8144566: Custom HostnameVerifier disables SNI extension
Reviewed-by: mullan, wetmore
This commit is contained in:
parent
4cd4074db4
commit
741bd9b060
@ -209,6 +209,12 @@ public final class SSLSocketImpl extends BaseSSLSocketImpl {
|
|||||||
Collection<SNIMatcher> sniMatchers =
|
Collection<SNIMatcher> sniMatchers =
|
||||||
Collections.<SNIMatcher>emptyList();
|
Collections.<SNIMatcher>emptyList();
|
||||||
|
|
||||||
|
// Is the serverNames set to empty with SSLParameters.setServerNames()?
|
||||||
|
private boolean noSniExtension = false;
|
||||||
|
|
||||||
|
// Is the sniMatchers set to empty with SSLParameters.setSNIMatchers()?
|
||||||
|
private boolean noSniMatcher = false;
|
||||||
|
|
||||||
// Configured application protocol values
|
// Configured application protocol values
|
||||||
String[] applicationProtocols = new String[0];
|
String[] applicationProtocols = new String[0];
|
||||||
|
|
||||||
@ -642,6 +648,11 @@ public final class SSLSocketImpl extends BaseSSLSocketImpl {
|
|||||||
}
|
}
|
||||||
|
|
||||||
super.connect(endpoint, timeout);
|
super.connect(endpoint, timeout);
|
||||||
|
|
||||||
|
if (host == null || host.length() == 0) {
|
||||||
|
useImplicitHost(false);
|
||||||
|
}
|
||||||
|
|
||||||
doneConnect();
|
doneConnect();
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -2098,41 +2109,62 @@ public final class SSLSocketImpl extends BaseSSLSocketImpl {
|
|||||||
outputRecord.setVersion(protocolVersion);
|
outputRecord.setVersion(protocolVersion);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
//
|
||||||
|
// ONLY used by ClientHandshaker for the server hostname during handshaking
|
||||||
|
//
|
||||||
synchronized String getHost() {
|
synchronized String getHost() {
|
||||||
// Note that the host may be null or empty for localhost.
|
// Note that the host may be null or empty for localhost.
|
||||||
if (host == null || host.length() == 0) {
|
if (host == null || host.length() == 0) {
|
||||||
if (!trustNameService) {
|
useImplicitHost(true);
|
||||||
// If the local name service is not trustworthy, reverse host
|
|
||||||
// name resolution should not be performed for endpoint
|
|
||||||
// identification. Use the application original specified
|
|
||||||
// hostname or IP address instead.
|
|
||||||
host = getOriginalHostname(getInetAddress());
|
|
||||||
} else {
|
|
||||||
host = getInetAddress().getHostName();
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
return host;
|
return host;
|
||||||
}
|
}
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* Get the original application specified hostname.
|
* Try to set and use the implicit specified hostname
|
||||||
*/
|
*/
|
||||||
private static String getOriginalHostname(InetAddress inetAddress) {
|
private synchronized void useImplicitHost(boolean noSniUpdate) {
|
||||||
/*
|
|
||||||
* Get the original hostname via jdk.internal.misc.SharedSecrets.
|
|
||||||
*/
|
|
||||||
JavaNetInetAddressAccess jna = SharedSecrets.getJavaNetInetAddressAccess();
|
|
||||||
String originalHostname = jna.getOriginalHostName(inetAddress);
|
|
||||||
|
|
||||||
/*
|
// Note: If the local name service is not trustworthy, reverse
|
||||||
* If no application specified hostname, use the IP address.
|
// host name resolution should not be performed for endpoint
|
||||||
*/
|
// identification. Use the application original specified
|
||||||
if (originalHostname == null || originalHostname.length() == 0) {
|
// hostname or IP address instead.
