|
1 /* |
|
2 * Copyright (c) 2003, 2018, Oracle and/or its affiliates. All rights reserved. |
|
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
4 * |
|
5 * This code is free software; you can redistribute it and/or modify it |
|
6 * under the terms of the GNU General Public License version 2 only, as |
|
7 * published by the Free Software Foundation. Oracle designates this |
|
8 * particular file as subject to the "Classpath" exception as provided |
|
9 * by Oracle in the LICENSE file that accompanied this code. |
|
10 * |
|
11 * This code is distributed in the hope that it will be useful, but WITHOUT |
|
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
14 * version 2 for more details (a copy is included in the LICENSE file that |
|
15 * accompanied this code). |
|
16 * |
|
17 * You should have received a copy of the GNU General Public License version |
|
18 * 2 along with this work; if not, write to the Free Software Foundation, |
|
19 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
20 * |
|
21 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
22 * or visit www.oracle.com if you need additional information or have any |
|
23 * questions. |
|
24 */ |
|
25 |
|
26 package sun.security.ssl; |
|
27 |
|
28 import java.io.IOException; |
|
29 import java.nio.ByteBuffer; |
|
30 import java.text.MessageFormat; |
|
31 import java.util.Locale; |
|
32 import javax.net.ssl.*; |
|
33 |
|
34 /** |
|
35 * SSL/(D)TLS Alter description |
|
36 */ |
|
37 enum Alert { |
|
38 // Please refer to TLS Alert Registry for the latest (D)TLS Alert values: |
|
39 // https://www.iana.org/assignments/tls-parameters/ |
|
40 CLOSE_NOTIFY ((byte)0, "close_notify", false), |
|
41 UNEXPECTED_MESSAGE ((byte)10, "unexpected_message", false), |
|
42 BAD_RECORD_MAC ((byte)20, "bad_record_mac", false), |
|
43 DECRYPTION_FAILED ((byte)21, "decryption_failed", false), |
|
44 RECORD_OVERFLOW ((byte)22, "record_overflow", false), |
|
45 DECOMPRESSION_FAILURE ((byte)30, "decompression_failure", false), |
|
46 HANDSHAKE_FAILURE ((byte)40, "handshake_failure", true), |
|
47 NO_CERTIFICATE ((byte)41, "no_certificate", true), |
|
48 BAD_CERTIFICATE ((byte)42, "bad_certificate", true), |
|
49 UNSUPPORTED_CERTIFCATE ((byte)43, "unsupported_certificate", true), |
|
50 CERTIFICATE_REVOKED ((byte)44, "certificate_revoked", true), |
|
51 CERTIFICATE_EXPIRED ((byte)45, "certificate_expired", true), |
|
52 CERTIFICATE_UNKNOWN ((byte)46, "certificate_unknown", true), |
|
53 ILLEGAL_PARAMETER ((byte)47, "illegal_parameter", true), |
|
54 UNKNOWN_CA ((byte)48, "unknown_ca", true), |
|
55 ACCESS_DENIED ((byte)49, "access_denied", true), |
|
56 DECODE_ERROR ((byte)50, "decode_error", true), |
|
57 DECRYPT_ERROR ((byte)51, "decrypt_error", true), |
|
58 EXPORT_RESTRICTION ((byte)60, "export_restriction", true), |
|
59 PROTOCOL_VERSION ((byte)70, "protocol_version", true), |
|
60 INSUFFICIENT_SECURITY ((byte)71, "insufficient_security", true), |
|
61 INTERNAL_ERROR ((byte)80, "internal_error", false), |
|
62 INAPPROPRIATE_FALLBACK ((byte)86, "inappropriate_fallback", false), |
|
63 USER_CANCELED ((byte)90, "user_canceled", false), |
|
64 NO_RENEGOTIATION ((byte)100, "no_renegotiation", true), |
