/* * Copyright (c) 2001, 2011, Oracle and/or its affiliates. All rights reserved. * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. * * This code is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License version 2 only, as * published by the Free Software Foundation. * * This code is distributed in the hope that it will be useful, but WITHOUT * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * version 2 for more details (a copy is included in the LICENSE file that * accompanied this code). * * You should have received a copy of the GNU General Public License version * 2 along with this work; if not, write to the Free Software Foundation, * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. * * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA * or visit www.oracle.com if you need additional information or have any * questions. */ /* * @test * @bug 4323990 4413069 8160838 * @summary HttpsURLConnection doesn't send Proxy-Authorization on CONNECT * Incorrect checking of proxy server response * @modules java.base/sun.net.www * @run main/othervm ProxyAuthTest fail * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=Basic ProxyAuthTest fail * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=Basic, ProxyAuthTest fail * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=BAsIc ProxyAuthTest fail * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=Basic,Digest ProxyAuthTest fail * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=Unknown,bAsIc ProxyAuthTest fail * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes= ProxyAuthTest succeed * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=Digest,NTLM,Negotiate ProxyAuthTest succeed * @run main/othervm -Djdk.http.auth.tunneling.disabledSchemes=UNKNOWN,notKnown ProxyAuthTest succeed */ // No way to reserve and restore java.lang.Authenticator, as well as read-once // system properties, so this tests needs to run in othervm mode. import java.io.*; import java.net.*; import java.security.KeyStore; import javax.net.*; import javax.net.ssl.*; import java.security.cert.*; import static java.nio.charset.StandardCharsets.US_ASCII; /* * ProxyAuthTest.java -- includes a simple server that can serve * Http get request in both clear and secure channel, and a client * that makes https requests behind the firewall through an * authentication proxy */ public class ProxyAuthTest { /* * Where do we find the keystores? */ static String pathToStores = "../../../../../../javax/net/ssl/etc"; static String keyStoreFile = "keystore"; static String trustStoreFile = "truststore"; static String passwd = "passphrase"; volatile private static int serverPort = 0; /* * The TestServer implements a OriginServer that * processes HTTP requests and responses. */ static class TestServer extends OriginServer { public TestServer(ServerSocket ss) throws Exception { super(ss); } /* * Returns an array of bytes containing the bytes for * the data sent in the response. * * @return bytes for the data in the response */ public byte[] getBytes() { return "Proxy authentication for tunneling succeeded ..". getBytes(US_ASCII); } } /* * Main method to create the server and the client */ public static void main(String args[]) throws Exception { boolean expectSuccess; if (args[0].equals("succeed")) { expectSuccess = true; } else { expectSuccess = false; } String keyFilename = System.getProperty("test.src", "./") + "/" + pathToStores + "/" + keyStoreFile; String trustFilename = System.getProperty("test.src", "./") + "/" + pathToStores + "/" + trustStoreFile; System.setProperty("javax.net.ssl.keyStore", keyFilename); System.setProperty("javax.net.ssl.keyStorePassword", passwd); System.setProperty("javax.net.ssl.trustStore", trustFilename); System.setProperty("javax.net.ssl.trustStorePassword", passwd); boolean useSSL = true; /* * setup the server */ Closeable server; try { ServerSocketFactory ssf = ProxyAuthTest.getServerSocketFactory(useSSL); ServerSocket ss = ssf.createServerSocket(serverPort); serverPort = ss.getLocalPort(); server = new TestServer(ss); } catch (Exception e) { System.out.println("Server side failed:" + e.getMessage()); throw e; } // trigger the client try { doClientSide(); if (!expectSuccess) { throw new RuntimeException( "Expected exception/failure to connect, but succeeded."); } } catch (IOException e) { if (expectSuccess) { System.out.println("Client side failed: " + e.getMessage()); throw e; } if (! (e.getMessage().contains("Unable to tunnel through proxy") && e.getMessage().contains("407")) ) { throw new RuntimeException( "Expected exception about cannot tunnel, 407, etc, but got", e); } else { // Informative System.out.println("Caught expected exception: " + e.getMessage()); } } finally { if (server != null) server.close(); } } private static ServerSocketFactory getServerSocketFactory (boolean useSSL) throws Exception { if (useSSL) { SSLServerSocketFactory ssf = null; // set up key manager to do server authentication SSLContext ctx; KeyManagerFactory kmf; KeyStore ks; char[] passphrase = passwd.toCharArray(); ctx = SSLContext.getInstance("TLS"); kmf = KeyManagerFactory.getInstance("SunX509"); ks = KeyStore.getInstance("JKS"); ks.load(new FileInputStream(System.getProperty( "javax.net.ssl.keyStore")), passphrase); kmf.init(ks, passphrase); ctx.init(kmf.getKeyManagers(), null, null); ssf = ctx.getServerSocketFactory(); return ssf; } else { return ServerSocketFactory.getDefault(); } } static void doClientSide() throws IOException { /* * setup up a proxy with authentication information */ ProxyTunnelServer ps = setupProxy(); /* * we want to avoid URLspoofCheck failures in cases where the cert * DN name does not match the hostname in the URL. */ HttpsURLConnection.setDefaultHostnameVerifier( new NameVerifier()); InetSocketAddress paddr = new InetSocketAddress("localhost", ps.getPort()); Proxy proxy = new Proxy(Proxy.Type.HTTP, paddr); URL url = new URL("https://" + "localhost:" + serverPort + "/index.html"); BufferedReader in = null; HttpsURLConnection uc = (HttpsURLConnection) url.openConnection(proxy); try { in = new BufferedReader(new InputStreamReader(uc.getInputStream())); String inputLine; System.out.print("Client recieved from the server: "); while ((inputLine = in.readLine()) != null) System.out.println(inputLine); in.close(); } catch (IOException e) { // Assert that the error stream is not accessible from the failed // tunnel setup. if (uc.getErrorStream() != null) { throw new RuntimeException("Unexpected error stream."); } if (in != null) in.close(); throw e; } } static class NameVerifier implements HostnameVerifier { public boolean verify(String hostname, SSLSession session) { return true; } } static ProxyTunnelServer setupProxy() throws IOException { ProxyTunnelServer pserver = new ProxyTunnelServer(); /* * register a system wide authenticator and setup the proxy for * authentication */ Authenticator.setDefault(new TestAuthenticator()); // register with the username and password pserver.needUserAuth(true); pserver.setUserAuth("Test", "test123"); pserver.start(); return pserver; } public static class TestAuthenticator extends Authenticator { public PasswordAuthentication getPasswordAuthentication() { return new PasswordAuthentication("Test", "test123".toCharArray()); } } }