|
||||||
originalHostname = inetAddress.getHostAddress();
|
|
||||||
|
// Get the original hostname via jdk.internal.misc.SharedSecrets
|
||||||
|
InetAddress inetAddress = getInetAddress();
|
||||||
|
if (inetAddress == null) { // not connected
|
||||||
|
return;
|
||||||
}
|
}
|
||||||
|
|
||||||
return originalHostname;
|
JavaNetInetAddressAccess jna =
|
||||||
|
SharedSecrets.getJavaNetInetAddressAccess();
|
||||||
|
String originalHostname = jna.getOriginalHostName(inetAddress);
|
||||||
|
if ((originalHostname != null) &&
|
||||||
|
(originalHostname.length() != 0)) {
|
||||||
|
|
||||||
|
host = originalHostname;
|
||||||
|
if (!noSniUpdate && serverNames.isEmpty() && !noSniExtension) {
|
||||||
|
serverNames =
|
||||||
|
Utilities.addToSNIServerNameList(serverNames, host);
|
||||||
|
|
||||||
|
if (!roleIsServer &&
|
||||||
|
(handshaker != null) && !handshaker.started()) {
|
||||||
|
handshaker.setSNIServerNames(serverNames);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// No explicitly specified hostname, no server name indication.
|
||||||
|
if (!trustNameService) {
|
||||||
|
// The local name service is not trustworthy, use IP address.
|
||||||
|
host = inetAddress.getHostAddress();
|
||||||
|
} else {
|
||||||
|
// Use the underlying reverse host name resolution service.
|
||||||
|
host = getInetAddress().getHostName();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// ONLY used by HttpsClient to setup the URI specified hostname
|
// ONLY used by HttpsClient to setup the URI specified hostname
|
||||||
@ -2144,6 +2176,10 @@ public final class SSLSocketImpl extends BaseSSLSocketImpl {
|
|||||||
this.host = host;
|
this.host = host;
|
||||||
this.serverNames =
|
this.serverNames =
|
||||||
Utilities.addToSNIServerNameList(this.serverNames, this.host);
|
Utilities.addToSNIServerNameList(this.serverNames, this.host);
|
||||||
|
|
||||||
|
if (!roleIsServer && (handshaker != null) && !handshaker.started()) {
|
||||||
|
handshaker.setSNIServerNames(serverNames);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -2533,8 +2569,21 @@ public final class SSLSocketImpl extends BaseSSLSocketImpl {
|
|||||||
// the super implementation does not handle the following parameters
|
// the super implementation does not handle the following parameters
|
||||||
params.setEndpointIdentificationAlgorithm(identificationProtocol);
|
params.setEndpointIdentificationAlgorithm(identificationProtocol);
|
||||||
params.setAlgorithmConstraints(algorithmConstraints);
|
params.setAlgorithmConstraints(algorithmConstraints);
|
||||||
|
|
||||||
|
if (sniMatchers.isEmpty() && !noSniMatcher) {
|
||||||
|
// 'null' indicates none has been set
|
||||||
|
params.setSNIMatchers(null);
|
||||||
|
} else {
|
||||||
params.setSNIMatchers(sniMatchers);
|
params.setSNIMatchers(sniMatchers);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (serverNames.isEmpty() && !noSniExtension) {
|
||||||
|
// 'null' indicates none has been set
|
||||||
|
params.setServerNames(null);
|
||||||
|
} else {
|
||||||
params.setServerNames(serverNames);
|
params.setServerNames(serverNames);
|
||||||
|
}
|
||||||
|
|
||||||
params.setUseCipherSuitesOrder(preferLocalCipherSuites);
|
params.setUseCipherSuitesOrder(preferLocalCipherSuites);
|
||||||
params.setMaximumPacketSize(maximumPacketSize);
|
params.setMaximumPacketSize(maximumPacketSize);
|
||||||
params.setApplicationProtocols(applicationProtocols);
|
params.setApplicationProtocols(applicationProtocols);
|
||||||
@ -2568,11 +2617,13 @@ public final class SSLSocketImpl extends BaseSSLSocketImpl {
|
|||||||
|
|
||||||
List<SNIServerName> sniNames = params.getServerNames();
|
List<SNIServerName> sniNames = params.getServerNames();
|
||||||
if (sniNames != null) {
|
if (sniNames != null) {
|
||||||
|
noSniExtension = sniNames.isEmpty();
|
||||||
serverNames = sniNames;
|
serverNames = sniNames;
|
||||||
}
|
}
|
||||||
|
|
||||||
Collection<SNIMatcher> matchers = params.getSNIMatchers();
|
Collection<SNIMatcher> matchers = params.getSNIMatchers();
|
||||||
if (matchers != null) {
|
if (matchers != null) {
|
||||||
|
noSniMatcher = matchers.isEmpty();
|
||||||
sniMatchers = matchers;
|
sniMatchers = matchers;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
337
jdk/test/javax/net/ssl/ServerName/BestEffortOnLazyConnected.java
Normal file
337
jdk/test/javax/net/ssl/ServerName/BestEffortOnLazyConnected.java
Normal file
@ -0,0 +1,337 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
|
*
|
||||||
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU General Public License version 2 only, as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||||
|
* version 2 for more details (a copy is included in the LICENSE file that
|
||||||
|
* accompanied this code).
