jdk/src/share/classes/sun/security/jgss/krb5/Krb5Util.java
author weijun
Tue, 11 Dec 2012 13:14:56 +0800
changeset 14769 22808af10edd
parent 14413 e954df027393
child 15006 10d6aacdd67f
permissions -rw-r--r--
8004488: wrong permissions checked in krb5 Reviewed-by: xuelei
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     1
/*
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
     2
 * Copyright (c) 2003, 2011, Oracle and/or its affiliates. All rights reserved.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
90ce3da70b43 Initial load
duke
parents:
diff changeset
     4
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
90ce3da70b43 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2942
diff changeset
     7
 * published by the Free Software Foundation.  Oracle designates this
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
     8
 * particular file as subject to the "Classpath" exception as provided
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2942
diff changeset
     9
 * by Oracle in the LICENSE file that accompanied this code.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    10
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    11
 * This code is distributed in the hope that it will be useful, but WITHOUT
90ce3da70b43 Initial load
duke
parents:
diff changeset
    12
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
90ce3da70b43 Initial load
duke
parents:
diff changeset
    13
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
90ce3da70b43 Initial load
duke
parents:
diff changeset
    14
 * version 2 for more details (a copy is included in the LICENSE file that
90ce3da70b43 Initial load
duke
parents:
diff changeset
    15
 * accompanied this code).
90ce3da70b43 Initial load
duke
parents:
diff changeset
    16
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    17
 * You should have received a copy of the GNU General Public License version
90ce3da70b43 Initial load
duke
parents:
diff changeset
    18
 * 2 along with this work; if not, write to the Free Software Foundation,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    19
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    20
 *
5506
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2942
diff changeset
    21
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2942
diff changeset
    22
 * or visit www.oracle.com if you need additional information or have any
202f599c92aa 6943119: Rebrand source copyright notices
ohair
parents: 2942
diff changeset
    23
 * questions.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    24
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    25
90ce3da70b43 Initial load
duke
parents:
diff changeset
    26
package sun.security.jgss.krb5;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    27
90ce3da70b43 Initial load
duke
parents:
diff changeset
    28
import javax.security.auth.kerberos.KerberosTicket;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    29
import javax.security.auth.kerberos.KerberosKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    30
import javax.security.auth.kerberos.KerberosPrincipal;
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
    31
import javax.security.auth.kerberos.KeyTab;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    32
import javax.security.auth.Subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    33
import javax.security.auth.login.LoginException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    34
import java.security.AccessControlContext;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    35
import sun.security.jgss.GSSUtil;
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2
diff changeset
    36
import sun.security.jgss.GSSCaller;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    37
90ce3da70b43 Initial load
duke
parents:
diff changeset
    38
import sun.security.krb5.Credentials;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    39
import sun.security.krb5.EncryptionKey;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    40
import sun.security.krb5.KrbException;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    41
import java.io.IOException;
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
    42
import java.util.ArrayList;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    43
import java.util.List;
10044
413c0f8ca341 7048466: Move sun.misc.JavaxSecurityAuthKerberosAccess to sun.security.krb5 package
weijun
parents: 9499
diff changeset
    44
import sun.security.krb5.KerberosSecrets;
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
    45
import sun.security.krb5.PrincipalName;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    46
/**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    47
 * Utilities for obtaining and converting Kerberos tickets.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    48
 *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    49
 */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    50
public class Krb5Util {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    51
90ce3da70b43 Initial load
duke
parents:
diff changeset
    52
    static final boolean DEBUG =
90ce3da70b43 Initial load
duke
parents:
diff changeset
    53
        java.security.AccessController.doPrivileged(
90ce3da70b43 Initial load
duke
parents:
diff changeset
    54
            new sun.security.action.GetBooleanAction
90ce3da70b43 Initial load
duke
parents:
diff changeset
    55
            ("sun.security.krb5.debug")).booleanValue();
90ce3da70b43 Initial load
duke
parents:
diff changeset
    56
90ce3da70b43 Initial load
duke
parents:
diff changeset
    57
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    58
     * Default constructor
90ce3da70b43 Initial load
duke
parents:
diff changeset
    59
     */
90ce3da70b43 Initial load
duke
parents:
diff changeset
    60
    private Krb5Util() {  // Cannot create one of these
90ce3da70b43 Initial load
duke
parents:
diff changeset
    61
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    62
90ce3da70b43 Initial load
duke
parents:
diff changeset
    63
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
    64
     * Retrieve the service ticket for serverPrincipal from caller's Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
    65
     * or from Subject obtained by logging in, or if not found, via the
90ce3da70b43 Initial load
duke
parents:
diff changeset
    66
     * Ticket Granting Service using the TGT obtained from the Subject.
