl.SSLSocketFactory;
  26. import javax.net.ssl.TrustManager;
  27. import javax.net.ssl.TrustManagerFactory;
  28. import org.apache.commons.logging.Log;
  29. import org.apache.commons.logging.LogFactory;
  30. /**
  31. * <code>TLSSocketFactory</code> is an extension of SSLSocketFactory. It was
  32. * written to allow easy use of keystores and truststores. Note that {@link
  33. * #initialize()} must be called prior to using this socket factory. This means
  34. * that this class cannot be passed to implementations that expect the socket
  35. * factory to function immediately after construction.
  36. *
  37. * @author Middleware Services
  38. * @version $Revision: 930 $ $Date: 2009-10-26 21:44:26 +0100 (Mon, 26 Oct 2009) $
  39. */
  40. public class LdapTLSSocketFactory extends SSLSocketFactory
  41. {
  42. /** Default SSL protocol, value is {@value}. */
  43. public static final String DEFAULT_PROTOCOL = "TLS";
  44. /** Default truststore name, value is {@value}. */
  45. public static final String DEFAULT_TRUSTSTORE_NAME = "/vt-ldap.truststore";
  46. /** Default truststore password, value is {@value}. */
  47. public static final String DEFAULT_TRUSTSTORE_PASSWORD = "changeit";
  48. /** Default truststore type, value is {@value}. */
  49. public static final String DEFAULT_TRUSTSTORE_TYPE = "JKS";
  50. /** Default keystore name, value is {@value}. */
  51. public static final String DEFAULT_KEYSTORE_NAME = "/vt-ldap.keystore";
  52. /** Default keystore password, value is {@value}. */
  53. public static final String DEFAULT_KEYSTORE_PASSWORD = "changeit";
  54. /** Default keystore type, value is {@value}. */
  55. public static final String DEFAULT_KEYSTORE_TYPE = "JKS";
  56. /** Types of paths. */
  57. public enum PathType {
  58. /** File path location. */
  59. FILEPATH,
  60. /** Classpath location. */
  61. CLASSPATH
  62. }
  63. /** SSLSocketFactory used for creating SSL sockets. */
  64. protected SSLSocketFactory factory;
  65. /** Name of the truststore to use for the SSL connection. */
  66. private String trustStoreName = DEFAULT_TRUSTSTORE_NAME;
  67. /** Password needed to open the truststore. */
  68. private String trustStorePassword = DEFAULT_TRUSTSTORE_PASSWORD;
  69. /** Truststore path type. */
  70. private PathType trustStorePathType = PathType.CLASSPATH;
  71. /** Truststore type. */
  72. private String trustStoreType = DEFAULT_TRUSTSTORE_TYPE;
  73. /** Name of the keystore to use for the SSL connection. */
  74. private String keyStoreName = DEFAULT_KEYSTORE_NAME;
  75. /** Password needed to open the keystore. */
  76. private String keyStorePassword = DEFAULT_KEYSTORE_PASSWORD;
  77. /** Keystore path type. */
  78. private PathType keyStorePathType = PathType.CLASSPATH;
  79. /** Keystore type. */
  80. private String keyStoreType = DEFAULT_KEYSTORE_TYPE;
  81. /** Default constructor. */
  82. public LdapTLSSocketFactory() {}
  83. /**
  84. * Creates the underlying SSLContext using truststore and keystore attributes
  85. * and makes this factory ready for use. Must be called before factory can be
  86. * used.
  87. *
  88. * @throws IOException if the keystore cannot be loaded
  89. * @throws GeneralSecurityException if the SSLContext cannot be created
  90. */
  91. public void initialize()
  92. throws IOException, GeneralSecurityException
  93. {
  94. final SSLContext ctx = SSLContext.getInstance(DEFAULT_PROTOCOL);
  95. final TrustManager[] tm = this.initTrustManager(
  96. this.getTrustStoreStream(),
  97. this.getTrustStorePassword(),
  98. this.getTrustStoreType());
  99. final KeyManager[] km = this.initKeyManager(
  100. this.getKeyStoreStream(),
  101. this.getKeyStorePassword(),
  102. this.getKeyStoreType());
  103. ctx.init(km, tm, null);
  104. this.factory = ctx.getSocketFactory();
  105. }
  106. /**
  107. * This attempts to load the TrustManagers from the supplied <code>
  108. * InputStream</code> using the supplied password.