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License version
|
||||||
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||||
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*
|
||||||
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||||
|
* or visit www.oracle.com if you need additional information or have any
|
||||||
|
* questions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
//
|
||||||
|
// SunJSSE does not support dynamic system properties, no way to re-use
|
||||||
|
// system properties in samevm/agentvm mode.
|
||||||
|
//
|
||||||
|
|
||||||
|
/**
|
||||||
|
* @test
|
||||||
|
* @bug 8144566
|
||||||
|
* @summary Custom HostnameVerifier disables SNI extension
|
||||||
|
* @run main/othervm BestEffortOnLazyConnected
|
||||||
|
*/
|
||||||
|
|
||||||
|
import java.io.*;
|
||||||
|
import java.nio.*;
|
||||||
|
import java.nio.channels.*;
|
||||||
|
import java.util.*;
|
||||||
|
import java.net.*;
|
||||||
|
import javax.net.ssl.*;
|
||||||
|
|
||||||
|
public class BestEffortOnLazyConnected {
|
||||||
|
|
||||||
|
/*
|
||||||
|
* =============================================================
|
||||||
|
* Set the various variables needed for the tests, then
|
||||||
|
* specify what tests to run on each side.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Should we run the client or server in a separate thread?
|
||||||
|
* Both sides can throw exceptions, but do you have a preference
|
||||||
|
* as to which side should be the main thread.
|
||||||
|
*/
|
||||||
|
private static final boolean separateServerThread = true;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Where do we find the keystores?
|
||||||
|
*/
|
||||||
|
private static final String pathToStores = "../etc";
|
||||||
|
private static final String keyStoreFile = "keystore";
|
||||||
|
private static final String trustStoreFile = "truststore";
|
||||||
|
private static final String passwd = "passphrase";
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Is the server ready to serve?
|
||||||
|
*/
|
||||||
|
private static volatile boolean serverReady = false;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Turn on SSL debugging?
|
||||||
|
*/
|
||||||
|
private static final boolean debug = false;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* the fully qualified domain name of localhost
|
||||||
|
*/
|
||||||
|
private static String hostname = null;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If the client or server is doing some kind of object creation
|
||||||
|
* that the other side depends on, and that thread prematurely
|
||||||
|
* exits, you may experience a hang. The test harness will
|
||||||
|
* terminate all hung threads after its timeout has expired,
|
||||||
|
* currently 3 minutes by default, but you might try to be
|
||||||
|
* smart about it....
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Define the server side of the test.
|
||||||
|
*
|
||||||
|
* If the server prematurely exits, serverReady will be set to true
|
||||||
|
* to avoid infinite hangs.
|
||||||
|
*/
|
||||||
|
private void doServerSide() throws Exception {
|
||||||
|
SSLServerSocketFactory sslssf =
|
||||||
|
(SSLServerSocketFactory) SSLServerSocketFactory.getDefault();
|
||||||
|
try (SSLServerSocket sslServerSocket =
|
||||||
|
(SSLServerSocket) sslssf.createServerSocket(serverPort)) {
|
||||||
|
|
||||||
|
serverPort = sslServerSocket.getLocalPort();
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Signal Client, we're ready for his connect.