90ce3da70b43 Initial load
duke
parents:
diff changeset
    67
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    68
     * Caller must have permission to:
90ce3da70b43 Initial load
duke
parents:
diff changeset
    69
     *    - access and update Subject's private credentials
90ce3da70b43 Initial load
duke
parents:
diff changeset
    70
     *    - create LoginContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
    71
     *    - read the auth.login.defaultCallbackHandler security property
90ce3da70b43 Initial load
duke
parents:
diff changeset
    72
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
    73
     * NOTE: This method is used by JSSE Kerberos Cipher Suites
90ce3da70b43 Initial load
duke
parents:
diff changeset
    74
     */
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2
diff changeset
    75
    public static KerberosTicket getTicketFromSubjectAndTgs(GSSCaller caller,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    76
        String clientPrincipal, String serverPrincipal, String tgsPrincipal,
90ce3da70b43 Initial load
duke
parents:
diff changeset
    77
        AccessControlContext acc)
90ce3da70b43 Initial load
duke
parents:
diff changeset
    78
        throws LoginException, KrbException, IOException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    79
90ce3da70b43 Initial load
duke
parents:
diff changeset
    80
        // 1. Try to find service ticket in acc subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
    81
        Subject accSubj = Subject.getSubject(acc);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
    82
        KerberosTicket ticket = SubjectComber.find(accSubj,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    83
            serverPrincipal, clientPrincipal, KerberosTicket.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    84
90ce3da70b43 Initial load
duke
parents:
diff changeset
    85
        if (ticket != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    86
            return ticket;  // found it
90ce3da70b43 Initial load
duke
parents:
diff changeset
    87
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    88
90ce3da70b43 Initial load
duke
parents:
diff changeset
    89
        Subject loginSubj = null;
90ce3da70b43 Initial load
duke
parents:
diff changeset
    90
        if (!GSSUtil.useSubjectCredsOnly(caller)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    91
            // 2. Try to get ticket from login
90ce3da70b43 Initial load
duke
parents:
diff changeset
    92
            try {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    93
                loginSubj = GSSUtil.login(caller, GSSUtil.GSS_KRB5_MECH_OID);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
    94
                ticket = SubjectComber.find(loginSubj,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
    95
                    serverPrincipal, clientPrincipal, KerberosTicket.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
    96
                if (ticket != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
    97
                    return ticket; // found it
90ce3da70b43 Initial load
duke
parents:
diff changeset
    98
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
    99
            } catch (LoginException e) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   100
                // No login entry to use
90ce3da70b43 Initial load
duke
parents:
diff changeset
   101
                // ignore and continue
90ce3da70b43 Initial load
duke
parents:
diff changeset
   102
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   103
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   104
90ce3da70b43 Initial load
duke
parents:
diff changeset
   105
        // Service ticket not found in subject or login
90ce3da70b43 Initial load
duke
parents:
diff changeset
   106
        // Try to get TGT to acquire service ticket
90ce3da70b43 Initial load
duke
parents:
diff changeset
   107
90ce3da70b43 Initial load
duke
parents:
diff changeset
   108
        // 3. Try to get TGT from acc subject
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   109
        KerberosTicket tgt = SubjectComber.find(accSubj,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   110
            tgsPrincipal, clientPrincipal, KerberosTicket.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   111
90ce3da70b43 Initial load
duke
parents:
diff changeset
   112
        boolean fromAcc;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   113
        if (tgt == null && loginSubj != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   114
            // 4. Try to get TGT from login subject
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   115
            tgt = SubjectComber.find(loginSubj,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   116
                tgsPrincipal, clientPrincipal, KerberosTicket.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   117
            fromAcc = false;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   118
        } else {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   119
            fromAcc = true;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   120
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   121
90ce3da70b43 Initial load
duke
parents:
diff changeset
   122
        // 5. Try to get service ticket using TGT
90ce3da70b43 Initial load
duke
parents:
diff changeset
   123
        if (tgt != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   124
            Credentials tgtCreds = ticketToCreds(tgt);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   125
            Credentials serviceCreds = Credentials.acquireServiceCreds(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   126
                        serverPrincipal, tgtCreds);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   127
            if (serviceCreds != null) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   128
                ticket = credsToTicket(serviceCreds);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   129
90ce3da70b43 Initial load
duke
parents:
diff changeset
   130
                // Store service ticket in acc's Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
   131
                if (fromAcc && accSubj != null && !accSubj.isReadOnly()) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   132
                    accSubj.getPrivateCredentials().add(ticket);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   133
                }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   134