  109. *
  110. * @param is <code>InputStream</code> containing the truststore
  111. * @param password <code>String</code> to unlock the truststore
  112. * @param storeType <code>String</code> of truststore
  113. *
  114. * @return <code>TrustManager[]</code>
  115. *
  116. * @throws IOException if the keystore cannot be loaded
  117. * @throws GeneralSecurityException if an errors occurs while loading the
  118. * TrustManagers
  119. */
  120. private TrustManager[] initTrustManager(
  121. final InputStream is,
  122. final String password,
  123. final String storeType)
  124. throws IOException, GeneralSecurityException
  125. {
  126. TrustManager[] tm = null;
  127. if (is != null) {
  128. final TrustManagerFactory tmf = TrustManagerFactory.getInstance(
  129. TrustManagerFactory.getDefaultAlgorithm());
  130. tmf.init(this.loadKeyStore(is, password, storeType));
  131. tm = tmf.getTrustManagers();
  132. }
  133. return tm;
  134. }
  135. /**
  136. * This attempts to load the KeyManagers from the supplied <code>
  137. * InputStream</code> using the supplied password.
  138. *
  139. * @param is <code>InputStream</code> containing the keystore
  140. * @param password <code>String</code> to unlock the keystore
  141. * @param storeType <code>String</code> of keystore
  142. *
  143. * @return <code>KeyManager[]</code>
  144. *
  145. * @throws IOException if the keystore cannot be loaded
  146. * @throws GeneralSecurityException if an errors occurs while loading the
  147. * KeyManagers
  148. */
  149. private KeyManager[] initKeyManager(
  150. final InputStream is,
  151. final String password,
  152. final String storeType)
  153. throws IOException, GeneralSecurityException
  154. {
  155. KeyManager[] km = null;
  156. if (is != null) {
  157. final KeyManagerFactory kmf = KeyManagerFactory.getInstance(
  158. KeyManagerFactory.getDefaultAlgorithm());
  159. kmf.init(
  160. this.loadKeyStore(is, password, storeType),
  161. password != null ? password.toCharArray() : null);
  162. km = kmf.getKeyManagers();
  163. }
  164. return km;
  165. }
  166. /**
  167. * This returns the name of the truststore to use.
  168. *
  169. * @return <code>String</code> truststore name
  170. */
  171. public String getTrustStoreName()
  172. {
  173. return this.trustStoreName;
  174. }
  175. /**
  176. * This sets the name of the truststore to use.
  177. *
  178. * @param s <code>String</code> truststore name
  179. */
  180. public void setTrustStoreName(final String s)
  181. {
  182. this.trustStoreName = s;
  183. }
  184. /**
  185. * This gets the path type of the truststore.
  186. *
  187. * @return <code>PathType</code> truststore path type
  188. */
  189. public PathType getTrustStorePathType()
  190. {
  191. return this.trustStorePathType;
  192. }
  193. /**
  194. * This sets the path type of the truststore.
  195. *
  196. * @param pt <code>PathType</code> truststore path type
  197. */
  198. public void setTrustStorePathType(final PathType pt)
  199. {
  200. this.trustStorePathType = pt;
  201. }
  202. /**
  203. * This returns the truststore as an <code>InputStream</code>. If the
  204. * truststore could not be loaded this method returns null.
  205. *
  206. * @return <code>InputStream</code> truststore
  207. */
  208. protected InputStream getTrustStoreStream()
  209. {
  210. return this.getInputStream(this.trustStoreName, this.trustStorePathType);
  211. }
  212. /**
  213. * This returns the password for the truststore.
