org.springframework.security.ui.ntlm.NtlmAuthenticationFilter.java Source code

Java tutorial

Introduction

Here is the source code for org.springframework.security.ui.ntlm.NtlmAuthenticationFilter.java

Source

/* Copyright 2004-2007 Acegi Technology Pty Limited
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */

package org.springframework.security.ui.ntlm;

import java.io.IOException;
import java.net.UnknownHostException;
import java.util.Enumeration;
import java.util.Properties;

import javax.servlet.FilterChain;
import javax.servlet.ServletException;
import javax.servlet.ServletRequest;
import javax.servlet.ServletResponse;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;

import jcifs.Config;
import jcifs.UniAddress;
import jcifs.ntlmssp.Type1Message;
import jcifs.ntlmssp.Type2Message;
import jcifs.ntlmssp.Type3Message;
import jcifs.smb.NtlmChallenge;
import jcifs.smb.NtlmPasswordAuthentication;
import jcifs.smb.SmbAuthException;
import jcifs.smb.SmbException;
import jcifs.smb.SmbSession;
import jcifs.util.Base64;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.springframework.beans.factory.InitializingBean;
import org.springframework.security.authentication.AnonymousAuthenticationToken;
import org.springframework.security.authentication.AuthenticationCredentialsNotFoundException;
import org.springframework.security.authentication.AuthenticationDetailsSource;
import org.springframework.security.authentication.AuthenticationManager;
import org.springframework.security.authentication.BadCredentialsException;
import org.springframework.security.authentication.InsufficientAuthenticationException;
import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.AuthenticationException;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.security.web.authentication.WebAuthenticationDetails;
import org.springframework.security.web.authentication.WebAuthenticationDetailsSource;
import org.springframework.util.Assert;
import org.springframework.web.filter.GenericFilterBean;

/**
 * A clean-room implementation for Spring Security of an NTLM HTTP filter
 * leveraging the JCIFS library.
 * <p>
 * NTLM is a Microsoft-developed protocol providing single sign-on capabilities
 * to web applications and other integrated applications.  It allows a web
 * server to automatically discover the username of a browser client when that
 * client is logged into a Windows domain and is using an NTLM-aware browser.
 * A web application can then reuse the user's Windows credentials without
 * having to ask for them again.
 * <p>
 * Because NTLM only provides the username of the Windows client, a Spring
 * Security NTLM deployment must have a <code>UserDetailsService</code> that
 * provides a <code>UserDetails</code> object with the empty string as the
 * password and whatever <code>GrantedAuthority</code> values necessary to
 * pass the <code>FilterSecurityInterceptor</code>.
 * <p>
 * The Spring Security bean configuration file must also place the
 * <code>ExceptionTranslationFilter</code> before this filter in the
 * <code>FilterChainProxy</code> definition.
 *
 * @author Davide Baroncelli
 * @author Edward Smith
 * @author Alois Cochard
 * @author Edouard De Oliveira
 */
public class NtlmAuthenticationFilter extends GenericFilterBean implements InitializingBean {

    //~ Static fields/initializers =====================================================================================

    private static Log LOGGER = LogFactory.getLog(NtlmAuthenticationFilter.class);

    private static final String STATE_ATTR = "SpringSecurityNtlm";

    private static final String CHALLENGE_ATTR = "NtlmChal";

    private static final Integer BEGIN = new Integer(0);

    private static final Integer NEGOTIATE = new Integer(1);

    private static final Integer COMPLETE = new Integer(2);

    private static final Integer DELAYED = new Integer(3);

    //~ Instance fields ================================================================================================

    /** Should the filter load balance among multiple domain controllers, default <code>false</code> */
    private boolean loadBalance;

    /** Should the domain name be stripped from the username, default <code>true</code> */
    private boolean stripDomain = true;

    /** Should the filter initiate NTLM negotiations, default <code>true</code>   */
    private boolean forceIdentification = true;

