Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

8277474: jarsigner does not check if algorithm parameters are disabled #7580

Closed
wants to merge 3 commits into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
/*
* Copyright (c) 2013, 2021, Oracle and/or its affiliates. All rights reserved.
* Copyright (c) 2013, 2022, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
@@ -419,20 +419,22 @@ public boolean hasMoreElements() {
if (aliases.hasMoreElements()) {
return true;
} else {
if (iterator.hasNext()) {
while (iterator.hasNext()) {
keystoresEntry = iterator.next();
prefix = keystoresEntry.getKey() +
entryNameSeparator;
entryNameSeparator;
aliases = keystoresEntry.getValue().aliases();
} else {
return false;
if (aliases.hasMoreElements()) {
return true;
} else {
continue;
}
}
return false;
}
} catch (KeyStoreException e) {
return false;
}

return aliases.hasMoreElements();
}

public String nextElement() {
Original file line number Diff line number Diff line change
@@ -202,7 +202,7 @@ public final void permits(String algorithm, AlgorithmParameters ap,
}
}

private void permits(AlgorithmParameters ap, ConstraintsParameters cp)
public void permits(AlgorithmParameters ap, ConstraintsParameters cp)
throws CertPathValidatorException {

switch (ap.getAlgorithm().toUpperCase(Locale.ENGLISH)) {
Original file line number Diff line number Diff line change
@@ -30,6 +30,7 @@
import java.net.URLClassLoader;
import java.security.cert.CertPathValidatorException;
import java.security.cert.PKIXBuilderParameters;
import java.security.spec.PSSParameterSpec;
import java.util.*;
import java.util.stream.Collectors;
import java.util.zip.*;
@@ -1021,6 +1022,8 @@ void verifyJar(String jarName)
si.getDigestAlgorithmId(),
si.getDigestEncryptionAlgorithmId(),
si.getAuthenticatedAttributes() == null);
AlgorithmId encAlgId = si.getDigestEncryptionAlgorithmId();
AlgorithmParameters sigAlgParams = encAlgId.getParameters();
PublicKey key = signer.getPublicKey();
PKCS7 tsToken = si.getTsToken();
if (tsToken != null) {
@@ -1035,6 +1038,8 @@ void verifyJar(String jarName)
tsSi.getDigestAlgorithmId(),
tsSi.getDigestEncryptionAlgorithmId(),
tsSi.getAuthenticatedAttributes() == null);
AlgorithmId tsEncAlgId = tsSi.getDigestEncryptionAlgorithmId();
AlgorithmParameters tsSigAlgParams = tsEncAlgId.getParameters();
Calendar c = Calendar.getInstance(
TimeZone.getTimeZone("UTC"),
Locale.getDefault(Locale.Category.FORMAT));
@@ -1049,22 +1054,22 @@ void verifyJar(String jarName)
history = String.format(
rb.getString("history.with.ts"),
signer.getSubjectX500Principal(),
verifyWithWeak(digestAlg, DIGEST_PRIMITIVE_SET, false, jcp),
verifyWithWeak(sigAlg, SIG_PRIMITIVE_SET, false, jcp),
verifyWithWeak(digestAlg, DIGEST_PRIMITIVE_SET, false, jcp, null),
verifyWithWeak(sigAlg, SIG_PRIMITIVE_SET, false, jcp, sigAlgParams),
verifyWithWeak(key, jcp),
c,
tsSigner.getSubjectX500Principal(),
verifyWithWeak(tsDigestAlg, DIGEST_PRIMITIVE_SET, true, jcpts),
verifyWithWeak(tsSigAlg, SIG_PRIMITIVE_SET, true, jcpts),
verifyWithWeak(tsDigestAlg, DIGEST_PRIMITIVE_SET, true, jcpts, null),
verifyWithWeak(tsSigAlg, SIG_PRIMITIVE_SET, true, jcpts, tsSigAlgParams),
verifyWithWeak(tsKey, jcpts));
} else {
JarConstraintsParameters jcp =
new JarConstraintsParameters(chain, null);
history = String.format(
rb.getString("history.without.ts"),
signer.getSubjectX500Principal(),
verifyWithWeak(digestAlg, DIGEST_PRIMITIVE_SET, false, jcp),
verifyWithWeak(sigAlg, SIG_PRIMITIVE_SET, false, jcp),
verifyWithWeak(digestAlg, DIGEST_PRIMITIVE_SET, false, jcp, null),
verifyWithWeak(sigAlg, SIG_PRIMITIVE_SET, false, jcp, sigAlgParams),
verifyWithWeak(key, jcp));
}
} catch (Exception e) {
@@ -1393,17 +1398,25 @@ private void displayMessagesAndResult(boolean isSigning) {
}