  214. *
  215. * @return <code>String</code> truststore password
  216. */
  217. public String getTrustStorePassword()
  218. {
  219. return this.trustStorePassword;
  220. }
  221. /**
  222. * This sets the password for the truststore.
  223. *
  224. * @param s <code>String</code> truststore password
  225. */
  226. public void setTrustStorePassword(final String s)
  227. {
  228. this.trustStorePassword = s;
  229. }
  230. /**
  231. * This returns the type of the truststore.
  232. *
  233. * @return <code>String</code> truststore type
  234. */
  235. public String getTrustStoreType()
  236. {
  237. return this.trustStoreType;
  238. }
  239. /**
  240. * This sets the type of the truststore.
  241. *
  242. * @param s <code>String</code> truststore type
  243. */
  244. public void setTrustStoreType(final String s)
  245. {
  246. this.trustStoreType = s;
  247. }
  248. /**
  249. * This returns the name of the keystore to use.
  250. *
  251. * @return <code>String</code> keystore name
  252. */
  253. public String getKeyStoreName()
  254. {
  255. return this.keyStoreName;
  256. }
  257. /**
  258. * This sets the name of the keystore to use.
  259. *
  260. * @param s <code>String</code> keystore name
  261. */
  262. public void setKeyStoreName(final String s)
  263. {
  264. this.keyStoreName = s;
  265. }
  266. /**
  267. * This gets the path type of the keystore.
  268. *
  269. * @return <code>PathType</code> keystore path type
  270. */
  271. public PathType getKeyStorePathType()
  272. {
  273. return this.keyStorePathType;
  274. }
  275. /**
  276. * This sets the path type of the keystore.
  277. *
  278. * @param pt <code>PathType</code> keystore path type
  279. */
  280. public void setKeyStorePathType(final PathType pt)
  281. {
  282. this.keyStorePathType = pt;
  283. }
  284. /**
  285. * This returns the keystore as an <code>InputStream</code>. If the keystore
  286. * could not be loaded this method returns null.
  287. *
  288. * @return <code>InputStream</code> keystore
  289. */
  290. protected InputStream getKeyStoreStream()
  291. {
  292. return this.getInputStream(this.keyStoreName, this.keyStorePathType);
  293. }
  294. /**
  295. * This returns the password for the keystore.
  296. *
  297. * @return <code>String</code> keystore password
  298. */
  299. public String getKeyStorePassword()
  300. {
  301. return this.keyStorePassword;
  302. }
  303. /**
  304. * This sets the password for the keystore.
  305. *
  306. * @param s <code>String</code> keystore password
  307. */
  308. public void setKeyStorePassword(final String s)
  309. {
  310. this.keyStorePassword = s;
  311. }
  312. /**
  313. * This returns the type of the keystore.
  314. *
  315. * @return <code>String</code> keystore type
  316. */
  317. public String getKeyStoreType()
  318. {
  319. return this.keyStoreType;
  320. }
  321. /**
  322. * This sets the type of the keystore.
  323. *
  324. * @param s <code>String</code> keystore type
  325. */
  326. public void setKeyStoreType(final String s)
  327. {
  328. this.keyStoreType = s;
  329. }
  330. /**
  331. * This returns the underlying <code>SSLSocketFactory</code> that this class
  332. * uses for creating SSL Sockets.
  333. *
  334. * @return <code>SSLSocketFactory</code>
  335. */
  336. public SSLSocketFactory getFactory()
  337. {
  338. return this.factory;
  339. }
  340. /**
  341. * This returns the default SSL socket factory.
