Java tutorial
// ======================================================================== // $Id: ClientCertAuthenticator.java,v 1.15 2006/02/28 12:45:01 gregwilkins Exp $ // Copyright 2002-2004 Mort Bay Consulting Pty. Ltd. // ------------------------------------------------------------------------ // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // http://www.apache.org/licenses/LICENSE-2.0 // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // ======================================================================== package net.lightbody.bmp.proxy.jetty.http; import net.lightbody.bmp.proxy.jetty.log.LogFactory; import org.apache.commons.logging.Log; import javax.net.ssl.SSLSocket; import java.io.IOException; import java.security.Principal; /* ------------------------------------------------------------ */ /** Client Certificate Authenticator. * This Authenticator uses a client certificate to authenticate the user. * Each client certificate supplied is tried against the realm using the * Principal name as the username and a string representation of the * certificate as the credential. * @version $Id: ClientCertAuthenticator.java,v 1.15 2006/02/28 12:45:01 gregwilkins Exp $ * @author Greg Wilkins (gregw) */ public class ClientCertAuthenticator implements Authenticator { private static Log log = LogFactory.getLog(ClientCertAuthenticator.class); private int _maxHandShakeSeconds = 60; /* ------------------------------------------------------------ */ public ClientCertAuthenticator() { log.warn("Client Cert Authentication is EXPERIMENTAL"); } /* ------------------------------------------------------------ */ public int getMaxHandShakeSeconds() { return _maxHandShakeSeconds; } /* ------------------------------------------------------------ */ /** * @param maxHandShakeSeconds Maximum time to wait for SSL handshake if * Client certification is required. */ public void setMaxHandShakeSeconds(int maxHandShakeSeconds) { _maxHandShakeSeconds = maxHandShakeSeconds; } /* ------------------------------------------------------------ */ /** * @return UserPrinciple if authenticated or null if not. If * Authentication fails, then the authenticator may have committed * the response as an auth challenge or redirect. * @exception IOException */ public Principal authenticate(UserRealm realm, String pathInContext, HttpRequest request, HttpResponse response) throws IOException { java.security.cert.X509Certificate[] certs = (java.security.cert.X509Certificate[]) request .getAttribute("javax.servlet.request.X509Certificate"); if (response != null && (certs == null || certs.length == 0 || certs[0] == null)) { // No certs available so lets try and force the issue // Get the SSLSocket Object s = HttpConnection.getHttpConnection().getConnection(); if (!(s instanceof SSLSocket)) return null; SSLSocket socket = (SSLSocket) s; if (!socket.getNeedClientAuth()) { // Need to re-handshake socket.setNeedClientAuth(true); socket.startHandshake(); // Need to wait here - but not forever. The Handshake // Listener API does not look like a good option to // avoid waiting forever. So we will take a slightly // busy timelimited approach. For now: for (int i = (_maxHandShakeSeconds * 4); i-- > 0;) { certs = (java.security.cert.X509Certificate[]) request .getAttribute("javax.servlet.request.X509Certificate"); if (certs != null && certs.length > 0 && certs[0] != null) break; try { Thread.sleep(250); } catch (Exception e) { break; } } } } if (certs == null || certs.length == 0 || certs[0] == null) return null; Principal principal = certs[0].getSubjectDN(); if (principal == null) principal = certs[0].getIssuerDN(); String username = principal == null ? "clientcert" : principal.getName(); Principal user = realm.authenticate(username, certs, request); request.setAuthType(SecurityConstraint.__CERT_AUTH); if (user != null) request.setAuthUser(user.getName()); request.setUserPrincipal(user); return user; } /* ------------------------------------------------------------ */ public String getAuthMethod() { return SecurityConstraint.__CERT_AUTH; } }