private String verifyWithWeak(String alg, Set<CryptoPrimitive> primitiveSet,
boolean tsa, JarConstraintsParameters jcp) {
boolean tsa, JarConstraintsParameters jcp, AlgorithmParameters algParams) {

try {
JAR_DISABLED_CHECK.permits(alg, jcp, false);
} catch (CertPathValidatorException e) {
disabledAlgFound = true;
return String.format(rb.getString("with.disabled"), alg);
}
if (algParams != null) {
try {
JAR_DISABLED_CHECK.permits(algParams, jcp);
} catch (CertPathValidatorException e) {
disabledAlgFound = true;
return String.format(rb.getString("with.disabled"), algParams);
}
}

try {
LEGACY_CHECK.permits(alg, jcp, false);
return alg;
} catch (CertPathValidatorException e) {
if (primitiveSet == SIG_PRIMITIVE_SET) {
legacyAlg |= 2;
@@ -1419,6 +1432,17 @@ private String verifyWithWeak(String alg, Set<CryptoPrimitive> primitiveSet,
}
return String.format(rb.getString("with.weak"), alg);
}
if (algParams != null) {
try {
LEGACY_CHECK.permits(algParams, jcp);
return alg;
} catch (CertPathValidatorException e) {
legacyAlg |= 2;
legacySigAlg = alg;
return String.format(rb.getString("with.weak"), algParams);
}
}
return alg;
}

private String verifyWithWeak(PublicKey key, JarConstraintsParameters jcp) {
125 changes: 125 additions & 0 deletions test/jdk/sun/security/provider/KeyStore/DksWithEmptyKeystore.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,125 @@
/*
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/

/*
* @test
* @bug 8265765
* @summary Test DomainKeyStore with a collection of keystores that has an empty one in between
* based on the test in the bug report
*/

import java.io.OutputStream;
import java.nio.file.Files;
import java.nio.file.Path;
import java.security.DomainLoadStoreParameter;
import java.security.KeyStore;
import java.util.Enumeration;
import java.util.LinkedHashMap;
import java.util.Map;
import javax.crypto.KeyGenerator;

public class DksWithEmptyKeystore {
private static void write(Path p, KeyStore keystore) throws Exception {
try (OutputStream outputStream = Files.newOutputStream(p)) {
keystore.store(outputStream, new char[] { 'x' });
}
}

public static void main(String[] args) throws Exception {
KeyGenerator kg = KeyGenerator.getInstance("AES");
kg.init(256);

// Create a keystore with one key
KeyStore nonEmptyKeystore = KeyStore.getInstance("PKCS12");
nonEmptyKeystore.load(null, null);

Path nonEmptyPath = Path.of("non_empty.p12");
nonEmptyKeystore.setKeyEntry("aeskey", kg.generateKey(), new char[] { 'a' }, null);
write(nonEmptyPath, nonEmptyKeystore);

// Create an empty keystore
KeyStore emptyKeystore = KeyStore.getInstance("PKCS12");
emptyKeystore.load(null, null);

Path emptyPath = Path.of("empty.p12");
write(emptyPath, emptyKeystore);

// Create a domain keystore with two non-empty keystores
Path dksWithTwoPartsPath = Path.of("two-parts.dks");
var twoPartsConfiguration = """
domain Combo {
keystore a keystoreURI="%s";
keystore b keystoreURI="%s";
};
""";
Files.writeString(dksWithTwoPartsPath, String.format(twoPartsConfiguration,
nonEmptyPath.toUri(), nonEmptyPath.toUri()));
Map<String,KeyStore.ProtectionParameter> protectionParameters = new LinkedHashMap<>();

KeyStore dksKeystore = KeyStore.getInstance("DKS");
dksKeystore.load(new DomainLoadStoreParameter(dksWithTwoPartsPath.toUri(), protectionParameters));
System.out.printf("%s size: %d%n", dksWithTwoPartsPath, dksKeystore.size());

int index = 0;
for (Enumeration<String> enumeration = dksKeystore.aliases(); enumeration.hasMoreElements(); ) {
System.out.printf("%d: %s%n", index, enumeration.nextElement());
index++;
}

System.out.printf("enumerated aliases from %s: %d%n", dksWithTwoPartsPath, index);
if (index != dksKeystore.size()) {
throw new Exception("Failed to get the number of aliases in the domain keystore " +
"that has two keystores.");
}

