TimestampCheck.java revision 11312:5c61ccd9c162
1/* 2 * Copyright (c) 2003, 2015, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 */ 23 24import com.sun.net.httpserver.*; 25import java.io.BufferedReader; 26import java.io.ByteArrayOutputStream; 27import java.io.FileInputStream; 28import java.io.IOException; 29import java.io.InputStream; 30import java.io.InputStreamReader; 31import java.io.OutputStream; 32import java.math.BigInteger; 33import java.net.InetSocketAddress; 34import java.security.KeyStore; 35import java.security.PrivateKey; 36import java.security.Signature; 37import java.security.cert.Certificate; 38import java.security.cert.X509Certificate; 39import java.util.Calendar; 40import java.util.jar.JarEntry; 41import java.util.jar.JarFile; 42 43import sun.misc.IOUtils; 44import sun.security.pkcs.ContentInfo; 45import sun.security.pkcs.PKCS7; 46import sun.security.pkcs.PKCS9Attribute; 47import sun.security.pkcs.SignerInfo; 48import sun.security.timestamp.TimestampToken; 49import sun.security.util.DerOutputStream; 50import sun.security.util.DerValue; 51import sun.security.util.ObjectIdentifier; 52import sun.security.x509.AlgorithmId; 53import sun.security.x509.X500Name; 54 55public class TimestampCheck { 56 static final String TSKS = "tsks"; 57 static final String JAR = "old.jar"; 58 59 static final String defaultPolicyId = "2.3.4.5"; 60 61 static class Handler implements HttpHandler, AutoCloseable { 62 63 private final HttpServer httpServer; 64 private final String keystore; 65 66 @Override 67 public void handle(HttpExchange t) throws IOException { 68 int len = 0; 69 for (String h: t.getRequestHeaders().keySet()) { 70 if (h.equalsIgnoreCase("Content-length")) { 71 len = Integer.valueOf(t.getRequestHeaders().get(h).get(0)); 72 } 73 } 74 byte[] input = new byte[len]; 75 t.getRequestBody().read(input); 76 77 try { 78 int path = 0; 79 if (t.getRequestURI().getPath().length() > 1) { 80 path = Integer.parseInt( 81 t.getRequestURI().getPath().substring(1)); 82 } 83 byte[] output = sign(input, path); 84 Headers out = t.getResponseHeaders(); 85 out.set("Content-Type", "application/timestamp-reply"); 86 87 t.sendResponseHeaders(200, output.length); 88 OutputStream os = t.getResponseBody(); 89 os.write(output); 90 } catch (Exception e) { 91 e.printStackTrace(); 92 t.sendResponseHeaders(500, 0); 93 } 94 t.close(); 95 } 96 97 /** 98 * @param input The data to sign 99 * @param path different cases to simulate, impl on URL path 100 * 0: normal 101 * 1: Missing nonce 102 * 2: Different nonce 103 * 3: Bad digets octets in messageImprint 104 * 4: Different algorithmId in messageImprint 105 * 5: whole chain in cert set 106 * 6: extension is missing 107 * 7: extension is non-critical 108 * 8: extension does not have timestamping 109 * 9: no cert in response 110 * 10: normal 111 * 11: always return default policy id 112 * 12: normal 113 * otherwise: normal 114 * @returns the signed 115 */ 116 byte[] sign(byte[] input, int path) throws Exception { 117 // Read TSRequest 118 DerValue value = new DerValue(input); 119 System.err.println("\nIncoming Request\n==================="); 120 System.err.println("Version: " + value.data.getInteger()); 121 DerValue messageImprint = value.data.getDerValue(); 122 AlgorithmId aid = AlgorithmId.parse( 123 messageImprint.data.getDerValue()); 124 System.err.println("AlgorithmId: " + aid); 125 126 ObjectIdentifier policyId = new ObjectIdentifier(defaultPolicyId); 127 BigInteger nonce = null; 128 while (value.data.available() > 0) { 129 DerValue v = value.data.getDerValue(); 130 if (v.tag == DerValue.tag_Integer) { 131 nonce = v.getBigInteger(); 132 System.err.println("nonce: " + nonce); 133 } else if (v.tag == DerValue.tag_Boolean) { 134 System.err.println("certReq: " + v.getBoolean()); 135 } else if (v.tag == DerValue.tag_ObjectId) { 136 policyId = v.getOID(); 137 System.err.println("PolicyID: " + policyId); 138 } 139 } 140 141 // Write TSResponse 142 System.err.println("\nResponse\n==================="); 143 KeyStore ks = KeyStore.getInstance("JKS"); 144 try (FileInputStream