  342. *
  343. * @return <code>SocketFactory</code>
  344. */
  345. public static SocketFactory getDefault()
  346. {
  347. final LdapTLSSocketFactory sf = new LdapTLSSocketFactory();
  348. try {
  349. sf.initialize();
  350. } catch (IOException e) {
  351. final Log logger = LogFactory.getLog(LdapTLSSocketFactory.class);
  352. if (logger.isErrorEnabled()) {
  353. logger.error("Error loading keystore", e);
  354. }
  355. } catch (GeneralSecurityException e) {
  356. final Log logger = LogFactory.getLog(LdapTLSSocketFactory.class);
  357. if (logger.isErrorEnabled()) {
  358. logger.error("Error initializing socket factory", e);
  359. }
  360. }
  361. return sf;
  362. }
  363. /**
  364. * This returns a socket layered over an existing socket connected to the
  365. * named host, at the given port.
  366. *
  367. * @param s <code>Socket</code> existing socket
  368. * @param host <code>String</code> server hostname
  369. * @param port <code>int</code> server port
  370. * @param autoClose <code>boolean</code> close the underlying socket when
  371. * this socket is closed
  372. *
  373. * @return <code>Socket</code> - connected to the specified host and port
  374. *
  375. * @throws IOException if an I/O error occurs when creating the socket
  376. */
  377. public Socket createSocket(
  378. final Socket s,
  379. final String host,
  380. final int port,
  381. final boolean autoClose)
  382. throws IOException
  383. {
  384. Socket socket = null;
  385. if (this.factory != null) {
  386. socket = this.factory.createSocket(s, host, port, autoClose);
  387. }
  388. return socket;
  389. }
  390. /**
  391. * This creates a socket and connects it to the specified port number at the
  392. * specified addres.
  393. *
  394. * @param host <code>InetAddress</code> server hostname
  395. * @param port <code>int</code> server port
  396. *
  397. * @return <code>Socket</code> - connected to the specified host and port
  398. *
  399. * @throws IOException if an I/O error occurs when creating the socket
  400. */
  401. public Socket createSocket(final InetAddress host, final int port)
  402. throws IOException
  403. {
  404. Socket socket = null;
  405. if (this.factory != null) {
  406. socket = this.factory.createSocket(host, port);
  407. }
  408. return socket;
  409. }
  410. /**
  411. * This creates a socket and connect it to the specified port number at the
  412. * specified address. The socket will also be bound to the supplied local
  413. * address and port.
  414. *
  415. * @param address <code>InetAddress</code> server hostname
  416. * @param port <code>int</code> server port
  417. * @param localAddress <code>InetAddress</code> client hostname
  418. * @param localPort <code>int</code> client port
  419. *
  420. * @return <code>Socket</code> - connected to the specified host and port
  421. *
  422. * @throws IOException if an I/O error occurs when creating the socket
  423. */
  424. public Socket createSocket(
  425. final InetAddress address,
  426. final int port,
  427. final InetAddress localAddress,
  428. final int localPort)
  429. throws IOException
  430. {
  431. Socket socket = null;
  432. if (this.factory != null) {
  433. socket = this.factory.createSocket(
  434. address,
  435. port,
  436. localAddress,
  437. localPort);
  438. }
  439. return socket;
  440. }
  441. /**
  442. * This creates a socket and connects it to the specified port number at the
  443. * specified addres.
  444. *
  445. * @param host <code>String</code> server hostname
  446. * @param port <code>int</code> server port
  447. *
  448. * @return <code>Socket</code> - connected to the specified host and port
  449. *
  450. * @throws IOException if an I/O error occurs when creating the socket
  451. */
  452. public Socket createSocket(final String host, final int port)
  453. throws IOException
  454. {
  455. Socket socket = null;
  456. if (this.factory != null) {
  457. socket = this.factory.createSocket(host, port);
  458. }
  459. return socket;
  460. }
  461. /**
  462. * This creates a socket and connect it to the specified port number at the
  463. * specified address. The socket will also be bound to the supplied local
  464. * address and port.
