aboutsummaryrefslogtreecommitdiffstats
path: root/netx/net/sourceforge/jnlp/security/PluginAppVerifier.java
diff options
context:
space:
mode:
authorDanesh Dadachanji <[email protected]>2012-10-22 11:02:38 -0400
committerDanesh Dadachanji <[email protected]>2012-10-22 11:02:38 -0400
commite150560769232e18fa516609933649dab002f358 (patch)
tree661e1b4d3c9d101447bc952e541e8f054c1d96be /netx/net/sourceforge/jnlp/security/PluginAppVerifier.java
parent229e52bca7c9298d3a0889fe1bc6f9107b32639a (diff)
Major rework of JarCertVerifier certificate management.
This is a long-planned rework of JarCertVerifier, allowing it to handle multiple certificates. The algorithms used to verify jars with multiple certificates vary between JNLPs and Applets.
Diffstat (limited to 'netx/net/sourceforge/jnlp/security/PluginAppVerifier.java')
-rw-r--r--netx/net/sourceforge/jnlp/security/PluginAppVerifier.java224
1 files changed, 224 insertions, 0 deletions
diff --git a/netx/net/sourceforge/jnlp/security/PluginAppVerifier.java b/netx/net/sourceforge/jnlp/security/PluginAppVerifier.java
new file mode 100644
index 0000000..a8589d8
--- /dev/null
+++ b/netx/net/sourceforge/jnlp/security/PluginAppVerifier.java
@@ -0,0 +1,224 @@
+/* PluginAppVerifier.java
+ Copyright (C) 2012 Red Hat, Inc.
+
+This file is part of IcedTea.
+
+IcedTea is free software; you can redistribute it and/or
+modify it under the terms of the GNU General Public License as published by
+the Free Software Foundation, version 2.
+
+IcedTea is distributed in the hope that it will be useful,
+but WITHOUT ANY WARRANTY; without even the implied warranty of
+MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
+General Public License for more details.
+
+You should have received a copy of the GNU General Public License
+along with IcedTea; see the file COPYING. If not, write to
+the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+02110-1301 USA.
+
+Linking this library statically or dynamically with other modules is
+making a combined work based on this library. Thus, the terms and
+conditions of the GNU General Public License cover the whole
+combination.
+
+As a special exception, the copyright holders of this library give you
+permission to link this library with independent modules to produce an
+executable, regardless of the license terms of these independent
+modules, and to copy and distribute the resulting executable under
+terms of your choice, provided that you also meet, for each linked
+independent module, the terms and conditions of the license of that
+module. An independent module is a module which is not derived from
+or based on this library. If you modify this library, you may extend
+this exception to your version of the library, but you are not
+obligated to do so. If you do not wish to do so, delete this
+exception statement from your version.
+ */
+
+package net.sourceforge.jnlp.security;
+
+import static net.sourceforge.jnlp.runtime.Translator.R;
+
+import java.security.cert.CertPath;
+import java.util.ArrayList;
+import java.util.HashMap;
+
+import net.sourceforge.jnlp.JNLPFile;
+import net.sourceforge.jnlp.LaunchException;
+import net.sourceforge.jnlp.security.SecurityDialogs.AccessType;
+import net.sourceforge.jnlp.tools.CertInformation;
+import net.sourceforge.jnlp.tools.JarCertVerifier;
+
+public class PluginAppVerifier implements AppVerifier {
+
+ @Override
+ public boolean hasAlreadyTrustedPublisher(
+ HashMap<CertPath, CertInformation> certs,
+ HashMap<String, Integer> signedJars) {
+
+ boolean allPublishersTrusted = true;
+
+ for(String jarName : signedJars.keySet()) {
+ int numbSignableEntries = signedJars.get(jarName);
+ boolean publisherTrusted = false;
+
+ for (CertInformation certInfo : certs.values()) {
+ if(certInfo.isSignerOfJar(jarName)
+ && numbSignableEntries == certInfo.getNumJarEntriesSigned(jarName)
+ && certInfo.isPublisherAlreadyTrusted()) {
+ publisherTrusted = true;
+ break;
+ }
+ }
+
+ allPublishersTrusted &= publisherTrusted;
+ }
+ return allPublishersTrusted;
+ }
+
+ @Override
+ public boolean hasRootInCacerts(HashMap<CertPath, CertInformation> certs,