|
||||||
|
*/
|
||||||
|
serverReady = true;
|
||||||
|
|
||||||
|
try (SSLSocket sslSocket = (SSLSocket)sslServerSocket.accept()) {
|
||||||
|
InputStream sslIS = sslSocket.getInputStream();
|
||||||
|
OutputStream sslOS = sslSocket.getOutputStream();
|
||||||
|
|
||||||
|
sslIS.read();
|
||||||
|
sslOS.write(85);
|
||||||
|
sslOS.flush();
|
||||||
|
|
||||||
|
ExtendedSSLSession session =
|
||||||
|
(ExtendedSSLSession)sslSocket.getSession();
|
||||||
|
if (session.getRequestedServerNames().isEmpty()) {
|
||||||
|
throw new Exception("No expected Server Name Indication");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Define the client side of the test.
|
||||||
|
*
|
||||||
|
* If the server prematurely exits, serverReady will be set to true
|
||||||
|
* to avoid infinite hangs.
|
||||||
|
*/
|
||||||
|
private void doClientSide() throws Exception {
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Wait for server to get started.
|
||||||
|
*/
|
||||||
|
while (!serverReady) {
|
||||||
|
Thread.sleep(50);
|
||||||
|
}
|
||||||
|
|
||||||
|
SSLSocketFactory sslsf =
|
||||||
|
(SSLSocketFactory) SSLSocketFactory.getDefault();
|
||||||
|
|
||||||
|
try (SSLSocket sslSocket = (SSLSocket)sslsf.createSocket()) {
|
||||||
|
|
||||||
|
sslSocket.connect(new InetSocketAddress(hostname, serverPort), 0);
|
||||||
|
|
||||||
|
InputStream sslIS = sslSocket.getInputStream();
|
||||||
|
OutputStream sslOS = sslSocket.getOutputStream();
|
||||||
|
|
||||||
|
sslOS.write(280);
|
||||||
|
sslOS.flush();
|
||||||
|
sslIS.read();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
/*
|
||||||
|
* =============================================================
|
||||||
|
* The remainder is just support stuff
|
||||||
|
*/
|
||||||
|
|
||||||
|
// use any free port by default
|
||||||
|
private volatile int serverPort = 0;
|
||||||
|
|
||||||
|
private volatile Exception serverException = null;
|
||||||
|
private volatile Exception clientException = null;
|
||||||
|
|
||||||
|
public static void main(String[] args) throws Exception {
|
||||||
|
String keyFilename =
|
||||||
|
System.getProperty("test.src", ".") + "/" + pathToStores +
|
||||||
|
"/" + keyStoreFile;
|
||||||
|
String trustFilename =
|
||||||
|
System.getProperty("test.src", ".") + "/" + pathToStores +
|
||||||
|
"/" + trustStoreFile;
|
||||||
|
|
||||||
|
System.setProperty("javax.net.ssl.keyStore", keyFilename);
|
||||||
|
System.setProperty("javax.net.ssl.keyStorePassword", passwd);
|
||||||
|
System.setProperty("javax.net.ssl.trustStore", trustFilename);
|
||||||
|
System.setProperty("javax.net.ssl.trustStorePassword", passwd);
|
||||||
|
|
||||||
|
if (debug) {
|
||||||
|
System.setProperty("javax.net.debug", "all");
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
hostname = InetAddress.getLocalHost().getCanonicalHostName();
|
||||||
|
} catch (UnknownHostException uhe) {
|
||||||
|
System.out.println(
|
||||||
|
"Ignore the test as the local hostname cannot be determined");
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
System.out.println(
|
||||||
|
"The fully qualified domain name of the local host is " +
|
||||||
|
hostname);
|
||||||
|
// Ignore the test if the hostname does not sound like a domain name.
|
||||||
|
if ((hostname == null) || hostname.isEmpty() ||
|
||||||
|
hostname.startsWith("localhost") ||
|
||||||
|
Character.isDigit(hostname.charAt(hostname.length() - 1))) {
|
||||||
|
|
||||||
|
System.out.println("Ignore the test as the local hostname " +
|
||||||
|
"cannot be determined as fully qualified domain name");
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Start the tests.
|
||||||
|
*/
|
||||||
|
new BestEffortOnLazyConnected();
|
||||||
|
}
|
||||||
|
|
||||||
|
private Thread clientThread = null;
|
||||||
|
private Thread serverThread = null;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Primary constructor, used to drive remainder of the test.
|
||||||
|
*
|
||||||
|
* Fork off the other side, then do your work.
|
||||||
|
*/
|
||||||
|
BestEffortOnLazyConnected() throws Exception {
|
||||||
|
try {
|
||||||
|
if (separateServerThread) {
|
||||||
|
startServer(true);
|
||||||
|
startClient(false);
|
||||||
|
} else {
|
||||||
|
startClient(true);
|
||||||
|
startServer(false);
|
||||||
|
}
|
||||||
|
} catch (Exception e) {
|
||||||
|
// swallow for now. Show later
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Wait for other side to close down.
|
||||||
|
*/
|
||||||
|
if (separateServerThread) {
|
||||||
|
serverThread.join();
|
||||||
|
} else {
|
||||||
|
clientThread.join();
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* When we get here, the test is pretty much over.
|
||||||
|
* Which side threw the error?
|
||||||
|
*/
|
||||||
|
Exception local;
|
||||||
|
Exception remote;
|
||||||
|
String whichRemote;
|
||||||
|
|
||||||
|
if (separateServerThread) {
|
||||||
|
remote = serverException;
|
||||||
|
local = clientException;
|
||||||
|
whichRemote = "server";
|
||||||
|
} else {
|
||||||
|
remote = clientException;
|
||||||
|
local = serverException;
|
||||||
|
whichRemote = "client";
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If both failed, return the curthread's exception, but also
|
||||||
|
* print the remote side Exception
|
||||||
|
*/
|
||||||
|
if ((local != null) && (remote != null)) {
|
||||||
|
System.out.println(whichRemote + " also threw:");
|
||||||
|
remote.printStackTrace();
|
||||||
|
System.out.println();
|
||||||
|
throw local;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (remote != null) {
|
||||||
|
throw remote;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (local != null) {
|
||||||
|
throw local;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void startServer(boolean newThread) throws Exception {
|
||||||
|
if (newThread) {
|
||||||
|
serverThread = new Thread() {
|
||||||
|
public void run() {
|
||||||
|
try {
|
||||||
|
doServerSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
/*
|
||||||
|
* Our server thread just died.
|
||||||
|
*
|
||||||
|
* Release the client, if not active already...
|
||||||
|
*/
|
||||||
|
System.err.println("Server died...");
|
||||||
|
serverReady = true;
|
||||||
|
serverException = e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
serverThread.start();
|
||||||
|
} else {
|
||||||
|
try {
|
||||||
|
doServerSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
serverException = e;
|
||||||
|
} finally {
|
||||||
|
serverReady = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void startClient(boolean newThread) throws Exception {
|
||||||
|
if (newThread) {
|
||||||
|
clientThread = new Thread() {
|
||||||
|
public void run() {
|
||||||
|
try {
|
||||||
|
doClientSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
/*
|
||||||
|
* Our client thread just died.
|
||||||
|
*/
|
||||||
|
System.err.println("Client died...");
|
||||||
|
clientException = e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
clientThread.start();
|
||||||
|
} else {
|
||||||
|
try {
|
||||||
|
doClientSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
clientException = e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
@ -0,0 +1,390 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2016, Oracle and/or its affiliates. All rights reserved.
|
||||||
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||||
|
*
|
||||||
|
* This code is free software; you can redistribute it and/or modify it
|
||||||
|
* under the terms of the GNU General Public License version 2 only, as
|
||||||
|
* published by the Free Software Foundation.
|
||||||
|
*
|
||||||
|
* This code is distributed in the hope that it will be useful, but WITHOUT
|
||||||
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||||
|
* version 2 for more details (a copy is included in the LICENSE file that
|
||||||
|
* accompanied this code).
|
||||||
|
*
|
||||||
|
* You should have received a copy of the GNU General Public License version
|
||||||
|
* 2 along with this work; if not, write to the Free Software Foundation,
|
||||||
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||||
|
*
|
||||||
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||||
|
* or visit www.oracle.com if you need additional information or have any
|
||||||
|
* questions.
|
||||||
|
*/
|
||||||
|
|
||||||
|
//
|
||||||
|
// SunJSSE does not support dynamic system properties, no way to re-use
|
||||||
|
// system properties in samevm/agentvm mode.
|
||||||
|
//
|
||||||
|
|
||||||
|
/*
|
||||||
|
* @test
|
||||||
|
* @bug 8144566
|
||||||
|
* @summary Custom HostnameVerifier disables SNI extension
|
||||||
|
* @run main/othervm ImpactOnSNI
|
||||||
|
*/
|
||||||
|
|
||||||
|
import java.io.*;
|
||||||
|
import java.net.*;
|
||||||
|
import javax.net.ssl.*;
|
||||||
|
|
||||||
|
public class ImpactOnSNI {
|
||||||
|
|
||||||
|
/*
|
||||||
|
* =============================================================
|
||||||
|
* Set the various variables needed for the tests, then
|
||||||
|
* specify what tests to run on each side.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Should we run the client or server in a separate thread?
|
||||||
|
* Both sides can throw exceptions, but do you have a preference
|
||||||
|
* as to which side should be the main thread.
|
||||||
|
*/
|
||||||
|
private static final boolean separateServerThread = true;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Where do we find the keystores?
|
||||||
|
*/
|
||||||
|
private static final String pathToStores =
|
||||||
|
"../../../../../../javax/net/ssl/etc";
|
||||||
|
private static final String keyStoreFile = "keystore";
|
||||||
|
private static final String trustStoreFile = "truststore";
|
||||||
|
private static final String passwd = "passphrase";
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Is the server ready to serve?
|
||||||
|
*/
|
||||||
|
private static volatile boolean serverReady = false;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Is the connection ready to close?
|
||||||
|
*/
|
||||||
|
private static volatile boolean closeReady = false;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Turn on SSL debugging?
|
||||||
|
*/
|
||||||
|
private static final boolean debug = false;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Message posted
|
||||||
|
*/
|
||||||
|
private static final String postMsg = "HTTP post on a https server";
|
||||||
|
|
||||||
|
/*
|
||||||
|
* the fully qualified domain name of localhost
|
||||||
|
*/
|
||||||
|
private static String hostname = null;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If the client or server is doing some kind of object creation
|
||||||
|
* that the other side depends on, and that thread prematurely
|
||||||
|
* exits, you may experience a hang. The test harness will
|
||||||
|
* terminate all hung threads after its timeout has expired,
|
||||||
|
* currently 3 minutes by default, but you might try to be
|
||||||
|
* smart about it....
|
||||||
|
*/
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Define the server side of the test.
|
||||||
|
*
|
||||||
|
* If the server prematurely exits, serverReady will be set to true
|
||||||
|
* to avoid infinite hangs.
|
||||||
|
*/
|
||||||
|
private void doServerSide() throws Exception {
|
||||||
|
SSLServerSocketFactory sslssf =
|
||||||
|
(SSLServerSocketFactory)SSLServerSocketFactory.getDefault();
|
||||||
|
try (SSLServerSocket sslServerSocket =
|
||||||
|
(SSLServerSocket)sslssf.createServerSocket(serverPort)) {
|
||||||
|
|
||||||
|
serverPort = sslServerSocket.getLocalPort();
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Signal Client, we're ready for his connect.
|
||||||
|
*/
|
||||||
|
serverReady = true;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Accept connections
|
||||||
|
*/
|
||||||
|
try (SSLSocket sslSocket = (SSLSocket)sslServerSocket.accept()) {
|
||||||
|
InputStream sslIS = sslSocket.getInputStream();
|
||||||
|
OutputStream sslOS = sslSocket.getOutputStream();
|
||||||
|
BufferedReader br =
|
||||||
|
new BufferedReader(new InputStreamReader(sslIS));
|
||||||
|
PrintStream ps = new PrintStream(sslOS);
|
||||||
|
|
||||||
|
// process HTTP POST request from client
|
||||||
|
System.out.println("status line: " + br.readLine());
|
||||||
|
String msg = null;
|
||||||
|
while ((msg = br.readLine()) != null && msg.length() > 0);
|
||||||
|
|
||||||
|
msg = br.readLine();
|
||||||
|
if (msg.equals(postMsg)) {
|
||||||
|
ps.println("HTTP/1.1 200 OK\n\n");
|
||||||
|
} else {
|
||||||
|
ps.println("HTTP/1.1 500 Not OK\n\n");
|
||||||
|
}
|
||||||
|
ps.flush();
|
||||||
|
|
||||||
|
ExtendedSSLSession session =
|
||||||
|
(ExtendedSSLSession)sslSocket.getSession();
|
||||||
|
if (session.getRequestedServerNames().isEmpty()) {
|
||||||
|
throw new Exception("No expected Server Name Indication");
|
||||||
|
}
|
||||||
|
|
||||||
|
// close the socket
|
||||||
|
while (!closeReady) {
|
||||||
|
Thread.sleep(50);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Define the client side of the test.
