Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
O
Openfire
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Administrator
Openfire
Commits
130fc97e
Commit
130fc97e
authored
Apr 08, 2016
by
Dave Cridland
Browse files
Options
Browse Files
Download
Plain Diff
Merge pull request #572 from guusdk/OF-1124
Various SASL-related changes
parents
61423720
cd0a3201
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
131 additions
and
39 deletions
+131
-39
SASLAuthentication.java
...ava/org/jivesoftware/openfire/net/SASLAuthentication.java
+131
-39
No files found.
src/java/org/jivesoftware/openfire/net/SASLAuthentication.java
View file @
130fc97e
...
...
@@ -35,15 +35,14 @@ import org.jivesoftware.openfire.sasl.JiveSharedSecretSaslServer;
import
org.jivesoftware.openfire.sasl.SaslFailureException
;
import
org.jivesoftware.openfire.session.*
;
import
org.jivesoftware.openfire.spi.ConnectionType
;
import
org.jivesoftware.util.CertificateManager
;
import
org.jivesoftware.util.JiveGlobals
;
import
org.jivesoftware.util.StringUtils
;
import
org.jivesoftware.util.*
;
import
org.slf4j.Logger
;
import
org.slf4j.LoggerFactory
;
import
javax.security.sasl.Sasl
;
import
javax.security.sasl.SaslException
;
import
javax.security.sasl.SaslServer
;
import
javax.security.sasl.SaslServerFactory
;
import
java.security.KeyStore
;
import
java.security.Security
;
import
java.security.cert.Certificate
;
...
...
@@ -84,8 +83,43 @@ public class SASLAuthentication {
// Add (proprietary) Providers of SASL implementation to the Java security context.
Security
.
addProvider
(
new
org
.
jivesoftware
.
openfire
.
sasl
.
SaslProvider
()
);
// Convert XML based provider setup to Database based
JiveGlobals
.
migrateProperty
(
"sasl.mechs"
);
JiveGlobals
.
migrateProperty
(
"sasl.gssapi.debug"
);
JiveGlobals
.
migrateProperty
(
"sasl.gssapi.config"
);
JiveGlobals
.
migrateProperty
(
"sasl.gssapi.useSubjectCredsOnly"
);
initMechanisms
();
org
.
jivesoftware
.
util
.
PropertyEventDispatcher
.
addListener
(
new
PropertyEventListener
()
{
@Override
public
void
propertySet
(
String
property
,
Map
<
String
,
Object
>
params
)
{
if
(
"sasl.mechs"
.
equals
(
property
)
)
{
initMechanisms
();
}
}
@Override
public
void
propertyDeleted
(
String
property
,
Map
<
String
,
Object
>
params
)
{
if
(
"sasl.mechs"
.
equals
(
property
)
)
{
initMechanisms
();
}
}
@Override
public
void
xmlPropertySet
(
String
property
,
Map
<
String
,
Object
>
params
)
{}
@Override
public
void
xmlPropertyDeleted
(
String
property
,
Map
<
String
,
Object
>
params
)
{}
}
);
}
public
enum
ElementType
{
...
...
@@ -471,59 +505,117 @@ public class SASLAuthentication {
*
* @return the list of supported SASL mechanisms by the server.
*/
public
static
Set
<
String
>
getSupportedMechanisms
()
{
Set
<
String
>
answer
=
new
HashSet
<>(
mechanisms
);
// Clean up not-available mechanisms
for
(
Iterator
<
String
>
it
=
answer
.
iterator
();
it
.
hasNext
();)
{
String
mech
=
it
.
next
();
if
(
mech
.
equals
(
"CRAM-MD5"
)
||
mech
.
equals
(
"DIGEST-MD5"
))
{
// Check if the user provider in use supports passwords retrieval. Accessing
// to the users passwords will be required by the CallbackHandler
if
(!
AuthFactory
.
supportsPasswordRetrieval
())
{
public
static
Set
<
String
>
getSupportedMechanisms
()
{
// List all mechanism names for which there's an implementation.
final
Set
<
String
>
implementedMechanisms
=
getImplementedMechanisms
();
// Start off with all mechanisms that we intend to support.
final
Set
<
String
>
answer
=
new
HashSet
<>(
mechanisms
);
// Clean up not-available mechanisms.
for
(
final
Iterator
<
String
>
it
=
answer
.
iterator
();
it
.
hasNext
();
)
{
final
String
mechanism
=
it
.
next
();
if
(
!
implementedMechanisms
.
contains
(
mechanism
)
)
{
Log
.
trace
(
"Cannot support '{}' as there's no implementation available."
,
mechanism
);
it
.
remove
();
continue
;
}
switch
(
mechanism
)
{
case
"CRAM-MD5"
:
// intended fall-through
case
"DIGEST-MD5"
:
// Check if the user provider in use supports passwords retrieval. Access to the users passwords will be required by the CallbackHandler.
if
(
!
AuthFactory
.
supportsPasswordRetrieval
()
)
{
Log
.
trace
(
"Cannot support '{}' as the AuthFactory that's in used does not support password retrieval."
,
mechanism
);
it
.
remove
();
}
else
if
(
mech
.
equals
(
"SCRAM-SHA-1"
))
{
if
(!
