blob: 1dbb0177b4d556f5c5706dbbf5e40e5489ffc788 [file] [log] [blame]
/**
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*
*/
package org.apache.kerby.kerberos.kerb.admin.server.kadmin.impl;
import org.apache.kerby.kerberos.kerb.admin.AuthUtil;
import org.apache.kerby.kerberos.kerb.admin.server.kadmin.AdminServerContext;
import org.apache.kerby.kerberos.kerb.admin.server.kadmin.AdminServerHandler;
import org.apache.kerby.kerberos.kerb.transport.KrbTransport;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import javax.security.auth.Subject;
import javax.security.auth.callback.Callback;
import javax.security.auth.callback.CallbackHandler;
import javax.security.auth.callback.UnsupportedCallbackException;
import javax.security.sasl.AuthorizeCallback;
import javax.security.sasl.Sasl;
import javax.security.sasl.SaslServer;
import java.io.File;
import java.io.IOException;
import java.net.InetAddress;
import java.net.SocketTimeoutException;
import java.nio.ByteBuffer;
import java.security.PrivilegedAction;
import java.util.HashMap;
import java.util.Map;
public class DefaultAdminServerHandler extends AdminServerHandler implements Runnable {
private static Logger logger = LoggerFactory.getLogger(DefaultAdminServerHandler.class);
private final KrbTransport transport;
private static boolean sasl = false;
private AdminServerContext adminServerContext;
public DefaultAdminServerHandler(AdminServerContext adminServerContext, KrbTransport transport) {
super(adminServerContext);
this.transport = transport;
this.adminServerContext = adminServerContext;
}
@Override
public void run() {
while (true) {
try {
if (!sasl) {
logger.info("Doing the sasl negotiation !!!");
try {
saslNegotiation();
} catch (Exception e) {
e.printStackTrace();
}
} else {
ByteBuffer message = transport.receiveMessage();
if (message == null) {
logger.debug("No valid request recved. Disconnect actively");
transport.release();
break;
}
handleMessage(message);
}
} catch (IOException e) {
transport.release();
logger.debug("Transport or decoding error occurred, "
+ "disconnecting abnormally", e);
break;
}
}
}
protected void handleMessage(ByteBuffer message) {
InetAddress clientAddress = transport.getRemoteAddress();
try {
ByteBuffer adminResponse = handleMessage(message, clientAddress);
transport.sendMessage(adminResponse);
} catch (Exception e) {
transport.release();
logger.error("Error occured while processing request:", e);
}
}
private void saslNegotiation() throws Exception {
File keytabFile = new File(adminServerContext.getConfig().getKeyTabFile());
String principal = adminServerContext.getConfig().getProtocol() + "/"
+ adminServerContext.getConfig().getAdminHost();
Subject subject = AuthUtil.loginUsingKeytab(principal, keytabFile);
Subject.doAs(subject, new PrivilegedAction<Object>() {
@Override
public Object run() {
try {
ByteBuffer message = null;
try {
message = transport.receiveMessage();
} catch (SocketTimeoutException e) {
// ignore time out
return null;
}
Map<String, Object> props = new HashMap<String, Object>();
props.put(Sasl.QOP, "auth-conf");
props.put(Sasl.SERVER_AUTH, "true");
String protocol = adminServerContext.getConfig().getProtocol();
String serverName = adminServerContext.getConfig().getServerName();
CallbackHandler callbackHandler = new SaslGssCallbackHandler();
SaslServer ss = Sasl.createSaslServer("GSSAPI",
protocol, serverName, props, callbackHandler);
if (ss == null) {
throw new Exception("Unable to find server implementation for: GSSAPI");
}
while (!ss.isComplete()) {
int scComplete = message.getInt();
if (scComplete == 0) {
System.out.println("success!!!");
sasl = true;
break;
}
sendMessage(message, ss);
if (!ss.isComplete()) {
logger.info("Waiting receive message");
message = transport.receiveMessage();
}
}
} catch (Exception e) {
e.printStackTrace();
}
return null;
}
});
}
private void sendMessage(ByteBuffer message, SaslServer ss) throws IOException {
byte[] arr = new byte[message.remaining()];
message.get(arr);
byte[] challenge = ss.evaluateResponse(arr);
// 4 is the head to go through network
ByteBuffer buffer = ByteBuffer.allocate(challenge.length + 8);
buffer.putInt(challenge.length + 4);
int ssComplete = ss.isComplete() ? 0 : 1;
buffer.putInt(ssComplete);
buffer.put(challenge);
buffer.flip();
transport.sendMessage(buffer);
}
private static class SaslGssCallbackHandler implements CallbackHandler {
@Override
public void handle(Callback[] callbacks) throws
UnsupportedCallbackException {
AuthorizeCallback ac = null;
for (Callback callback : callbacks) {
if (callback instanceof AuthorizeCallback) {
ac = (AuthorizeCallback) callback;
} else {
throw new UnsupportedCallbackException(callback,
"Unrecognized SASL GSSAPI Callback");
}
}
if (ac != null) {
String authid = ac.getAuthenticationID();
String authzid = ac.getAuthorizationID();
if (authid.equals(authzid)) {
ac.setAuthorized(true);
} else {
ac.setAuthorized(false);
}
if (ac.isAuthorized()) {
// System.out.println("SASL server GSSAPI callback: setting "
//+ "canonicalized client ID: " + authzid);
ac.setAuthorizedID(authzid);
}
}
}
}
}