1 /*
2  * Copyright (c) 2003, 2008, Oracle and/or its affiliates. All rights reserved.
3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4  *
5  * This code is free software; you can redistribute it and/or modify it
6  * under the terms of the GNU General Public License version 2 only, as
7  * published by the Free Software Foundation.  Oracle designates this
8  * particular file as subject to the "Classpath" exception as provided
9  * by Oracle in the LICENSE file that accompanied this code.
10  *
11  * This code is distributed in the hope that it will be useful, but WITHOUT
12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
14  * version 2 for more details (a copy is included in the LICENSE file that
15  * accompanied this code).
16  *
17  * You should have received a copy of the GNU General Public License version
18  * 2 along with this work; if not, write to the Free Software Foundation,
19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
20  *
21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
22  * or visit www.oracle.com if you need additional information or have any
23  * questions.
24  */
25 
26 package javax.rmi.ssl;
27 
28 import java.io.IOException;
29 import java.net.ServerSocket;
30 import java.net.Socket;
31 import java.rmi.server.RMIServerSocketFactory;
32 import java.util.Arrays;
33 import java.util.List;
34 import javax.net.ssl.SSLContext;
35 import javax.net.ssl.SSLServerSocketFactory;
36 import javax.net.ssl.SSLSocket;
37 import javax.net.ssl.SSLSocketFactory;
38 
39 /**
40  * <p>An <code>SslRMIServerSocketFactory</code> instance is used by the RMI
41  * runtime in order to obtain server sockets for RMI calls via SSL.</p>
42  *
43  * <p>This class implements <code>RMIServerSocketFactory</code> over
44  * the Secure Sockets Layer (SSL) or Transport Layer Security (TLS)
45  * protocols.</p>
46  *
47  * <p>This class creates SSL sockets using the default
48  * <code>SSLSocketFactory</code> (see {@link
49  * SSLSocketFactory#getDefault}) or the default
50  * <code>SSLServerSocketFactory</code> (see {@link
51  * SSLServerSocketFactory#getDefault}) unless the
52  * constructor taking an <code>SSLContext</code> is
53  * used in which case the SSL sockets are created using
54  * the <code>SSLSocketFactory</code> returned by
55  * {@link SSLContext#getSocketFactory} or the
56  * <code>SSLServerSocketFactory</code> returned by
57  * {@link SSLContext#getServerSocketFactory}.
58  *
59  * When an <code>SSLContext</code> is not supplied all the instances of this
60  * class share the same keystore, and the same truststore (when client
61  * authentication is required by the server). This behavior can be modified
62  * by supplying an already initialized <code>SSLContext</code> instance.
63  *
64  * @see javax.net.ssl.SSLSocketFactory
65  * @see javax.net.ssl.SSLServerSocketFactory
66  * @see javax.rmi.ssl.SslRMIClientSocketFactory
67  * @since 1.5
68  */
69 public class SslRMIServerSocketFactory implements RMIServerSocketFactory {
70 
71     /**
72      * <p>Creates a new <code>SslRMIServerSocketFactory</code> with
73      * the default SSL socket configuration.</p>
74      *
75      * <p>SSL connections accepted by server sockets created by this
76      * factory have the default cipher suites and protocol versions
77      * enabled and do not require client authentication.</p>
78      */
SslRMIServerSocketFactory()79     public SslRMIServerSocketFactory() {
80         this(null, null, false);
81     }
82 
83     /**
84      * <p>Creates a new <code>SslRMIServerSocketFactory</code> with
85      * the specified SSL socket configuration.</p>
86      *
87      * @param enabledCipherSuites names of all the cipher suites to
88      * enable on SSL connections accepted by server sockets created by
89      * this factory, or <code>null</code> to use the cipher suites
90      * that are enabled by default
91      *
92      * @param enabledProtocols names of all the protocol versions to
93      * enable on SSL connections accepted by server sockets created by
94      * this factory, or <code>null</code> to use the protocol versions
95      * that are enabled by default
96      *
97      * @param needClientAuth <code>true</code> to require client
98      * authentication on SSL connections accepted by server sockets
99      * created by this factory; <code>false</code> to not require
100      * client authentication
101      *
102      * @exception IllegalArgumentException when one or more of the cipher
103      * suites named by the <code>enabledCipherSuites</code> parameter is
104      * not supported, when one or more of the protocols named by the
105      * <code>enabledProtocols</code> parameter is not supported or when
106      * a problem is encountered while trying to check if the supplied
107      * cipher suites and protocols to be enabled are supported.