AuthFactory
.
supportsPasswordRetrieval
()
&&
!
AuthFactory
.
supportsScram
())
{
break
;
case
"SCRAM-SHA-1"
:
if
(
!
AuthFactory
.
supportsPasswordRetrieval
()
&&
!
AuthFactory
.
supportsScram
()
)
{
Log
.
trace
(
"Cannot support '{}' as the AuthFactory that's in used does not support password retrieval nor SCRAM."
,
mechanism
);
it
.
remove
();
}
break
;
case
"ANONYMOUS"
:
if
(
!
JiveGlobals
.
getBooleanProperty
(
"xmpp.auth.anonymous"
)
)
{
Log
.
trace
(
"Cannot support '{}' as it has been disabled by configuration."
,
mechanism
);
it
.
remove
();
}
else
if
(
mech
.
equals
(
"ANONYMOUS"
))
{
// Check anonymous is supported
if
(!
JiveGlobals
.
getBooleanProperty
(
"xmpp.auth.anonymous"
))
{
break
;
case
"JIVE-SHAREDSECRET"
:
if
(
!
JiveSharedSecretSaslServer
.
isSharedSecretAllowed
()
)
{
Log
.
trace
(
"Cannot support '{}' as it has been disabled by configuration."
,
mechanism
);
it
.
remove
();
}
break
;
case
"GSSAPI"
:
final
String
gssapiConfig
=
JiveGlobals
.
getProperty
(
"sasl.gssapi.config"
);
if
(
gssapiConfig
!=
null
)
{
System
.
setProperty
(
"java.security.krb5.debug"
,
JiveGlobals
.
getProperty
(
"sasl.gssapi.debug"
,
"false"
)
);
System
.
setProperty
(
"java.security.auth.login.config"
,
gssapiConfig
);
System
.
setProperty
(
"javax.security.auth.useSubjectCredsOnly"
,
JiveGlobals
.
getProperty
(
"sasl.gssapi.useSubjectCredsOnly"
,
"false"
)
);
}
else
if
(
mech
.
equals
(
"JIVE-SHAREDSECRET"
))
{
// Check shared secret is supported
if
(!
JiveSharedSecretSaslServer
.
isSharedSecretAllowed
())
{
else
{
Log
.
trace
(
"Cannot support '{}' as the 'sasl.gssapi.config' property has not been defined."
,
mechanism
);
it
.
remove
();
}
break
;
}
}
return
answer
;
}
/**
* Returns a collection of mechanism names for which the JVM has an implementation available.
* <p/>
* Note that this need not (and likely will not) correspond with the list of mechanisms that is offered to XMPP
* peer entities, which is provided by #getSupportedMechanisms.
*
* @return a collection of SASL mechanism names (never null, possibly empty)
*/
public
static
Set
<
String
>
getImplementedMechanisms
()
{
final
Set
<
String
>
result
=
new
HashSet
<>();
final
Enumeration
<
SaslServerFactory
>
saslServerFactories
=
Sasl
.
getSaslServerFactories
();
while
(
saslServerFactories
.
hasMoreElements
()
)
{
final
SaslServerFactory
saslServerFactory
=
saslServerFactories
.
nextElement
();
Collections
.
addAll
(
result
,
saslServerFactory
.
getMechanismNames
(
null
)
);
}
return
result
;
}
private
static
void
initMechanisms
()
{
// Convert XML based provider setup to Database based
JiveGlobals
.
migrateProperty
(
"sasl.mechs"
);
JiveGlobals
.
migrateProperty
(
"sasl.gssapi.debug"
);
JiveGlobals
.
migrateProperty
(
"sasl.gssapi.config"
);
JiveGlobals
.
migrateProperty
(
"sasl.gssapi.useSubjectCredsOnly"
);
final
String
configuration
=
JiveGlobals
.
getProperty
(
"sasl.mechs"
,
"ANONYMOUS,PLAIN,DIGEST-MD5,CRAM-MD5,SCRAM-SHA-1,JIVE-SHAREDSECRET"
);
final
String
configuration
=
JiveGlobals
.
getProperty
(
"sasl.mechs"
,
"ANONYMOUS,PLAIN,DIGEST-MD5,CRAM-MD5,SCRAM-SHA-1,JIVE-SHAREDSECRET
,GSSAPI
"
);
final
StringTokenizer
st
=
new
StringTokenizer
(
configuration
,
" ,\t\n\r\f"
);
mechanisms
=
new
HashSet
<>();
while
(
st
.
hasMoreTokens
()
)
{
final
String
mech
=
st
.
nextToken
().
toUpperCase
();
final
String
mech
anism
=
st
.
nextToken
().
toUpperCase
();
try
{
addSupportedMechanism
(
mech
);
addSupportedMechanism
(
mech
anism
);
}
catch
(
Exception
ex
)
{
Log
.
warn
(
"An exception occurred while trying to add support for SASL Mechanism '{}':"
,
mech
,
ex
);
Log
.
warn
(
"An exception occurred while trying to add support for SASL Mechanism '{}':"
,
mech
anism
,
ex
);
}
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment