8325579: Inconsistent behavior in com.sun.jndi.ldap.Connection::createSocket

Reviewed-by: dfuchs, aefimov
This commit is contained in:
Christoph Langer 2024-03-25 16:31:52 +00:00
parent 70a15c7363
commit 907e30ff00
3 changed files with 219 additions and 124 deletions

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 1999, 2023, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 1999, 2024, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
@ -122,17 +122,15 @@ import javax.security.sasl.SaslException;
public final class Connection implements Runnable { public final class Connection implements Runnable {
private static final boolean debug = false; private static final boolean debug = false;
private static final int dump = 0; // > 0 r, > 1 rw
private final Thread worker; // Initialized in constructor private final Thread worker; // Initialized in constructor
private boolean v3 = true; // Set in setV3() private boolean v3 = true; // Set in setV3()
public final String host; // used by LdapClient for generating exception messages public final String host; // used by LdapClient for generating exception messages
// used by StartTlsResponse when creating an SSL socket // used by StartTlsResponse when creating an SSL socket
public final int port; // used by LdapClient for generating exception messages public final int port; // used by LdapClient for generating exception messages
// used by StartTlsResponse when creating an SSL socket // used by StartTlsResponse when creating an SSL socket
private boolean bound = false; // Set in setBound() private boolean bound = false; // Set in setBound()
@ -324,30 +322,37 @@ public final class Connection implements Runnable {
} }
private Socket createConnectionSocket(String host, int port, SocketFactory factory, private Socket createConnectionSocket(String host, int port, SocketFactory factory,
int connectTimeout) throws Exception { int connectTimeout) throws IOException {
Socket socket = null; Socket socket = null;
// if timeout is supplied, try to use unconnected socket for connecting with timeout
if (connectTimeout > 0) { if (connectTimeout > 0) {
// create unconnected socket and then connect it if timeout
// is supplied
InetSocketAddress endpoint =
createInetSocketAddress(host, port);
// unconnected socket
socket = factory.createSocket();
// connect socket with a timeout
socket.connect(endpoint, connectTimeout);
if (debug) { if (debug) {
System.err.println("Connection: creating socket with " + System.err.println("Connection: creating socket with a connect timeout");
"a connect timeout"); }
try {
// unconnected socket
socket = factory.createSocket();
} catch (IOException e) {
// unconnected socket is likely not supported by the SocketFactory
if (debug) {
System.err.println("Connection: unconnected socket not supported by SocketFactory");
}
}
if (socket != null) {
InetSocketAddress endpoint = createInetSocketAddress(host, port);
// connect socket with a timeout
socket.connect(endpoint, connectTimeout);
} }
} }
// either no timeout was supplied or unconnected socket did not work
if (socket == null) { if (socket == null) {
// create connected socket // create connected socket
socket = factory.createSocket(host, port);
if (debug) { if (debug) {
System.err.println("Connection: creating connected socket with" + System.err.println("Connection: creating connected socket with no connect timeout");
" no connect timeout");
} }
socket = factory.createSocket(host, port);
} }
return socket; return socket;
} }
@ -356,7 +361,7 @@ public final class Connection implements Runnable {
// the SSL handshake following socket connection as part of the timeout. // the SSL handshake following socket connection as part of the timeout.
// So explicitly set a socket read timeout, trigger the SSL handshake, // So explicitly set a socket read timeout, trigger the SSL handshake,
// then reset the timeout. // then reset the timeout.
private void initialSSLHandshake(SSLSocket sslSocket , int connectTimeout) throws Exception { private void initialSSLHandshake(SSLSocket sslSocket, int connectTimeout) throws Exception {
if (!IS_HOSTNAME_VERIFICATION_DISABLED) { if (!IS_HOSTNAME_VERIFICATION_DISABLED) {
SSLParameters param = sslSocket.getSSLParameters(); SSLParameters param = sslSocket.getSSLParameters();

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2014, 2022, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 2014, 2024, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
@ -36,21 +36,33 @@
* The following implementation specific environment properties are supported by the * The following implementation specific environment properties are supported by the
* default LDAP Naming Service Provider implementation in the JDK: * default LDAP Naming Service Provider implementation in the JDK:
* <ul> * <ul>
* <li>{@code java.naming.ldap.factory.socket}:
* <br>The value of this environment property specifies the fully
* qualified class name of the socket factory used by the LDAP provider.
* This class must implement the {@link javax.net.SocketFactory} abstract class
* and provide an implementation of the static "getDefault()" method that
* returns an instance of the socket factory. By default the environment
* property is not set.
* </li>
* <li>{@code com.sun.jndi.ldap.connect.timeout}: * <li>{@code com.sun.jndi.ldap.connect.timeout}:
* <br>The value of this property is the string representation * <br>The value of this environment property is the string representation
* of an integer representing the connection timeout in * of an integer specifying the connection timeout in milliseconds.
* milliseconds. If the LDAP provider cannot establish a * If the LDAP provider cannot establish a connection within that period,
* connection within that period, it aborts the connection attempt. * it aborts the connection attempt.
* The integer should be greater than zero. An integer less than * The integer should be greater than zero. An integer less than
* or equal to zero means to use the network protocol's (i.e., TCP's) * or equal to zero means to use the network protocol's (i.e., TCP's)
* timeout value. * timeout value.
* <br> If this property is not specified, the default is to wait * <br> If this property is not specified, the default is to wait
* for the connection to be established or until the underlying * for the connection to be established or until the underlying
* network times out. * network times out.
* <br> If a custom socket factory is provided via environment property
* {@code java.naming.ldap.factory.socket} and unconnected sockets
* are not supported, the specified timeout is ignored
* and the provider behaves as if no connection timeout was set.
* </li> * </li>
* <li>{@code com.sun.jndi.ldap.read.timeout}: * <li>{@code com.sun.jndi.ldap.read.timeout}:
* <br>The value of this property is the string representation * <br>The value of this property is the string representation
* of an integer representing the read timeout in milliseconds * of an integer specifying the read timeout in milliseconds
* for LDAP operations. If the LDAP provider cannot get a LDAP * for LDAP operations. If the LDAP provider cannot get a LDAP
* response within that period, it aborts the read attempt. The * response within that period, it aborts the read attempt. The
* integer should be greater than zero. An integer less than or * integer should be greater than zero. An integer less than or

View File

@ -1,5 +1,5 @@
/* /*
* Copyright (c) 2023, Oracle and/or its affiliates. All rights reserved. * Copyright (c) 2023, 2024, Oracle and/or its affiliates. All rights reserved.
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
* *
* This code is free software; you can redistribute it and/or modify it * This code is free software; you can redistribute it and/or modify it
@ -21,68 +21,117 @@
* questions. * questions.
*/ */
import jdk.test.lib.net.URIBuilder;
import javax.naming.Context;
import javax.naming.ldap.InitialLdapContext;
import javax.naming.ldap.LdapContext;
import javax.net.SocketFactory;
import javax.net.ssl.SSLServerSocketFactory;
import java.io.File; import java.io.File;
import java.io.IOException; import java.io.IOException;
import java.io.InputStream; import java.io.InputStream;
import java.io.OutputStream; import java.io.OutputStream;
import java.lang.reflect.Field;
import java.net.InetAddress; import java.net.InetAddress;
import java.net.ServerSocket; import java.net.ServerSocket;
import java.net.Socket; import java.net.Socket;
import java.net.SocketException; import java.net.SocketException;
import java.net.UnknownHostException;
import java.util.Hashtable; import java.util.Hashtable;
import javax.naming.Context;
import javax.naming.NamingException;
import javax.naming.ldap.InitialLdapContext;
import javax.naming.ldap.LdapContext;
import javax.net.SocketFactory;
import javax.net.ssl.SSLServerSocketFactory;
import jdk.test.lib.net.URIBuilder;
/* /*
* @test * @test
* @bug 8314063 * @bug 8314063 8325579
* @library /test/lib * @library /test/lib
* @summary For LDAPs connection, if the value of com.sun.jndi.ldap.connect.timeout is * @summary Several scenarios for LDAP connection handshaking are tested here.
* set too small or not an optimal value for the system, after the socket is created and * We test different combinations of com.sun.jndi.ldap.connect.timeout values
* connected to the server, but the handshake between the client and server fails due to * and server behavior, e.g. a server that replies immediately vs a server that
* socket time out, the opened socket is not closed properly. In this test case, the server * delays the initial answer. We also try to check whether the underlying Socket
* is forced to sleep ten seconds and connection time out for client is one second. This * object will be closed correctly.
* will allow the socket opened and connected, and give the chance for the handshake to be * We expect exceptions when using a custom SocketFactory that does not supply
* timed out. Before this fix, the socket is kept opened. Right now the exception will be * SSL Sockets. In that case we instrument the supplied Socket object and check
* caught and the socket will be closed. * if it was properly closed after the handshake failure.
* When the value of com.sun.jndi.ldap.connect.timeout is set lower than the
* server delay, we also expect an exception.
* In all other cases a valid Context object shall be returned and we check
* whether the socket is closed after closing the Context.
* *
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory true 6000 * @modules java.naming/javax.naming:+open java.naming/com.sun.jndi.ldap:+open
* @run main/othervm LdapSSLHandshakeFailureTest -1000 true 6000 * @run main/othervm LdapSSLHandshakeFailureTest
* @run main/othervm LdapSSLHandshakeFailureTest -1000 false 6000
* @run main/othervm LdapSSLHandshakeFailureTest 2000 false 6000
* @run main/othervm LdapSSLHandshakeFailureTest 0 true 6000
* @run main/othervm LdapSSLHandshakeFailureTest 0 false 6000
* @run main/othervm LdapSSLHandshakeFailureTest true * @run main/othervm LdapSSLHandshakeFailureTest true
* @run main/othervm LdapSSLHandshakeFailureTest false * @run main/othervm LdapSSLHandshakeFailureTest 0
* @run main/othervm LdapSSLHandshakeFailureTest 0 true
* @run main/othervm LdapSSLHandshakeFailureTest 2000
* @run main/othervm LdapSSLHandshakeFailureTest 2000 true
* @run main/othervm LdapSSLHandshakeFailureTest -1000
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected 1000
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected true
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactoryNoUnconnected 1000 true
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory 1000
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory true
* @run main/othervm LdapSSLHandshakeFailureTest LdapSSLHandshakeFailureTest$CustomSocketFactory 1000 true
*/ */
public class LdapSSLHandshakeFailureTest { public class LdapSSLHandshakeFailureTest {
private static String SOCKET_CLOSED_MSG = "The socket has been closed."; private static int SERVER_SLEEPING_TIME = 4000;
private static String progArgs[];
private static int curArg;
private static String customSocketFactory;
private static Integer connectTimeout;
private static boolean serverSlowDown;
private static int serverSleepingTime = 5000; private static String popArg() {
if (curArg >= progArgs.length) {
return null;
}
return progArgs[curArg++];
}
public static void main(String args[]) throws Exception { private static void parseArgs(String args[]) {
progArgs = args;
curArg = 0;
String arg = popArg();
if (arg == null)
return;
if (arg.startsWith("LdapSSLHandshakeFailureTest$CustomSocketFactory")) {
customSocketFactory = arg;
arg = popArg();
if (arg == null)
return;
}
try {
connectTimeout = Integer.valueOf(arg);
arg = popArg();
if (arg == null)
return;
} catch (NumberFormatException e) {
// then it must be the boolean arg for serverSlowDown
}
serverSlowDown = Boolean.valueOf(arg);
}
public static void main(String args[]) {
parseArgs(args);
System.out.println("Testing " +
(customSocketFactory == null ? "without custom SocketFactory" : "with custom SocketFactory \"" + customSocketFactory + "\"") +
", " + (connectTimeout == null ? "no connectTimeout" : "connectTimeout=" + connectTimeout + "") +
", serverSlowDown=" + serverSlowDown);
// Set the keystores // Set the keystores
setKeyStore(); setKeyStore();
boolean serverSlowDown = Boolean.valueOf(args[0]);
if (args.length == 2) {
serverSlowDown = Boolean.valueOf(args[1]);
}
if (args.length == 3) {
serverSleepingTime = Integer.valueOf(args[2]);
}
boolean hasCustomSocketFactory = args[0]
.equals("LdapSSLHandshakeFailureTest$CustomSocketFactory");
// start the test server first. // start the test server first.