|
||||||
|
*
|
||||||
|
* If the server prematurely exits, serverReady will be set to true
|
||||||
|
* to avoid infinite hangs.
|
||||||
|
*/
|
||||||
|
private void doClientSide() throws Exception {
|
||||||
|
/*
|
||||||
|
* Wait for server to get started.
|
||||||
|
*/
|
||||||
|
while (!serverReady) {
|
||||||
|
Thread.sleep(50);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Send HTTP POST request to server
|
||||||
|
URL url = new URL("https://" + hostname + ":" + serverPort);
|
||||||
|
|
||||||
|
HttpsURLConnection.setDefaultHostnameVerifier(new NameVerifier());
|
||||||
|
HttpsURLConnection http = (HttpsURLConnection)url.openConnection();
|
||||||
|
http.setDoOutput(true);
|
||||||
|
|
||||||
|
http.setRequestMethod("POST");
|
||||||
|
PrintStream ps = new PrintStream(http.getOutputStream());
|
||||||
|
try {
|
||||||
|
ps.println(postMsg);
|
||||||
|
ps.flush();
|
||||||
|
if (http.getResponseCode() != 200) {
|
||||||
|
throw new RuntimeException("test Failed");
|
||||||
|
}
|
||||||
|
} finally {
|
||||||
|
ps.close();
|
||||||
|
http.disconnect();
|
||||||
|
closeReady = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private static class NameVerifier implements HostnameVerifier {
|
||||||
|
public boolean verify(String hostname, SSLSession session) {
|
||||||
|
return true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* =============================================================
|
||||||
|
* The remainder is just support stuff
|
||||||
|
*/
|
||||||
|
|
||||||
|
// use any free port by default
|
||||||
|
private volatile int serverPort = 0;
|
||||||
|
|
||||||
|
private volatile Exception serverException = null;
|
||||||
|
private volatile Exception clientException = null;
|
||||||
|
|
||||||
|
public static void main(String[] args) throws Exception {
|
||||||
|
String keyFilename =
|
||||||
|
System.getProperty("test.src", "./") + "/" + pathToStores +
|
||||||
|
"/" + keyStoreFile;
|
||||||
|
String trustFilename =
|
||||||
|
System.getProperty("test.src", "./") + "/" + pathToStores +
|
||||||
|
"/" + trustStoreFile;
|
||||||
|
|
||||||
|
System.setProperty("javax.net.ssl.keyStore", keyFilename);
|
||||||
|
System.setProperty("javax.net.ssl.keyStorePassword", passwd);
|
||||||
|
System.setProperty("javax.net.ssl.trustStore", trustFilename);
|
||||||
|
System.setProperty("javax.net.ssl.trustStorePassword", passwd);
|
||||||
|
|
||||||
|
if (debug) {
|
||||||
|
System.setProperty("javax.net.debug", "all");
|
||||||
|
}
|
||||||
|
|
||||||
|
try {
|
||||||
|
hostname = InetAddress.getLocalHost().getCanonicalHostName();
|
||||||
|
} catch (UnknownHostException uhe) {
|
||||||
|
System.out.println(
|
||||||
|
"Ignore the test as the local hostname cannot be determined");
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
System.out.println(
|
||||||
|
"The fully qualified domain name of the local host is " +
|
||||||
|
hostname);
|
||||||
|
// Ignore the test if the hostname does not sound like a domain name.