    /** Should the filter retry NTLM on authorization failure, default <code>false</code> */
    private boolean retryOnAuthFailure;

    private String soTimeout;

    private String cachePolicy;

    private String defaultDomain;

    private String domainController;

    private AuthenticationManager authenticationManager;

    private AuthenticationDetailsSource<HttpServletRequest, WebAuthenticationDetails> authenticationDetailsSource = new WebAuthenticationDetailsSource();

    //~ Methods ========================================================================================================

    /**
     * Ensures an <code>AuthenticationManager</code> and authentication failure
     * URL have been provided in the bean configuration file.
     */
    @Override
    public void afterPropertiesSet() {
        Assert.notNull(this.authenticationManager, "An AuthenticationManager is required");

        // Default to 5 minutes if not already specified
        Config.setProperty("jcifs.smb.client.soTimeout", soTimeout == null ? "300000" : soTimeout);
        // Default to 20 minutes if not already specified
        Config.setProperty("jcifs.netbios.cachePolicy", cachePolicy == null ? "1200" : cachePolicy);

        if (domainController == null) {
            domainController = defaultDomain;
        }
    }

    /**
     * Authenticates the user credentials acquired from NTLM against the Spring
     * Security <code>AuthenticationManager</code>.
     *
     * @param request the <code>HttpServletRequest</code> object.
     * @param response the <code>HttpServletResponse</code> object.
     * @param session the <code>HttpSession</code> object.
     * @param auth the <code>NtlmPasswordAuthentication</code> object.
     * @throws IOException
     */
    private void authenticate(final HttpServletRequest request, final HttpServletResponse response,
            final HttpSession session, final NtlmPasswordAuthentication auth) throws IOException {
        final Authentication authResult;
        final UsernamePasswordAuthenticationToken authRequest;
        final Authentication backupAuth;

        authRequest = new NtlmUsernamePasswordAuthenticationToken(auth, stripDomain);
        authRequest.setDetails(authenticationDetailsSource.buildDetails(request));

        // Place the last username attempted into HttpSession for views
        //       session.setAttribute(UsernamePasswordAuthenticationFilter.SPRING_SECURITY_LAST_USERNAME_KEY, authRequest.getName());
        // Replace in your code by :
        // SecurityContextHolder.getContext().getAuthentication().getPrincipal();

        // Backup the current authentication in case of an AuthenticationException
        backupAuth = SecurityContextHolder.getContext().getAuthentication();

        try {
            // Authenticate the user with the authentication manager
            authResult = authenticationManager.authenticate(authRequest);
        } catch (AuthenticationException failed) {
            if (LOGGER.isInfoEnabled()) {
                LOGGER.info("Authentication request for user: " + authRequest.getName() + " failed: "
                        + failed.toString());
            }

            // Reset the backup Authentication object and rethrow the AuthenticationException
            SecurityContextHolder.getContext().setAuthentication(backupAuth);

            if (retryOnAuthFailure && (failed instanceof AuthenticationCredentialsNotFoundException
                    || failed instanceof InsufficientAuthenticationException)) {
                LOGGER.debug("Restart NTLM authentication handshake due to AuthenticationException");
                session.setAttribute(STATE_ATTR, BEGIN);
                throw new NtlmBeginHandshakeException();
            }

            throw failed;
        }

        // Set the Authentication object with the valid authentication result
        SecurityContextHolder.getContext().setAuthentication(authResult);
    }

    public void doFilter(final ServletRequest servletRequest, final ServletResponse servletResponse,
            final FilterChain chain) throws IOException, ServletException {
        // Converting servlet request to http servlet request
        HttpServletRequest request = (HttpServletRequest) servletRequest;
        HttpServletResponse response = (HttpServletResponse) servletResponse;

        // Retrieve http session
        final HttpSession session = request.getSession();
        Integer ntlmState = (Integer) session.getAttribute(STATE_ATTR);