try (TestServer server = new TestServer(serverSlowDown, serverSleepingTime)) { try (TestServer server = new TestServer(serverSlowDown)) {
server.start(); server.start();
Hashtable<String, Object> env = new Hashtable<>(); Hashtable<String, Object> env = new Hashtable<>();
env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory"); env.put(Context.INITIAL_CONTEXT_FACTORY, "com.sun.jndi.ldap.LdapCtxFactory");
@ -93,15 +142,13 @@ public class LdapSSLHandshakeFailureTest {
.port(server.getPortNumber()) .port(server.getPortNumber())
.buildUnchecked().toString()); .buildUnchecked().toString());
if (hasCustomSocketFactory) { if (customSocketFactory != null) {
env.put("java.naming.ldap.factory.socket", args[0]); env.put("java.naming.ldap.factory.socket", customSocketFactory);
env.put("com.sun.jndi.ldap.connect.timeout", "1000");
} }
if (args.length == 2 && !hasCustomSocketFactory) { if (connectTimeout != null) {
env.put("com.sun.jndi.ldap.connect.timeout", args[0]); env.put("com.sun.jndi.ldap.connect.timeout", connectTimeout.toString());
} }
env.put(Context.SECURITY_PROTOCOL, "ssl"); env.put(Context.SECURITY_PROTOCOL, "ssl");
env.put(Context.SECURITY_AUTHENTICATION, "Simple"); env.put(Context.SECURITY_AUTHENTICATION, "Simple");
env.put(Context.SECURITY_PRINCIPAL, "cn=principal"); env.put(Context.SECURITY_PRINCIPAL, "cn=principal");
@ -109,62 +156,55 @@ public class LdapSSLHandshakeFailureTest {
LdapContext ctx = null; LdapContext ctx = null;
try { try {
ctx = new InitialLdapContext(env, null); ctx = new InitialLdapContext(env, null);
} catch (Exception e) { } catch (NamingException e) {
if (CustomSocketFactory.customSocket.closeMethodCalledCount() > 0 if (customSocketFactory != null) {
&& hasCustomSocketFactory System.out.println("Caught expected Exception with custom SocketFactory (no SSL Socket).");
&& Boolean.valueOf(args[1])) { if (CustomSocketFactory.customSocket.closeMethodCalledCount() <= 0) {
System.out.println(SOCKET_CLOSED_MSG); throw new RuntimeException("Custom Socket was not closed.");
}
} else if (connectTimeout > 0) {
System.out.println("Caught expected Exception with connectTimeout > 0.");
} else { } else {
throw e; throw e;
} }
} finally { } finally {
if (ctx != null) if (ctx != null) {
System.out.println("Context was created, closing it.");
Socket sock = getSocket(ctx);
ctx.close(); ctx.close();
if (!sock.isClosed()) {
throw new RuntimeException("Socket isn't closed");
}
}
} }
} catch (Exception e) {
e.printStackTrace();
throw new RuntimeException(e);
} }
} }
public static class CustomSocketFactory extends SocketFactory { private static Socket getSocket(LdapContext ctx) throws Exception {
private static CustomSocket customSocket; Field defaultInitCtxField = ctx.getClass().getSuperclass().getSuperclass().getDeclaredField("defaultInitCtx");
defaultInitCtxField.setAccessible(true);
public static CustomSocketFactory getDefault() { Object defaultInitCtx = defaultInitCtxField.get(ctx);
return new CustomSocketFactory(); Field clntField = defaultInitCtx.getClass().getDeclaredField("clnt");
} clntField.setAccessible(true);
Object clnt = clntField.get(defaultInitCtx);
@Override Field connField = clnt.getClass().getDeclaredField("conn");
public Socket createSocket() throws SocketException { connField.setAccessible(true);
customSocket = new CustomSocket(); Object conn = connField.get(clnt);
return customSocket; return (Socket)conn.getClass().getDeclaredField("sock").get(conn);
}
@Override
public Socket createSocket(String s, int timeout) {
return customSocket;
}
@Override
public Socket createSocket(String host, int port, InetAddress localHost,
int localPort) {
return customSocket;
}
@Override
public Socket createSocket(InetAddress host, int port) {
return customSocket;
}
@Override
public Socket createSocket(InetAddress address, int port,
InetAddress localAddress, int localPort) {
return customSocket;
}
} }
private static class CustomSocket extends Socket { private static class CustomSocket extends Socket {