+ HashMap<String, Integer> signedJars) {
+
+ boolean allRootCAsTrusted = true;
+
+ for(String jarName : signedJars.keySet()) {
+ int numbSignableEntries = signedJars.get(jarName);
+ boolean rootCATrusted = false;
+
+ for (CertInformation certInfo : certs.values()) {
+ if(certInfo.isSignerOfJar(jarName)
+ && numbSignableEntries == certInfo.getNumJarEntriesSigned(jarName)
+ && certInfo.isRootInCacerts()) {
+ rootCATrusted = true;
+ break;
+ }
+ }
+
+ allRootCAsTrusted &= rootCATrusted;
+ }
+ return allRootCAsTrusted;
+ }
+
+ @Override
+ public boolean isFullySigned(HashMap<CertPath, CertInformation> certs,
+ HashMap<String, Integer> signedJars) {
+
+ boolean isFullySigned = true;
+
+ for(String jarName : signedJars.keySet()) {
+ int numbSignableEntries = signedJars.get(jarName);
+ boolean isSigned = false;
+
+ for (CertInformation certInfo : certs.values()) {
+ if(certInfo.isSignerOfJar(jarName)
+ && numbSignableEntries == certInfo.getNumJarEntriesSigned(jarName)) {
+ isSigned = true;
+ break;
+ }
+ }
+
+ isFullySigned &= isSigned;
+ }
+
+ return isFullySigned;
+ }
+
+ @Override
+ public void checkTrustWithUser(JarCertVerifier jcv, JNLPFile file)
+ throws LaunchException {
+ ArrayList<CertPath> certPaths = buildCertPathsList(jcv);
+ ArrayList<CertPath> alreadyApprovedByUser = new ArrayList<CertPath>();
+ for (String jarName : jcv.getJarSignableEntries().keySet()) {
+ boolean trustFoundOrApproved = false;
+ for (CertPath cPathApproved : alreadyApprovedByUser) {
+ jcv.setCurrentlyUsedCertPath(cPathApproved);
+ CertInformation info = jcv.getCertInformation(cPathApproved);
+ if (info.isSignerOfJar(jarName)
+ && alreadyApprovedByUser.contains(cPathApproved)) {
+ trustFoundOrApproved = true;
+ break;
+ }
+ }
+
+ if (trustFoundOrApproved) {
+ continue;
+ }
+
+ for (CertPath cPath : certPaths) {
+ jcv.setCurrentlyUsedCertPath(cPath);
+ CertInformation info = jcv.getCertInformation(cPath);
+ if (info.isSignerOfJar(jarName)) {
+ if (info.isPublisherAlreadyTrusted()) {
+ trustFoundOrApproved = true;
+ alreadyApprovedByUser.add(cPath);
+ break;
+ }
+
+ AccessType dialogType;
+ if (info.isRootInCacerts() && !info.hasSigningIssues()) {
+ dialogType = AccessType.VERIFIED;
+ } else if (info.isRootInCacerts()) {
+ dialogType = AccessType.SIGNING_ERROR;
+ } else {
+ dialogType = AccessType.UNVERIFIED;
+ }
+
+ boolean wasApproved = SecurityDialogs.showCertWarningDialog(
+ dialogType, file, jcv);
+ if (wasApproved) {
+ alreadyApprovedByUser.add(cPath);
+ trustFoundOrApproved = true;
+ break;
+ }
+ }
+ }
+ if (!trustFoundOrApproved) {
+ throw new LaunchException(null, null, R("LSFatal"),
+ R("LCLaunching"), R("LCancelOnUserRequest"), "");
+ }
+ }
+ }
+
+ /**
+ * Build a list of all the CertPaths that were detected in the provided
+ * JCV, placing them in the most trusted possible order.
+ * @param jcv The verifier containing the CertPaths to examine.
+ * @return A list of CertPaths sorted in the following order: Signers with
+ * 1. Already trusted publishers
+ * 2. Roots in the CA store and have no signing issues
+ * 3. Roots in the CA store but have signing issues
+ * 4. Everything else
+ */
+ public ArrayList<CertPath> buildCertPathsList(JarCertVerifier jcv) {
+ ArrayList<CertPath> certPathsList = jcv.getCertsList();
+ ArrayList<CertPath> returnList = new ArrayList<CertPath>();
+
+ for (CertPath cPath : certPathsList) {
+ if (!returnList.contains(cPath)
+ && jcv.getCertInformation(cPath).isPublisherAlreadyTrusted())
+ returnList.add(cPath);
+ }
+
+ for (CertPath cPath : certPathsList) {
+ if (!returnList.contains(cPath)
+ && jcv.getCertInformation(cPath).isRootInCacerts()
+ && !jcv.getCertInformation(cPath).hasSigningIssues())
+ returnList.add(cPath);
+ }
+
+ for (CertPath cPath : certPathsList) {
+ if (!returnList.contains(cPath)
+ && jcv.getCertInformation(cPath).isRootInCacerts()
+ && jcv.getCertInformation(cPath).hasSigningIssues())
+ returnList.add(cPath);
+ }
+
+ for (CertPath cPath : certPathsList) {
+ if (!returnList.contains(cPath))
+ returnList.add(cPath);
+ }
+
+ return returnList;
+ }
+}