            }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   135
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   136
        return ticket;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   137
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   138
90ce3da70b43 Initial load
duke
parents:
diff changeset
   139
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   140
     * Retrieves the ticket corresponding to the client/server principal
90ce3da70b43 Initial load
duke
parents:
diff changeset
   141
     * pair from the Subject in the specified AccessControlContext.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   142
     * If the ticket can not be found in the Subject, and if
90ce3da70b43 Initial load
duke
parents:
diff changeset
   143
     * useSubjectCredsOnly is false, then obtain ticket from
90ce3da70b43 Initial load
duke
parents:
diff changeset
   144
     * a LoginContext.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   145
     */
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2
diff changeset
   146
    static KerberosTicket getTicket(GSSCaller caller,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   147
        String clientPrincipal, String serverPrincipal,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   148
        AccessControlContext acc) throws LoginException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   149
90ce3da70b43 Initial load
duke
parents:
diff changeset
   150
        // Try to get ticket from acc's Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
   151
        Subject accSubj = Subject.getSubject(acc);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   152
        KerberosTicket ticket =
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   153
            SubjectComber.find(accSubj, serverPrincipal, clientPrincipal,
90ce3da70b43 Initial load
duke
parents:
diff changeset
   154
                  KerberosTicket.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   155
90ce3da70b43 Initial load
duke
parents:
diff changeset
   156
        // Try to get ticket from Subject obtained from GSSUtil
90ce3da70b43 Initial load
duke
parents:
diff changeset
   157
        if (ticket == null && !GSSUtil.useSubjectCredsOnly(caller)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   158
            Subject subject = GSSUtil.login(caller, GSSUtil.GSS_KRB5_MECH_OID);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   159
            ticket = SubjectComber.find(subject,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   160
                serverPrincipal, clientPrincipal, KerberosTicket.class);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   161
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   162
        return ticket;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   163
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   164
90ce3da70b43 Initial load
duke
parents:
diff changeset
   165
    /**
90ce3da70b43 Initial load
duke
parents:
diff changeset
   166
     * Retrieves the caller's Subject, or Subject obtained by logging in
90ce3da70b43 Initial load
duke
parents:
diff changeset
   167
     * via the specified caller.
90ce3da70b43 Initial load
duke
parents:
diff changeset
   168
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   169
     * Caller must have permission to:
90ce3da70b43 Initial load
duke
parents:
diff changeset
   170
     *    - access the Subject
90ce3da70b43 Initial load
duke
parents:
diff changeset
   171
     *    - create LoginContext
90ce3da70b43 Initial load
duke
parents:
diff changeset
   172
     *    - read the auth.login.defaultCallbackHandler security property
90ce3da70b43 Initial load
duke
parents:
diff changeset
   173
     *
90ce3da70b43 Initial load
duke
parents:
diff changeset
   174
     * NOTE: This method is used by JSSE Kerberos Cipher Suites
90ce3da70b43 Initial load
duke
parents:
diff changeset
   175
     */
2942
37d9baeb7518 6578647: Undefined requesting URL in java.net.Authenticator.getPasswordAuthentication()
weijun
parents: 2
diff changeset
   176
    public static Subject getSubject(GSSCaller caller,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   177
        AccessControlContext acc) throws LoginException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   178
90ce3da70b43 Initial load
duke
parents:
diff changeset
   179
        // Try to get the Subject from acc
90ce3da70b43 Initial load
duke
parents:
diff changeset
   180
        Subject subject = Subject.getSubject(acc);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   181
90ce3da70b43 Initial load
duke
parents:
diff changeset
   182
        // Try to get Subject obtained from GSSUtil
90ce3da70b43 Initial load
duke
parents:
diff changeset
   183
        if (subject == null && !GSSUtil.useSubjectCredsOnly(caller)) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   184
            subject = GSSUtil.login(caller, GSSUtil.GSS_KRB5_MECH_OID);
90ce3da70b43 Initial load
duke
parents:
diff changeset
   185
        }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   186
        return subject;
90ce3da70b43 Initial load
duke
parents:
diff changeset
   187
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   188
90ce3da70b43 Initial load
duke
parents:
diff changeset
   189
    /**
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   190
     * Credentials of a service, the private secret to authenticate its
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   191
     * identity, which can be:
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   192
     *   1. Some KerberosKeys (generated from password)
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   193
     *   2. A KeyTab (for a typical service)
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   194
     *   3. A TGT (for S4U2proxy extension)
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   195
     *
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   196
     * Note that some creds can coexist. For example, a user2user service
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   197
     * can use its keytab (or keys) if the client can successfully obtain a
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   198
     * normal service ticket, otherwise, it can uses the TGT (actually, the
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   199
     * session key of the TGT) if the client can only acquire a service ticket
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   200
     * of ENC-TKT-IN-SKEY style.