        // Start NTLM negotiations the first time through the filter
        if (ntlmState == null) {
            if (forceIdentification) {
                LOGGER.debug("Starting NTLM handshake");
                session.setAttribute(STATE_ATTR, BEGIN);
                throw new NtlmBeginHandshakeException();
            } else {
                LOGGER.debug("NTLM handshake not yet started");
                session.setAttribute(STATE_ATTR, DELAYED);
            }
        }

        // IE will send a Type 1 message to reauthenticate the user during an HTTP POST
        if (ntlmState == COMPLETE && this.reAuthOnIEPost(request))
            ntlmState = BEGIN;

        final String authMessage = request.getHeader("Authorization");
        if (ntlmState != COMPLETE && authMessage != null && authMessage.startsWith("NTLM ")) {
            final UniAddress dcAddress = this.getDCAddress(session);
            if (ntlmState == BEGIN) {
                LOGGER.debug("Processing NTLM Type 1 Message");
                session.setAttribute(STATE_ATTR, NEGOTIATE);
                this.processType1Message(authMessage, session, dcAddress);
            } else {
                LOGGER.debug("Processing NTLM Type 3 Message");
                final NtlmPasswordAuthentication auth = this.processType3Message(authMessage, session, dcAddress);
                LOGGER.debug("NTLM negotiation complete");
                this.logon(session, dcAddress, auth);
                session.setAttribute(STATE_ATTR, COMPLETE);

                // Do not reauthenticate the user in Spring Security during an IE POST
                final Authentication myCurrentAuth = SecurityContextHolder.getContext().getAuthentication();
                if (myCurrentAuth == null || myCurrentAuth instanceof AnonymousAuthenticationToken) {
                    LOGGER.debug("Authenticating user credentials");
                    this.authenticate(request, response, session, auth);
                }
            }
        }

        chain.doFilter(request, response);
    }

    /**
     * Returns the domain controller challenge based on the <code>loadBalance</code>
     * setting.
     *
     * @param session the <code>HttpSession</code> object.
     * @param dcAddress the domain controller address.
     * @return the domain controller challenge.
     * @throws UnknownHostException
     * @throws SmbException
     */
    private byte[] getChallenge(final HttpSession session, final UniAddress dcAddress)
            throws UnknownHostException, SmbException {
        if (loadBalance) {
            return ((NtlmChallenge) session.getAttribute(CHALLENGE_ATTR)).challenge;
        }

        return SmbSession.getChallenge(dcAddress);
    }

    /**
     * Returns the domain controller address based on the <code>loadBalance</code>
     * setting.
     *
     * @param session the <code>HttpSession</code> object.
     * @return the domain controller address.
     * @throws UnknownHostException
     * @throws SmbException
     */
    private UniAddress getDCAddress(final HttpSession session) throws UnknownHostException, SmbException {
        if (loadBalance) {
            NtlmChallenge chal = (NtlmChallenge) session.getAttribute(CHALLENGE_ATTR);
            if (chal == null) {
                chal = SmbSession.getChallengeForDomain();
                session.setAttribute(CHALLENGE_ATTR, chal);
            }
            return chal.dc;
        }

        return UniAddress.getByName(domainController, true);
    }

    //    public int getOrder() {
    //        //return FilterChainOrder.NTLM_FILTER;
    //        return NTLM_FILTER;
    //    }

    /**
     * Returns <code>true</code> if NTLM authentication is forced.
     *
     * @return <code>true</code> if NTLM authentication is forced.
     */
    public boolean isForceIdentification() {
        return this.forceIdentification;
    }

    /**
     * Checks the user credentials against the domain controller.
     *
     * @param session the <code>HTTPSession</code> object.
     * @param dcAddress the domain controller address.
     * @param auth the <code>NtlmPasswordAuthentication</code> object.
     * @throws IOException
     */
    private void logon(final HttpSession session, final UniAddress dcAddress, final NtlmPasswordAuthentication auth)
            throws IOException {
        try {
            SmbSession.logon(dcAddress, auth);
            if (LOGGER.isDebugEnabled()) {
                LOGGER.debug(auth + " successfully authenticated against " + dcAddress);
            }
        } catch (SmbAuthException e) {
            LOGGER.error("Credentials " + auth + " were not accepted by the domain controller " + dcAddress);

            if (retryOnAuthFailure) {
                LOGGER.debug("Restarting NTLM authentication handshake");
                session.setAttribute(STATE_ATTR, BEGIN);
                throw new NtlmBeginHandshakeException();
            }

            throw new BadCredentialsException("Bad NTLM credentials");
        } finally {
            session.removeAttribute(CHALLENGE_ATTR);
        }
    }