// Create a domain keystore with two non-empty keystores and an empty one in between
Path dksWithThreePartsPath = Path.of("three-parts.dks");
var threePartsConfiguration = """
domain Combo {
keystore a keystoreURI="%s";
keystore b keystoreURI="%s";
keystore c keystoreURI="%s";
};
""";
Files.writeString(dksWithThreePartsPath, String.format(threePartsConfiguration,
nonEmptyPath.toUri(), emptyPath.toUri(), nonEmptyPath.toUri()));

KeyStore dksKeystore1 = KeyStore.getInstance("DKS");
dksKeystore1.load(new DomainLoadStoreParameter(dksWithThreePartsPath.toUri(), protectionParameters));
System.out.printf("%s size: %d%n", dksWithThreePartsPath, dksKeystore1.size());

index = 0;
for (Enumeration<String> enumeration = dksKeystore1.aliases(); enumeration.hasMoreElements(); ) {
System.out.printf("%d: %s%n", index, enumeration.nextElement());
index++;
}

System.out.printf("enumerated aliases from %s: %d%n", dksWithThreePartsPath, index);
if (index != dksKeystore1.size()) {
throw new Exception("Failed to get the number of aliases in the domain keystore " +
"that has three keystores with an empty one in between.");
} else {
System.out.printf("Test completed successfully");
}
}
}
86 changes: 86 additions & 0 deletions test/jdk/sun/security/tools/jarsigner/CheckAlgParams.java
Original file line number Diff line number Diff line change
@@ -0,0 +1,86 @@
/*
* Copyright (c) 2022, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
*
* This code is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License version 2 only, as
* published by the Free Software Foundation.
*
* This code is distributed in the hope that it will be useful, but WITHOUT
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* version 2 for more details (a copy is included in the LICENSE file that
* accompanied this code).
*
* You should have received a copy of the GNU General Public License version
* 2 along with this work; if not, write to the Free Software Foundation,
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
*
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
* or visit www.oracle.com if you need additional information or have any
* questions.
*/

/*
* @test
* @bug 8277474
* @summary jarsigner -verify should check if the algorithm parameters of
* its signature algorithm use disabled or legacy algorithms
* @library /test/lib
* @modules java.base/sun.security.x509
*/

import jdk.test.lib.SecurityTools;
import jdk.test.lib.process.OutputAnalyzer;
import jdk.test.lib.util.JarUtils;

import java.nio.file.Files;
import java.nio.file.Path;
import java.nio.file.Paths;

public class CheckAlgParams {
private static final String JAVA_SECURITY_FILE = "java.security";

public static void main(String[] args) throws Exception{

SecurityTools.keytool("-keystore ks -storepass changeit " +
"-genkeypair -keyalg RSASSA-PSS -alias ca -dname CN=CA " +
"-ext bc:c")
.shouldHaveExitValue(0);

JarUtils.createJarFile(Path.of("a.jar"), Path.of("."), Path.of("ks"));

SecurityTools.jarsigner("-keystore ks -storepass changeit " +
"-signedjar signeda.jar " +
"-verbose" +
" a.jar ca")
.shouldHaveExitValue(0);

Files.writeString(Files.createFile(Paths.get(JAVA_SECURITY_FILE)),
"jdk.jar.disabledAlgorithms=SHA256\n" +
"jdk.security.legacyAlgorithms=\n");

SecurityTools.jarsigner("-verify signeda.jar " +
"-J-Djava.security.properties=" +
JAVA_SECURITY_FILE +
" -keystore ks -storepass changeit -verbose -debug")
.shouldMatch("Digest algorithm: SHA-256.*(disabled)")
.shouldMatch("Signature algorithm: PSSParameterSpec.*hashAlgorithm=SHA-256.*(disabled)")
.shouldContain("The jar will be treated as unsigned")
.shouldHaveExitValue(0);

Files.deleteIfExists(Paths.get(JAVA_SECURITY_FILE));
Files.writeString(Files.createFile(Paths.get(JAVA_SECURITY_FILE)),
"jdk.jar.disabledAlgorithms=\n" +
"jdk.security.legacyAlgorithms=SHA256\n");

SecurityTools.jarsigner("-verify signeda.jar " +
"-J-Djava.security.properties=" +
JAVA_SECURITY_FILE +
" -keystore ks -storepass changeit -verbose -debug")
.shouldMatch("Digest algorithm: SHA-256.*(weak)")
.shouldMatch("Signature algorithm: PSSParameterSpec.*hashAlgorithm=SHA-256.*(weak)")
.shouldNotContain("The jar will be treated as unsigned")
.shouldHaveExitValue(0);
}
}