|
65 MISSING_EXTENSION ((byte)109, "missing_extension", true), |
|
66 UNSUPPORTED_EXTENSION ((byte)110, "unsupported_extension", true), |
|
67 CERT_UNOBTAINABLE ((byte)111, "certificate_unobtainable", true), |
|
68 UNRECOGNIZED_NAME ((byte)112, "unrecognized_name", true), |
|
69 BAD_CERT_STATUS_RESPONSE((byte)113, |
|
70 "bad_certificate_status_response", true), |
|
71 BAD_CERT_HASH_VALUE ((byte)114, "bad_certificate_hash_value", true), |
|
72 UNKNOWN_PSK_IDENTITY ((byte)115, "unknown_psk_identity", true), |
|
73 CERTIFICATE_REQUIRED ((byte)116, "certificate_required", true), |
|
74 NO_APPLICATION_PROTOCOL ((byte)120, "no_application_protocol", true); |
|
75 |
|
76 // ordinal value of the Alert |
|
77 final byte id; |
|
78 |
|
79 // description of the Alert |
|
80 final String description; |
|
81 |
|
82 // Does tha alert happen during handshake only? |
|
83 final boolean handshakeOnly; |
|
84 |
|
85 // Alert message consumer |
|
86 static final SSLConsumer alertConsumer = new AlertConsumer(); |
|
87 |
|
88 private Alert(byte id, String description, boolean handshakeOnly) { |
|
89 this.id = id; |
|
90 this.description = description; |
|
91 this.handshakeOnly = handshakeOnly; |
|
92 } |
|
93 |
|
94 static Alert valueOf(byte id) { |
|
95 for (Alert al : Alert.values()) { |
|
96 if (al.id == id) { |
|
97 return al; |
|
98 } |
|
99 } |
|
100 |
|
101 return null; |
|
102 } |
|
103 |
|
104 static String nameOf(byte id) { |
|
105 for (Alert al : Alert.values()) { |
|
106 if (al.id == id) { |
|
107 return al.description; |
|
108 } |
|
109 } |
|
110 |
|
111 return "UNKNOWN ALERT (" + (id & 0x0FF) + ")"; |
|
112 } |
|
113 |
|
114 SSLException createSSLException(String reason) { |
|
115 return createSSLException(reason, null); |
|
116 } |
|
117 |
|
118 SSLException createSSLException(String reason, Throwable cause) { |
|
119 if (reason == null) { |
|
120 reason = (cause != null) ? cause.getMessage() : ""; |
|
121 } |
|
122 |
|
123 SSLException ssle = handshakeOnly ? |
|
124 new SSLHandshakeException(reason) : new SSLException(reason); |
|
125 if (cause != null) { |
|
126 ssle.initCause(cause); |
|
127 } |
|
128 |
|
129 return ssle; |
|
130 } |
|
131 |
|
132 /** |
|
133 * SSL/(D)TLS Alert level. |
|
134 */ |
|
135 enum Level { |
|
136 WARNING ((byte)1, "warning"), |
|
137 FATAL ((byte)2, "fatal"); |
|
138 |
|
139 // ordinal value of the Alert level |
|
140 final byte level; |
|
141 |
|
142 // description of the Alert level |
|
143 final String description; |
|
144 |
|
145 private Level(byte level, String description) { |
|
146 this.level = level; |
|
147 this.description = description; |
|
148 } |
|
149 |
|
150 static Level valueOf(byte level) { |
|
151 for (Level lv : Level.values()) { |
|
152 if (lv.level == level) { |
|
153 return lv; |
|
154 } |
|
155 } |
|
156 |
|
157 return null; |
|
158 } |
|
159 |
|
160 static String nameOf(byte level) { |
|
161 for (Level lv : Level.values()) { |
|
162 if (lv.level == level) { |
|
163 return lv.description; |
|
164 } |
|
165 } |
|
166 |
|
167 return "UNKNOWN ALERT LEVEL (" + (level & 0x0FF) + ")"; |
|
168 } |
|
169 } |
|
170 |
|
171 /** |
|
172 * The Alert message. |
|
173 */ |
|
174 private static final class AlertMessage { |
|
175 private final byte level; // level |
|
176 private final byte id; // description |
|
177 |
|
178 AlertMessage(TransportContext context, |
|
179 ByteBuffer m) throws IOException { |
|
180 // struct { |
|
181 // AlertLevel level; |
|
182 // AlertDescription description; |
|
183 // } Alert; |
|
184 if (m.remaining() != 2) { |
|
185 context.fatal(Alert.ILLEGAL_PARAMETER, |
|
186 "Invalid Alert message: no sufficient data"); |
|
187 } |
|
188 |
|
189 this.level = m.get(); // level |
|
190 this.id = m.get(); // description |
|
191 } |
|
192 |
|
193 @Override |
|
194 public String toString() { |
|
195 MessageFormat messageFormat = new MessageFormat( |
|
196 "\"Alert\": '{'\n" + |
|
197 " \"level\" : \"{0}\",\n" + |
|
198 " \"description\": \"{1}\"\n" + |
|
199 "'}'", |
|
200 Locale.ENGLISH); |
|
201 |
|
202 Object[] messageFields = { |
|
203 Level.nameOf(level), |
|
204 Alert.nameOf(id) |
|
205 }; |
|
206 |
|
207 return messageFormat.format(messageFields); |
|
208 } |
|
209 } |
|
210 |
|
211 /** |
|
212 * Consumer of alert messages |
|
213 */ |
|
214 private static final class AlertConsumer implements SSLConsumer { |
|
215 // Prevent instantiation of this class. |
|
216 private AlertConsumer() { |
|
217 // blank |
|
218 } |
|
219 |
|
220 @Override |
|
221 public void consume(ConnectionContext context, |
|
222 ByteBuffer m) throws IOException { |
|
223 TransportContext tc = (TransportContext)context; |
|
224 |
|
225 AlertMessage am = new AlertMessage(tc, m); |
|
226 if (SSLLogger.isOn && SSLLogger.isOn("ssl")) { |
|
227 SSLLogger.fine("Received alert message", am); |
|
228 } |
|
229 |
|
230 Level level = Level.valueOf(am.level); |
|
231 Alert alert = Alert.valueOf(am.id); |
|
232 if (alert == Alert.CLOSE_NOTIFY) { |
|
233 if (tc.handshakeContext != null) { |
|
234 tc.fatal(Alert.UNEXPECTED_MESSAGE, |
|
235 "Received close_notify during handshake"); |
|
236 } |
|
237 |
|
238 tc.isInputCloseNotified = true; |
|
239 tc.closeInbound(); |
|
240 } else if ((level == Level.WARNING) && (alert != null)) { |
|
241 // Terminate the connection if an alert with a level of warning |
|
242 // is received during handshaking, except the no_certificate |
|
243 // warning. |
|
244 if (alert.handshakeOnly && (tc.handshakeContext != null)) { |
|
245 // It's OK to get a no_certificate alert from a client of |
|
246 // which we requested client authentication. However, |
|
247 // if we required it, then this is not acceptable. |
|
248 if (tc.sslConfig.isClientMode || |
|
249 alert != Alert.NO_CERTIFICATE || |
|
250 (tc.sslConfig.clientAuthType != |
|
251 ClientAuthType.CLIENT_AUTH_REQUESTED)) { |
|
252 tc.fatal(Alert.HANDSHAKE_FAILURE, |
|
253 "received handshake warning: " + alert.description); |
|
254 } // Otherwise, ignore the warning |
|
255 } // Otherwise, ignore the warning. |
|
256 } else { // fatal or unknown |
|
257 String diagnostic; |
|
258 if (alert == null) { |
|
259 alert = Alert.UNEXPECTED_MESSAGE; |
|
260 diagnostic = "Unknown alert description (" + am.id + ")"; |
|
261 } else { |
|
262 diagnostic = "Received fatal alert: " + alert.description; |
|
263 } |
|
264 |
|
265 tc.fatal(alert, diagnostic, true, null); |
|
266 } |
|
267 } |
|
268 } |
|
269 } |