|
||||||
|
if ((hostname == null) || hostname.isEmpty() ||
|
||||||
|
hostname.startsWith("localhost") ||
|
||||||
|
Character.isDigit(hostname.charAt(hostname.length() - 1))) {
|
||||||
|
|
||||||
|
System.out.println("Ignore the test as the local hostname " +
|
||||||
|
"cannot be determined as fully qualified domain name");
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Start the tests.
|
||||||
|
*/
|
||||||
|
new ImpactOnSNI();
|
||||||
|
}
|
||||||
|
|
||||||
|
private Thread clientThread = null;
|
||||||
|
private Thread serverThread = null;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Primary constructor, used to drive remainder of the test.
|
||||||
|
*
|
||||||
|
* Fork off the other side, then do your work.
|
||||||
|
*/
|
||||||
|
ImpactOnSNI() throws Exception {
|
||||||
|
Exception startException = null;
|
||||||
|
try {
|
||||||
|
if (separateServerThread) {
|
||||||
|
startServer(true);
|
||||||
|
startClient(false);
|
||||||
|
} else {
|
||||||
|
startClient(true);
|
||||||
|
startServer(false);
|
||||||
|
}
|
||||||
|
} catch (Exception e) {
|
||||||
|
startException = e;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Wait for other side to close down.
|
||||||
|
*/
|
||||||
|
if (separateServerThread) {
|
||||||
|
if (serverThread != null) {
|
||||||
|
serverThread.join();
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (clientThread != null) {
|
||||||
|
clientThread.join();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* When we get here, the test is pretty much over.
|
||||||
|
* Which side threw the error?
|
||||||
|
*/
|
||||||
|
Exception local;
|
||||||
|
Exception remote;
|
||||||
|
|
||||||
|
if (separateServerThread) {
|
||||||
|
remote = serverException;
|
||||||
|
local = clientException;
|
||||||
|
} else {
|
||||||
|
remote = clientException;
|
||||||
|
local = serverException;
|
||||||
|
}
|
||||||
|
|
||||||
|
Exception exception = null;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Check various exception conditions.
|
||||||
|
*/
|
||||||
|
if ((local != null) && (remote != null)) {
|
||||||
|
// If both failed, return the curthread's exception.
|
||||||
|
local.initCause(remote);
|
||||||
|
exception = local;
|
||||||
|
} else if (local != null) {
|
||||||
|
exception = local;
|
||||||
|
} else if (remote != null) {
|
||||||
|
exception = remote;
|
||||||
|
} else if (startException != null) {
|
||||||
|
exception = startException;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* If there was an exception *AND* a startException,
|
||||||
|
* output it.
|
||||||
|
*/
|
||||||
|
if (exception != null) {
|
||||||
|
if (exception != startException && startException != null) {
|
||||||
|
exception.addSuppressed(startException);
|
||||||
|
}
|
||||||
|
throw exception;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Fall-through: no exception to throw!
|
||||||
|
}
|
||||||
|
|
||||||
|
private void startServer(boolean newThread) throws Exception {
|
||||||
|
if (newThread) {
|
||||||
|
serverThread = new Thread() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
try {
|
||||||
|
doServerSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
/*
|
||||||
|
* Our server thread just died.
|
||||||
|
*
|
||||||
|
* Release the client, if not active already...
|
||||||
|
*/
|
||||||
|
System.err.println("Server died...");
|
||||||
|
serverReady = true;
|
||||||
|
serverException = e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
serverThread.start();
|
||||||
|
} else {
|
||||||
|
try {
|
||||||
|
doServerSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
serverException = e;
|
||||||
|
} finally {
|
||||||
|
serverReady = true;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private void startClient(boolean newThread) throws Exception {
|
||||||
|
if (newThread) {
|
||||||
|
clientThread = new Thread() {
|
||||||
|
@Override
|
||||||
|
public void run() {
|
||||||
|
try {
|
||||||
|
doClientSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
/*
|
||||||
|
* Our client thread just died.
|
||||||
|
*/
|
||||||
|
System.err.println("Client died...");
|
||||||
|
clientException = e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
};
|
||||||
|
clientThread.start();
|
||||||
|
} else {
|
||||||
|
try {
|
||||||
|
doClientSide();
|
||||||
|
} catch (Exception e) {
|
||||||
|
clientException = e;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
Loading…
x
Reference in New Issue
Block a user