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   201
     */
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   202
    public static class ServiceCreds {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   203
        private KerberosPrincipal kp;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   204
        private List<KeyTab> ktabs;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   205
        private List<KerberosKey> kk;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   206
        private Subject subj;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   207
        private KerberosTicket tgt;
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   208
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   209
        private static ServiceCreds getInstance(
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   210
                Subject subj, String serverPrincipal) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   211
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   212
            ServiceCreds sc = new ServiceCreds();
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   213
            sc.subj = subj;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   214
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   215
            for (KerberosPrincipal p: subj.getPrincipals(KerberosPrincipal.class)) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   216
                if (serverPrincipal == null ||
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   217
                        p.getName().equals(serverPrincipal)) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   218
                    sc.kp = p;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   219
                    serverPrincipal = p.getName();
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   220
                    break;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   221
                }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   222
            }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   223
            if (sc.kp == null) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   224
                // Compatibility with old behavior: even when there is no
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   225
                // KerberosPrincipal, we can find one from KerberosKeys
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   226
                List<KerberosKey> keys = SubjectComber.findMany(
14769
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   227
                        subj, serverPrincipal, null, KerberosKey.class);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   228
                if (!keys.isEmpty()) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   229
                    sc.kp = keys.get(0).getPrincipal();
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   230
                    serverPrincipal = sc.kp.getName();
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   231
                    if (DEBUG) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   232
                        System.out.println(">>> ServiceCreds: no kp?"
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   233
                                + " find one from kk: " + serverPrincipal);
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   234
                    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   235
                } else {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   236
                    return null;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   237
                }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   238
            }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   239
            sc.ktabs = SubjectComber.findMany(
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   240
                        subj, null, null, KeyTab.class);
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   241
            sc.kk = SubjectComber.findMany(
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   242
                        subj, serverPrincipal, null, KerberosKey.class);
14769
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   243
            sc.tgt = SubjectComber.find(
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   244
                    subj, null, serverPrincipal, KerberosTicket.class);
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   245
            if (sc.ktabs.isEmpty() && sc.kk.isEmpty() && sc.tgt == null) {
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   246
                return null;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   247
            }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   248
            return sc;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   249
        }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   250
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   251
        public String getName() {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   252
            return kp.getName();
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   253
        }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   254
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   255
        public KerberosKey[] getKKeys() {
14769
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   256
            List<KerberosKey> keys = new ArrayList<>();
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   257
            for (KerberosKey k: kk) {
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   258
                keys.add(k);
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   259
            }
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   260
            for (KeyTab ktab: ktabs) {
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   261
                for (KerberosKey k: ktab.getKeys(kp)) {
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   262
                    keys.add(k);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   263
                }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   264
            }
14769
22808af10edd 8004488: wrong permissions checked in krb5
weijun
parents: 14413
diff changeset
   265
            return keys.toArray(new KerberosKey[keys.size()]);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   266
        }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   267
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   268
        public EncryptionKey[] getEKeys() {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   269
            KerberosKey[] kkeys = getKKeys();
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   270
            EncryptionKey[] ekeys = new EncryptionKey[kkeys.length];
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   271
            for (int i=0; i<ekeys.length; i++) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   272
                ekeys[i] =  new EncryptionKey(
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   273
                            kkeys[i].getEncoded(), kkeys[i].getKeyType(),
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   274
                            new Integer(kkeys[i].getVersionNumber()));
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   275
            }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   276
            return ekeys;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   277
        }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   278
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   279
        public Credentials getInitCred() {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   280
            if (tgt == null) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   281
                return null;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   282
            }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   283
            try {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   284
                return ticketToCreds(tgt);
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   285
            } catch (KrbException | IOException e) {
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   286
                return null;
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   287
            }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   288
        }
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   289
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   290
        public void destroy() {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   291
            kp = null;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   292
            ktabs = null;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   293
            kk = null;
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   294
            tgt = null;
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   295
        }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   296
    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   297
    /**
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   298
     * Retrieves the ServiceCreds for the specified server principal from
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   299
     * the Subject in the specified AccessControlContext. If not found, and if
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   300
     * useSubjectCredsOnly is false, then obtain from a LoginContext.