108      *
109      * @see SSLSocket#setEnabledCipherSuites
110      * @see SSLSocket#setEnabledProtocols
111      * @see SSLSocket#setNeedClientAuth
112      */
SslRMIServerSocketFactory( String[] enabledCipherSuites, String[] enabledProtocols, boolean needClientAuth)113     public SslRMIServerSocketFactory(
114             String[] enabledCipherSuites,
115             String[] enabledProtocols,
116             boolean needClientAuth)
117             throws IllegalArgumentException {
118         this(null, enabledCipherSuites, enabledProtocols, needClientAuth);
119     }
120 
121     /**
122      * <p>Creates a new <code>SslRMIServerSocketFactory</code> with the
123      * specified <code>SSLContext</code> and SSL socket configuration.</p>
124      *
125      * @param context the SSL context to be used for creating SSL sockets.
126      * If <code>context</code> is null the default <code>SSLSocketFactory</code>
127      * or the default <code>SSLServerSocketFactory</code> will be used to
128      * create SSL sockets. Otherwise, the socket factory returned by
129      * <code>SSLContext.getSocketFactory()</code> or
130      * <code>SSLContext.getServerSocketFactory()</code> will be used instead.
131      *
132      * @param enabledCipherSuites names of all the cipher suites to
133      * enable on SSL connections accepted by server sockets created by
134      * this factory, or <code>null</code> to use the cipher suites
135      * that are enabled by default
136      *
137      * @param enabledProtocols names of all the protocol versions to
138      * enable on SSL connections accepted by server sockets created by
139      * this factory, or <code>null</code> to use the protocol versions
140      * that are enabled by default
141      *
142      * @param needClientAuth <code>true</code> to require client
143      * authentication on SSL connections accepted by server sockets
144      * created by this factory; <code>false</code> to not require
145      * client authentication
146      *
147      * @exception IllegalArgumentException when one or more of the cipher
148      * suites named by the <code>enabledCipherSuites</code> parameter is
149      * not supported, when one or more of the protocols named by the
150      * <code>enabledProtocols</code> parameter is not supported or when
151      * a problem is encountered while trying to check if the supplied
152      * cipher suites and protocols to be enabled are supported.
153      *
154      * @see SSLSocket#setEnabledCipherSuites
155      * @see SSLSocket#setEnabledProtocols
156      * @see SSLSocket#setNeedClientAuth
157      * @since 1.7
158      */
SslRMIServerSocketFactory( SSLContext context, String[] enabledCipherSuites, String[] enabledProtocols, boolean needClientAuth)159     public SslRMIServerSocketFactory(
160             SSLContext context,
161             String[] enabledCipherSuites,
162             String[] enabledProtocols,
163             boolean needClientAuth)
164             throws IllegalArgumentException {
165         // Initialize the configuration parameters.
166         //
167         this.enabledCipherSuites = enabledCipherSuites == null ?
168             null : enabledCipherSuites.clone();
169         this.enabledProtocols = enabledProtocols == null ?
170             null : enabledProtocols.clone();
171         this.needClientAuth = needClientAuth;
172 
173         // Force the initialization of the default at construction time,
174         // rather than delaying it to the first time createServerSocket()
175         // is called.
176         //
177         this.context = context;
178         final SSLSocketFactory sslSocketFactory =
179                 context == null ?