    /**
     * Creates and returns a Type 2 message from the provided Type 1 message.
     *
     * @param message the Type 1 message to process.
     * @param session the <code>HTTPSession</code> object.
     * @param dcAddress the domain controller address.
     * @throws IOException
     */
    private void processType1Message(final String message, final HttpSession session, final UniAddress dcAddress)
            throws IOException {
        final Type2Message type2msg = new Type2Message(new Type1Message(Base64.decode(message.substring(5))),
                this.getChallenge(session, dcAddress), null);
        throw new NtlmType2MessageException(Base64.encode(type2msg.toByteArray()));
    }

    /**
     * Builds and returns an <code>NtlmPasswordAuthentication</code> object
     * from the provided Type 3 message.
     *
     * @param message the Type 3 message to process.
     * @param session the <code>HTTPSession</code> object.
     * @param dcAddress the domain controller address.
     * @return an <code>NtlmPasswordAuthentication</code> object.
     * @throws IOException
     */
    private NtlmPasswordAuthentication processType3Message(final String message, final HttpSession session,
            final UniAddress dcAddress) throws IOException {
        final Type3Message type3msg = new Type3Message(Base64.decode(message.substring(5)));
        final byte[] lmResponse = (type3msg.getLMResponse() != null) ? type3msg.getLMResponse() : new byte[0];
        final byte[] ntResponse = (type3msg.getNTResponse() != null) ? type3msg.getNTResponse() : new byte[0];
        return new NtlmPasswordAuthentication(type3msg.getDomain(), type3msg.getUser(),
                this.getChallenge(session, dcAddress), lmResponse, ntResponse);
    }

    /**
     * Returns <code>true</code> if reauthentication is needed on an IE POST.
     */
    private boolean reAuthOnIEPost(final HttpServletRequest request) {
        String ua = request.getHeader("User-Agent");
        return (request.getMethod().equalsIgnoreCase("POST") && ua != null && ua.indexOf("MSIE") != -1);
    }

    public void setAuthenticationDetailsSource(
            AuthenticationDetailsSource<HttpServletRequest, WebAuthenticationDetails> authenticationDetailsSource) {
        Assert.notNull(authenticationDetailsSource, "authenticationDetailsSource cannot be null");
        this.authenticationDetailsSource = authenticationDetailsSource;
    }

    /**
     * Sets the <code>AuthenticationManager</code> to use.
     *
     * @param authenticationManager the <code>AuthenticationManager</code> to use.
     */
    public void setAuthenticationManager(AuthenticationManager authenticationManager) {
        this.authenticationManager = authenticationManager;
    }

    /**
     * Sets the <code>jcifs.netbios.cachePolicy</code> property to the
     * number of seconds a NetBIOS address is cached by JCIFS. Defaults to
     * 20 minutes if not specified.
     *
     * @param numSeconds The number of seconds a NetBIOS address is cached.
     */
    public void setCachePolicy(String numSeconds) {
        this.cachePolicy = numSeconds;
    }

    /**
     * The NT domain against which clients should be authenticated. If the SMB
     * client username and password are also set, then preauthentication will
     * be used which is necessary to initialize the SMB signing digest. SMB
     * signatures are required by default on Windows 2003 domain controllers.
     *
     * @param defaultDomain The name of the default domain.
     */
    public void setDefaultDomain(String defaultDomain) {
        this.defaultDomain = defaultDomain;
        Config.setProperty("jcifs.smb.client.domain", defaultDomain);
    }