fis = new FileInputStream(keystore)) { 145 ks.load(fis, "changeit".toCharArray()); 146 } 147 148 String alias = "ts"; 149 if (path == 6) alias = "tsbad1"; 150 if (path == 7) alias = "tsbad2"; 151 if (path == 8) alias = "tsbad3"; 152 153 if (path == 11) { 154 policyId = new ObjectIdentifier(defaultPolicyId); 155 } 156 157 DerOutputStream statusInfo = new DerOutputStream(); 158 statusInfo.putInteger(0); 159 160 DerOutputStream token = new DerOutputStream(); 161 AlgorithmId[] algorithms = {aid}; 162 Certificate[] chain = ks.getCertificateChain(alias); 163 X509Certificate[] signerCertificateChain = null; 164 X509Certificate signer = (X509Certificate)chain[0]; 165 if (path == 5) { // Only case 5 uses full chain 166 signerCertificateChain = new X509Certificate[chain.length]; 167 for (int i=0; i<chain.length; i++) { 168 signerCertificateChain[i] = (X509Certificate)chain[i]; 169 } 170 } else if (path == 9) { 171 signerCertificateChain = new X509Certificate[0]; 172 } else { 173 signerCertificateChain = new X509Certificate[1]; 174 signerCertificateChain[0] = (X509Certificate)chain[0]; 175 } 176 177 DerOutputStream tst = new DerOutputStream(); 178 179 tst.putInteger(1); 180 tst.putOID(policyId); 181 182 if (path != 3 && path != 4) { 183 tst.putDerValue(messageImprint); 184 } else { 185 byte[] data = messageImprint.toByteArray(); 186 if (path == 4) { 187 data[6] = (byte)0x01; 188 } else { 189 data[data.length-1] = (byte)0x01; 190 data[data.length-2] = (byte)0x02; 191 data[data.length-3] = (byte)0x03; 192 } 193 tst.write(data); 194 } 195 196 tst.putInteger(1); 197 198 Calendar cal = Calendar.getInstance(); 199 tst.putGeneralizedTime(cal.getTime()); 200 201 if (path == 2) { 202 tst.putInteger(1234); 203 } else if (path == 1) { 204 // do nothing 205 } else { 206 tst.putInteger(nonce); 207 } 208 209 DerOutputStream tstInfo = new DerOutputStream(); 210 tstInfo.write(DerValue.tag_Sequence, tst); 211 212 DerOutputStream tstInfo2 = new DerOutputStream(); 213 tstInfo2.putOctetString(tstInfo.toByteArray()); 214 215 Signature sig = Signature.getInstance("SHA1withRSA"); 216 sig.initSign((PrivateKey)(ks.getKey( 217 alias, "changeit".toCharArray()))); 218 sig.update(tstInfo.toByteArray()); 219 220 ContentInfo contentInfo = new ContentInfo(new ObjectIdentifier( 221 "1.2.840.113549.1.9.16.1.4"), 222 new DerValue(tstInfo2.toByteArray())); 223 224 System.err.println("Signing..."); 225 System.err.println(new X500Name(signer 226 .getIssuerX500Principal().getName())); 227 System.err.println(signer.getSerialNumber()); 228 229 SignerInfo signerInfo = new SignerInfo( 230 new X500Name(signer.getIssuerX500Principal().getName()), 231 signer.getSerialNumber(), 232 aid, AlgorithmId.get("RSA"), sig.sign()); 233 234 SignerInfo[] signerInfos = {signerInfo}; 235 PKCS7 p7 = 236 new PKCS7(algorithms, contentInfo, signerCertificateChain, 237 signerInfos); 238 ByteArrayOutputStream p7out = new ByteArrayOutputStream(); 239 p7.encodeSignedData(p7out); 240 241 DerOutputStream response = new DerOutputStream(); 242 response.write(DerValue.tag_Sequence, statusInfo); 243 response.putDerValue(new DerValue(p7out.toByteArray())); 244 245 DerOutputStream out = new DerOutputStream(); 246 out.write(DerValue.tag_Sequence, response); 247 248 return out.toByteArray(); 249 } 250 251 private Handler(HttpServer httpServer, String keystore) { 252 this.httpServer = httpServer; 253 this.keystore = keystore; 254 } 255 256 /** 257 * Initialize TSA instance. 258 * 259 * Extended Key Info extension of certificate that is used for 260 * signing TSA responses should contain timeStamping value. 261 */ 262 static Handler init(int port, String keystore) throws IOException { 263 HttpServer httpServer = HttpServer.create( 264 new InetSocketAddress(port), 0); 265 Handler tsa = new Handler(httpServer, keystore); 266 httpServer.createContext("/", tsa); 267 return tsa; 268 } 269 270 /** 271 * Start TSA service. 272 */ 273 void start() { 274 httpServer.start(); 275 } 276 277 /** 278 * Stop TSA service. 279 */ 280 void stop() { 281 httpServer.stop(0); 282 } 283 284 /** 285 * Return server port number. 