  465. *
  466. * @param host <code>String</code> server hostname
  467. * @param port <code>int</code> server port
  468. * @param localHost <code>InetAddress</code> client hostname
  469. * @param localPort <code>int</code> client port
  470. *
  471. * @return <code>Socket</code> - connected to the specified host and port
  472. *
  473. * @throws IOException if an I/O error occurs when creating the socket
  474. */
  475. public Socket createSocket(
  476. final String host,
  477. final int port,
  478. final InetAddress localHost,
  479. final int localPort)
  480. throws IOException
  481. {
  482. Socket socket = null;
  483. if (this.factory != null) {
  484. socket = this.factory.createSocket(host, port, localHost, localPort);
  485. }
  486. return socket;
  487. }
  488. /**
  489. * This returns the list of cipher suites which are enabled by default.
  490. *
  491. * @return <code>String[]</code> - array of the cipher suites
  492. */
  493. public String[] getDefaultCipherSuites()
  494. {
  495. String[] ciphers = null;
  496. if (this.factory != null) {
  497. ciphers = this.factory.getDefaultCipherSuites();
  498. }
  499. return ciphers;
  500. }
  501. /**
  502. * This returns the names of the cipher suites which could be enabled for use
  503. * on an SSL connection.
  504. *
  505. * @return <code>String[]</code> - array of the cipher suites
  506. */
  507. public String[] getSupportedCipherSuites()
  508. {
  509. String[] ciphers = null;
  510. if (this.factory != null) {
  511. ciphers = this.factory.getSupportedCipherSuites();
  512. }
  513. return ciphers;
  514. }
  515. /**
  516. * This returns a keystore as an <code>InputStream</code>. If the keystore
  517. * could not be loaded this method returns null.
  518. *
  519. * @param filename <code>String</code> to read
  520. * @param pt <code>PathType</code> how to read file
  521. *
  522. * @return <code>InputStream</code> keystore
  523. */
  524. private InputStream getInputStream(final String filename, final PathType pt)
  525. {
  526. final Log logger = LogFactory.getLog(LdapTLSSocketFactory.class);
  527. InputStream is = null;
  528. if (pt == PathType.CLASSPATH) {
  529. is = LdapTLSSocketFactory.class.getResourceAsStream(filename);
  530. } else if (pt == PathType.FILEPATH) {
  531. File file;
  532. try {
  533. file = new File(URI.create(filename));
  534. } catch (IllegalArgumentException e) {
  535. file = new File(filename);
  536. }
  537. try {
  538. is = new FileInputStream(file);
  539. } catch (IOException e) {
  540. if (logger.isWarnEnabled()) {
  541. logger.warn("Error loading keystore from " + filename, e);
  542. }
  543. }
  544. }
  545. if (is != null) {
  546. if (logger.isDebugEnabled()) {
  547. logger.debug("Successfully loaded " + filename + " from " + pt);
  548. }
  549. } else {
  550. if (logger.isDebugEnabled()) {
  551. logger.debug("Failed to load " + filename + " from " + pt);
  552. }
  553. }
  554. return is;
  555. }
  556. /**
  557. * This attempts to load a keystore from the supplied <code>InputStream</code>
  558. * using the supplied password.
  559. *
  560. * @param is <code>InputStream</code> containing the keystore
  561. * @param password <code>String</code> to unlock the keystore
  562. * @param storeType <code>String</code> of keystore
  563. *
  564. * @return <code>KeyStore</code>
  565. *
  566. * @throws IOException if the keystore cannot be loaded
  567. * @throws GeneralSecurityException if an errors occurs while loading the
  568. * KeyManagers
  569. */
  570. private KeyStore loadKeyStore(
  571. final InputStream is,
  572. final String password,
  573. final String storeType)
  574. throws IOException, GeneralSecurityException
  575. {
  576. KeyStore keystore = null;
  577. if (is != null) {
  578. String type = storeType;
  579. if (type == null) {
  580. type = KeyStore.getDefaultType();
  581. }
  582. keystore = KeyStore.getInstance(type);
  583. char[] pw = null;
  584. if (password != null) {
  585. pw = password.toCharArray();
  586. }
  587. keystore.load(is, pw);
  588. }
  589. return keystore;
  590. }
  591. }