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   301
     *
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   302
     * NOTE: This method is also used by JSSE Kerberos Cipher Suites
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   303
     */
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   304
    public static ServiceCreds getServiceCreds(GSSCaller caller,
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   305
        String serverPrincipal, AccessControlContext acc)
90ce3da70b43 Initial load
duke
parents:
diff changeset
   306
                throws LoginException {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   307
90ce3da70b43 Initial load
duke
parents:
diff changeset
   308
        Subject accSubj = Subject.getSubject(acc);
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   309
        ServiceCreds sc = null;
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   310
        if (accSubj != null) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   311
            sc = ServiceCreds.getInstance(accSubj, serverPrincipal);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   312
        }
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   313
        if (sc == null && !GSSUtil.useSubjectCredsOnly(caller)) {
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   314
            Subject subject = GSSUtil.login(caller, GSSUtil.GSS_KRB5_MECH_OID);
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   315
            sc = ServiceCreds.getInstance(subject, serverPrincipal);
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   316
        }
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   317
        return sc;
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   318
    }
90ce3da70b43 Initial load
duke
parents:
diff changeset
   319
90ce3da70b43 Initial load
duke
parents:
diff changeset
   320
    public static KerberosTicket credsToTicket(Credentials serviceCreds) {
90ce3da70b43 Initial load
duke
parents:
diff changeset
   321
        EncryptionKey sessionKey =  serviceCreds.getSessionKey();
90ce3da70b43 Initial load
duke
parents:
diff changeset
   322
        return new KerberosTicket(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   323
            serviceCreds.getEncoded(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   324
            new KerberosPrincipal(serviceCreds.getClient().getName()),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   325
            new KerberosPrincipal(serviceCreds.getServer().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   326
                                KerberosPrincipal.KRB_NT_SRV_INST),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   327
            sessionKey.getBytes(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   328
            sessionKey.getEType(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   329
            serviceCreds.getFlags(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   330
            serviceCreds.getAuthTime(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   331
            serviceCreds.getStartTime(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   332
            serviceCreds.getEndTime(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   333
            serviceCreds.getRenewTill(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   334
            serviceCreds.getClientAddresses());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   335
    };
90ce3da70b43 Initial load
duke
parents:
diff changeset
   336
90ce3da70b43 Initial load
duke
parents:
diff changeset
   337
    public static Credentials ticketToCreds(KerberosTicket kerbTicket)
14413
e954df027393 6355584: Introduce constrained Kerberos delegation
weijun
parents: 10336
diff changeset
   338
            throws KrbException, IOException {
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   339
        return new Credentials(
90ce3da70b43 Initial load
duke
parents:
diff changeset
   340
            kerbTicket.getEncoded(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   341
            kerbTicket.getClient().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   342
            kerbTicket.getServer().getName(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   343
            kerbTicket.getSessionKey().getEncoded(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   344
            kerbTicket.getSessionKeyType(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   345
            kerbTicket.getFlags(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   346
            kerbTicket.getAuthTime(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   347
            kerbTicket.getStartTime(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   348
            kerbTicket.getEndTime(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   349
            kerbTicket.getRenewTill(),
90ce3da70b43 Initial load
duke
parents:
diff changeset
   350
            kerbTicket.getClientAddresses());
90ce3da70b43 Initial load
duke
parents:
diff changeset
   351
    }
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   352
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   353
    /**
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   354
     * A helper method to get EncryptionKeys from a javax..KeyTab
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   355
     * @param ktab the javax..KeyTab class
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   356
     * @param cname the PrincipalName
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   357
     * @return the EKeys, never null, might be empty
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   358
     */
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   359
    public static EncryptionKey[] keysFromJavaxKeyTab(
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   360
            KeyTab ktab, PrincipalName cname) {
10044
413c0f8ca341 7048466: Move sun.misc.JavaxSecurityAuthKerberosAccess to sun.security.krb5 package
weijun
parents: 9499
diff changeset
   361
        return KerberosSecrets.getJavaxSecurityAuthKerberosAccess().
9499
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   362
                keyTabGetEncryptionKeys(ktab, cname);
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   363
    }
f3115698a012 6894072: always refresh keytab
weijun
parents: 5506
diff changeset
   364
2
90ce3da70b43 Initial load
duke
parents:
diff changeset
   365
}