286 */ 287 int getPort() { 288 return httpServer.getAddress().getPort(); 289 } 290 291 @Override 292 public void close() throws Exception { 293 stop(); 294 } 295 } 296 297 public static void main(String[] args) throws Exception { 298 try (Handler tsa = Handler.init(0, TSKS);) { 299 tsa.start(); 300 int port = tsa.getPort(); 301 302 String cmd; 303 // Use -J-Djava.security.egd=file:/dev/./urandom to speed up 304 // nonce generation in timestamping request. Not avaibale on 305 // Windows and defaults to thread seed generator, not too bad. 306 if (System.getProperty("java.home").endsWith("jre")) { 307 cmd = System.getProperty("java.home") + "/../bin/jarsigner"; 308 } else { 309 cmd = System.getProperty("java.home") + "/bin/jarsigner"; 310 } 311 312 cmd += System.getProperty("test.tool.vm.opts") 313 + " -J-Djava.security.egd=file:/dev/./urandom" 314 + " -debug -keystore " + TSKS + " -storepass changeit" 315 + " -tsa http://localhost:" + port + "/%d" 316 + " -signedjar new_%d.jar " + JAR + " old"; 317 318 if (args.length == 0) { // Run this test 319 jarsigner(cmd, 0, true); // Success, normal call 320 jarsigner(cmd, 1, false); // These 4 should fail 321 jarsigner(cmd, 2, false); 322 jarsigner(cmd, 3, false); 323 jarsigner(cmd, 4, false); 324 jarsigner(cmd, 5, true); // Success, 6543440 solved. 325 jarsigner(cmd, 6, false); // tsbad1 326 jarsigner(cmd, 7, false); // tsbad2 327 jarsigner(cmd, 8, false); // tsbad3 328 jarsigner(cmd, 9, false); // no cert in timestamp 329 jarsigner(cmd + " -tsapolicyid 1.2.3.4", 10, true); 330 checkTimestamp("new_10.jar", "1.2.3.4", "SHA-256"); 331 jarsigner(cmd + " -tsapolicyid 1.2.3.5", 11, false); 332 jarsigner(cmd + " -tsadigestalg SHA", 12, true); 333 checkTimestamp("new_12.jar", defaultPolicyId, "SHA-1"); 334 } else { // Run as a standalone server 335 System.err.println("Press Enter to quit server"); 336 System.in.read(); 337 } 338 } 339 } 340 341 static void checkTimestamp(String file, String policyId, String digestAlg) 342 throws Exception { 343 try (JarFile jf = new JarFile(file)) { 344 JarEntry je = jf.getJarEntry("META-INF/OLD.RSA"); 345 try (InputStream is = jf.getInputStream(je)) { 346 byte[] content = IOUtils.readFully(is, -1, true); 347 PKCS7 p7 = new PKCS7(content); 348 SignerInfo[] si = p7.getSignerInfos(); 349 if (si == null || si.length == 0) { 350 throw new Exception("Not signed"); 351 } 352 PKCS9Attribute p9 = si[0].getUnauthenticatedAttributes() 353 .getAttribute(PKCS9Attribute.SIGNATURE_TIMESTAMP_TOKEN_OID); 354 PKCS7 tsToken = new PKCS7((byte[]) p9.getValue()); 355 TimestampToken tt = 356 new TimestampToken(tsToken.getContentInfo().getData()); 357 if (!tt.getHashAlgorithm().toString().equals(digestAlg)) { 358 throw new Exception("Digest alg different"); 359 } 360 if (!tt.getPolicyID().equals(policyId)) { 361 throw new Exception("policyId different"); 362 } 363 } 364 } 365 } 366 367 /** 368 * @param cmd the command line (with a hole to plug in) 369 * @param path the path in the URL, i.e, http://localhost/path 370 * @param expected if this command should succeed 371 */ 372 static void jarsigner(String cmd, int path, boolean expected) 373 throws Exception { 374 System.err.println("Test " + path); 375 Process p = Runtime.getRuntime().exec(String.format(cmd, path, path)); 376 BufferedReader reader = new BufferedReader( 377 new InputStreamReader(p.getErrorStream())); 378 while (true) { 379 String s = reader.readLine(); 380 if (s == null) break; 381 System.err.println(s); 382 } 383 384 // Will not see noTimestamp warning 385 boolean seeWarning = false; 386 reader = new BufferedReader( 387 new InputStreamReader(p.getInputStream())); 388 while (true) { 389 String s = reader.readLine(); 390 if (s == null) break; 391 System.err.println(s); 392 if (s.indexOf("Warning:") >= 0) { 393 seeWarning = true; 394 } 395 } 396 int result = p.waitFor(); 397 if (expected && result != 0 || !expected && result == 0) { 398 throw new Exception("Failed"); 399 } 400 if (seeWarning) { 401 throw new Exception("See warning"); 402 } 403 } 404} 405