180                     getDefaultSSLSocketFactory() : context.getSocketFactory();
181         SSLSocket sslSocket = null;
182         if (this.enabledCipherSuites != null || this.enabledProtocols != null) {
183             try {
184                 sslSocket = (SSLSocket) sslSocketFactory.createSocket();
185             } catch (Exception e) {
186                 final String msg = "Unable to check if the cipher suites " +
187                         "and protocols to enable are supported";
188                 throw (IllegalArgumentException)
189                 new IllegalArgumentException(msg).initCause(e);
190             }
191         }
192 
193         // Check if all the cipher suites and protocol versions to enable
194         // are supported by the underlying SSL/TLS implementation and if
195         // true create lists from arrays.
196         //
197         if (this.enabledCipherSuites != null) {
198             sslSocket.setEnabledCipherSuites(this.enabledCipherSuites);
199             enabledCipherSuitesList = Arrays.asList(this.enabledCipherSuites);
200         }
201         if (this.enabledProtocols != null) {
202             sslSocket.setEnabledProtocols(this.enabledProtocols);
203             enabledProtocolsList = Arrays.asList(this.enabledProtocols);
204         }
205     }
206 
207     /**
208      * <p>Returns the names of the cipher suites enabled on SSL
209      * connections accepted by server sockets created by this factory,
210      * or <code>null</code> if this factory uses the cipher suites
211      * that are enabled by default.</p>
212      *
213      * @return an array of cipher suites enabled, or <code>null</code>
214      *
215      * @see SSLSocket#setEnabledCipherSuites
216      */
getEnabledCipherSuites()217     public final String[] getEnabledCipherSuites() {
218         return enabledCipherSuites == null ?
219             null : enabledCipherSuites.clone();
220     }
221 
222     /**
223      * <p>Returns the names of the protocol versions enabled on SSL
224      * connections accepted by server sockets created by this factory,
225      * or <code>null</code> if this factory uses the protocol versions
226      * that are enabled by default.</p>
227      *
228      * @return an array of protocol versions enabled, or
229      * <code>null</code>
230      *
231      * @see SSLSocket#setEnabledProtocols
232      */
getEnabledProtocols()233     public final String[] getEnabledProtocols() {
234         return enabledProtocols == null ?
235             null : enabledProtocols.clone();
236     }
237 
238     /**
239      * <p>Returns <code>true</code> if client authentication is
240      * required on SSL connections accepted by server sockets created
241      * by this factory.</p>
242      *
243      * @return <code>true</code> if client authentication is required
244      *
245      * @see SSLSocket#setNeedClientAuth
246      */
getNeedClientAuth()247     public final boolean getNeedClientAuth() {
248         return needClientAuth;
249     }
250 
251     /**
252      * <p>Creates a server socket that accepts SSL connections
253      * configured according to this factory's SSL socket configuration
254      * parameters.</p>
255      */
createServerSocket(int port)256     public ServerSocket createServerSocket(int port) throws IOException {
257         final SSLSocketFactory sslSocketFactory =
258                 context == null ?