private int closeMethodCalled = 0; private int closeMethodCalled;
public CustomSocket() { public CustomSocket() {
closeMethodCalled = 0; super();
}
public CustomSocket(String s, int port) throws IOException {
super(s, port);
} }
public int closeMethodCalledCount() { public int closeMethodCalledCount() {
@ -178,25 +218,65 @@ public class LdapSSLHandshakeFailureTest {
} }
} }
public static class CustomSocketFactoryNoUnconnected extends SocketFactory {
static CustomSocket customSocket;
public static SocketFactory getDefault() {
return new CustomSocketFactoryNoUnconnected();
}
@Override
public Socket createSocket(String s, int port) throws IOException {
customSocket = new CustomSocket(s, port);
return customSocket;
}
@Override
public Socket createSocket(String host, int port, InetAddress localHost, int localPort)
throws IOException, UnknownHostException {
return null;
}
@Override
public Socket createSocket(InetAddress host, int port) throws IOException {
return null;
}
@Override
public Socket createSocket(InetAddress address, int port, InetAddress localAddress, int localPort)
throws IOException {
return null;
}
}
public static class CustomSocketFactory extends CustomSocketFactoryNoUnconnected {
public static SocketFactory getDefault() {
return new CustomSocketFactory();
}
@Override
public Socket createSocket() throws SocketException {
customSocket = new CustomSocket();
return customSocket;
}
}
private static void setKeyStore() { private static void setKeyStore() {
String keystore = System.getProperty("test.src", ".") + File.separator + "ksWithSAN";
String fileName = "ksWithSAN", dir = System.getProperty("test.src", ".") + File.separator; System.setProperty("javax.net.ssl.keyStore", keystore);
System.setProperty("javax.net.ssl.keyStore", dir + fileName);
System.setProperty("javax.net.ssl.keyStorePassword", "welcome1"); System.setProperty("javax.net.ssl.keyStorePassword", "welcome1");
System.setProperty("javax.net.ssl.trustStore", dir + fileName); System.setProperty("javax.net.ssl.trustStore", keystore);
System.setProperty("javax.net.ssl.trustStorePassword", "welcome1"); System.setProperty("javax.net.ssl.trustStorePassword", "welcome1");
} }
static class TestServer extends Thread implements AutoCloseable { static class TestServer extends Thread implements AutoCloseable {
private boolean isForceToSleep; private boolean isForceToSleep;
private int sleepingTime;
private final ServerSocket serverSocket; private final ServerSocket serverSocket;
private final int PORT; private final int PORT;
private TestServer(boolean isForceToSleep, int sleepingTime) { private TestServer(boolean isForceToSleep) {
this.isForceToSleep = isForceToSleep; this.isForceToSleep = isForceToSleep;
this.sleepingTime = sleepingTime;
try { try {
SSLServerSocketFactory socketFactory = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault(); SSLServerSocketFactory socketFactory = (SSLServerSocketFactory) SSLServerSocketFactory.getDefault();
serverSocket = socketFactory.createServerSocket(0, 0, InetAddress.getLoopbackAddress()); serverSocket = socketFactory.createServerSocket(0, 0, InetAddress.getLoopbackAddress());
@ -217,7 +297,7 @@ public class LdapSSLHandshakeFailureTest {
InputStream in = socket.getInputStream(); InputStream in = socket.getInputStream();
OutputStream out = socket.getOutputStream()) { OutputStream out = socket.getOutputStream()) {
if (isForceToSleep) { if (isForceToSleep) {
Thread.sleep(sleepingTime); Thread.sleep(SERVER_SLEEPING_TIME);
} }
byte[] bindResponse = {0x30, 0x0C, 0x02, 0x01, 0x01, 0x61, 0x07, 0x0A, byte[] bindResponse = {0x30, 0x0C, 0x02, 0x01, 0x01, 0x61, 0x07, 0x0A,
0x01, 0x00, 0x04, 0x00, 0x04, 0x00}; 0x01, 0x00, 0x04, 0x00, 0x04, 0x00};
@ -233,7 +313,7 @@ public class LdapSSLHandshakeFailureTest {
in.skip(in.available()); in.skip(in.available());
} }
} catch (Exception e) { } catch (Exception e) {
e.printStackTrace(); // e.printStackTrace();
} }
} }
@ -245,5 +325,3 @@ public class LdapSSLHandshakeFailureTest {
} }
} }
} }