    /**
     * The IP address of any SMB server that should be used to authenticate
     * HTTP clients.
     *
     * @param domainController The IP address of the domain controller.
     */
    public void setDomainController(String domainController) {
        this.domainController = domainController;
    }

    /**
     * Sets a flag denoting whether NTLM authentication should be forced.
     *
     * @param forceIdentification the force identification flag value to set.
     */
    public void setForceIdentification(boolean forceIdentification) {
        this.forceIdentification = forceIdentification;
    }

    /**
     * Loads properties starting with "jcifs" into the JCIFS configuration.
     * Any other properties are ignored.
     *
     * @param props The JCIFS properties to set.
     */
    public void setJcifsProperties(Properties props) {
        String name;

        for (Enumeration<?> e = props.keys(); e.hasMoreElements();) {
            name = (String) e.nextElement();
            if (name.startsWith("jcifs.")) {
                Config.setProperty(name, props.getProperty(name));
            }
        }
    }

    /**
     * If the default domain is specified and the domain controller is not
     * specified, then query for domain controllers by name.  When load
     * balance is <code>true</code>, rotate through the list of domain
     * controllers when authenticating users.
     *
     * @param loadBalance The load balance flag value.
     */
    public void setLoadBalance(boolean loadBalance) {
        this.loadBalance = loadBalance;
    }

    /**
     * Configures JCIFS to use a WINS server.  It is preferred to use a WINS
     * server over a specific domain controller.  Set this property instead of
     * <code>domainController</code> if there is a WINS server available.
     *
     * @param netbiosWINS The WINS server JCIFS will use.
     */
    public void setNetbiosWINS(String netbiosWINS) {
        Config.setProperty("jcifs.netbios.wins", netbiosWINS);
    }

    /**
     * Sets a flag denoting whether NTLM should retry whenever authentication
     * fails.  Retry will occur if the credentials are rejected by the domain controller or if an
     * an {@link AuthenticationCredentialsNotFoundException}
     * or {@link InsufficientAuthenticationException} is thrown.
     *
     * @param retryOnFailure the retry on failure flag value to set.
     */
    public void setRetryOnAuthFailure(boolean retryOnFailure) {
        this.retryOnAuthFailure = retryOnFailure;
    }

    /**
     * Sets the SMB client password.
     *
     * @param smbClientPassword The SMB client password.
     */
    public void setSmbClientPassword(String smbClientPassword) {
        Config.setProperty("jcifs.smb.client.password", smbClientPassword);
    }

    /**
     * Sets the SMB client SSN limit. When set to <code>1</code>, every
     * authentication is forced to use a separate transport. This effectively
     * ignores SMB signing requirements, however at the expense of reducing
     * scalability. Preauthentication with a domain, username, and password is
     * the preferred method for working with servers that require signatures.
     *
     * @param smbClientSSNLimit The SMB client SSN limit.
     */
    public void setSmbClientSSNLimit(String smbClientSSNLimit) {
        Config.setProperty("jcifs.smb.client.ssnLimit", smbClientSSNLimit);
    }

    /**
     * Sets the SMB client username.
     *
     * @param smbClientUsername The SMB client username.
     */
    public void setSmbClientUsername(String smbClientUsername) {
        Config.setProperty("jcifs.smb.client.username", smbClientUsername);
    }

    /**
     * Sets the <code>jcifs.smb.client.soTimeout</code> property to the
     * timeout value specified in milliseconds. Defaults to 5 minutes
     * if not specified.
     *
     * @param timeout The milliseconds timeout value.
     */
    public void setSoTimeout(String timeout) {
        this.soTimeout = timeout;
    }

    /**
     * Configures <code>NtlmProcessingFilter</code> to strip the Windows
     * domain name from the username when set to <code>true</code>, which
     * is the default value.
     *
     * @param stripDomain The strip domain flag value.
     */
    public void setStripDomain(boolean stripDomain) {
        this.stripDomain = stripDomain;
    }
}