net.lightbody.bmp.proxy.jetty.http.ClientCertAuthenticator.java Source code

Java tutorial

Introduction

Here is the source code for net.lightbody.bmp.proxy.jetty.http.ClientCertAuthenticator.java

Source

// ========================================================================
// $Id: ClientCertAuthenticator.java,v 1.15 2006/02/28 12:45:01 gregwilkins Exp $
// Copyright 2002-2004 Mort Bay Consulting Pty. Ltd.
// ------------------------------------------------------------------------
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at 
// http://www.apache.org/licenses/LICENSE-2.0
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
// ========================================================================

package net.lightbody.bmp.proxy.jetty.http;

import net.lightbody.bmp.proxy.jetty.log.LogFactory;
import org.apache.commons.logging.Log;

import javax.net.ssl.SSLSocket;
import java.io.IOException;
import java.security.Principal;

/* ------------------------------------------------------------ */
/** Client Certificate Authenticator.
 * This Authenticator uses a client certificate to authenticate the user.
 * Each client certificate supplied is tried against the realm using the
 * Principal name as the username and a string representation of the
 * certificate as the credential.
 * @version $Id: ClientCertAuthenticator.java,v 1.15 2006/02/28 12:45:01 gregwilkins Exp $
 * @author Greg Wilkins (gregw)
 */
public class ClientCertAuthenticator implements Authenticator {
    private static Log log = LogFactory.getLog(ClientCertAuthenticator.class);

    private int _maxHandShakeSeconds = 60;

    /* ------------------------------------------------------------ */
    public ClientCertAuthenticator() {
        log.warn("Client Cert Authentication is EXPERIMENTAL");
    }

    /* ------------------------------------------------------------ */
    public int getMaxHandShakeSeconds() {
        return _maxHandShakeSeconds;
    }

    /* ------------------------------------------------------------ */
    /** 
     * @param maxHandShakeSeconds Maximum time to wait for SSL handshake if
     * Client certification is required.
     */
    public void setMaxHandShakeSeconds(int maxHandShakeSeconds) {
        _maxHandShakeSeconds = maxHandShakeSeconds;
    }

    /* ------------------------------------------------------------ */
    /** 
     * @return UserPrinciple if authenticated or null if not. If
     * Authentication fails, then the authenticator may have committed
     * the response as an auth challenge or redirect.
     * @exception IOException 
     */
    public Principal authenticate(UserRealm realm, String pathInContext, HttpRequest request, HttpResponse response)
            throws IOException {
        java.security.cert.X509Certificate[] certs = (java.security.cert.X509Certificate[]) request
                .getAttribute("javax.servlet.request.X509Certificate");

        if (response != null && (certs == null || certs.length == 0 || certs[0] == null)) {
            // No certs available so lets try and force the issue

            // Get the SSLSocket
            Object s = HttpConnection.getHttpConnection().getConnection();
            if (!(s instanceof SSLSocket))
                return null;
            SSLSocket socket = (SSLSocket) s;

            if (!socket.getNeedClientAuth()) {
                // Need to re-handshake
                socket.setNeedClientAuth(true);
                socket.startHandshake();

                // Need to wait here - but not forever. The Handshake
                // Listener API does not look like a good option to
                // avoid waiting forever.  So we will take a slightly
                // busy timelimited approach. For now:
                for (int i = (_maxHandShakeSeconds * 4); i-- > 0;) {
                    certs = (java.security.cert.X509Certificate[]) request
                            .getAttribute("javax.servlet.request.X509Certificate");
                    if (certs != null && certs.length > 0 && certs[0] != null)
                        break;
                    try {
                        Thread.sleep(250);
                    } catch (Exception e) {
                        break;
                    }
                }
            }
        }

        if (certs == null || certs.length == 0 || certs[0] == null)
            return null;

        Principal principal = certs[0].getSubjectDN();
        if (principal == null)
            principal = certs[0].getIssuerDN();
        String username = principal == null ? "clientcert" : principal.getName();

        Principal user = realm.authenticate(username, certs, request);

        request.setAuthType(SecurityConstraint.__CERT_AUTH);
        if (user != null)
            request.setAuthUser(user.getName());
        request.setUserPrincipal(user);
        return user;
    }

    /* ------------------------------------------------------------ */
    public String getAuthMethod() {
        return SecurityConstraint.__CERT_AUTH;
    }

}