259                     getDefaultSSLSocketFactory() : context.getSocketFactory();
260         return new ServerSocket(port) {
261             public Socket accept() throws IOException {
262                 Socket socket = super.accept();
263                 SSLSocket sslSocket = (SSLSocket) sslSocketFactory.createSocket(
264                         socket, socket.getInetAddress().getHostName(),
265                         socket.getPort(), true);
266                 sslSocket.setUseClientMode(false);
267                 if (enabledCipherSuites != null) {
268                     sslSocket.setEnabledCipherSuites(enabledCipherSuites);
269                 }
270                 if (enabledProtocols != null) {
271                     sslSocket.setEnabledProtocols(enabledProtocols);
272                 }
273                 sslSocket.setNeedClientAuth(needClientAuth);
274                 return sslSocket;
275             }
276         };
277     }
278 
279     /**
280      * <p>Indicates whether some other object is "equal to" this one.</p>
281      *
282      * <p>Two <code>SslRMIServerSocketFactory</code> objects are equal
283      * if they have been constructed with the same SSL context and
284      * SSL socket configuration parameters.</p>
285      *
286      * <p>A subclass should override this method (as well as
287      * {@link #hashCode()}) if it adds instance state that affects
288      * equality.</p>
289      */
290     public boolean equals(Object obj) {
291         if (obj == null) return false;
292         if (obj == this) return true;
293         if (!(obj instanceof SslRMIServerSocketFactory))
294             return false;
295         SslRMIServerSocketFactory that = (SslRMIServerSocketFactory) obj;
296         return (getClass().equals(that.getClass()) && checkParameters(that));
297     }
298 
299     private boolean checkParameters(SslRMIServerSocketFactory that) {
300         // SSL context
301         //
302         if (context == null ? that.context != null : !context.equals(that.context))
303             return false;
304 
305         // needClientAuth flag
306         //
307         if (needClientAuth != that.needClientAuth)
308             return false;
309 
310         // enabledCipherSuites
311         //
312         if ((enabledCipherSuites == null && that.enabledCipherSuites != null) ||
313                 (enabledCipherSuites != null && that.enabledCipherSuites == null))
314             return false;
315         if (enabledCipherSuites != null && that.enabledCipherSuites != null) {
316             List<String> thatEnabledCipherSuitesList =
317                     Arrays.asList(that.enabledCipherSuites);
318             if (!enabledCipherSuitesList.equals(thatEnabledCipherSuitesList))
319                 return false;
320         }
321 
322         // enabledProtocols
323         //
324         if ((enabledProtocols == null && that.enabledProtocols != null) ||
325                 (enabledProtocols != null && that.enabledProtocols == null))
326             return false;
327         if (enabledProtocols != null && that.enabledProtocols != null) {
328             List<String> thatEnabledProtocolsList =
329                     Arrays.asList(that.enabledProtocols);
330             if (!enabledProtocolsList.equals(thatEnabledProtocolsList))
331                 return false;
332         }
333 
334         return true;
335     }
336 
337     /**
338      * <p>Returns a hash code value for this
339      * <code>SslRMIServerSocketFactory</code>.</p>
340      *
341      * @return a hash code value for this
342      * <code>SslRMIServerSocketFactory</code>.
343      */
344     public int hashCode() {
345         return getClass().hashCode() +
346                 (context == null ? 0 : context.hashCode()) +
347                 (needClientAuth ? Boolean.TRUE.hashCode() : Boolean.FALSE.hashCode()) +
348                 (enabledCipherSuites == null ? 0 : enabledCipherSuitesList.hashCode()) +
349                 (enabledProtocols == null ? 0 : enabledProtocolsList.hashCode());
350     }
351 
352     // We use a static field because:
353     //
354     //    SSLSocketFactory.getDefault() always returns the same object
355     //    (at least on Sun's implementation), and we want to make sure
356     //    that the Javadoc & the implementation stay in sync.
357     //
358     // If someone needs to have different SslRMIServerSocketFactory
359     // factories with different underlying SSLSocketFactory objects
360     // using different keystores and truststores, he/she can always
361     // use the constructor that takes an SSLContext as input.
362     //
363     private static SSLSocketFactory defaultSSLSocketFactory = null;
364 
365     private static synchronized SSLSocketFactory getDefaultSSLSocketFactory() {
366         if (defaultSSLSocketFactory == null)
367             defaultSSLSocketFactory =
368                     (SSLSocketFactory) SSLSocketFactory.getDefault();
369         return defaultSSLSocketFactory;
370     }
371 
372     private final String[] enabledCipherSuites;
373     private final String[] enabledProtocols;
374     private final boolean needClientAuth;
375     private List<String> enabledCipherSuitesList;
376     private List<String> enabledProtocolsList;
377     private SSLContext context;
378 }
379