This repository has been archived by the owner on May 16, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 105
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* Add Allow-List-Check for mTLS Authentication (#246)
* Add Allow-List-Check for mTLS Authentication * Change Allow-List to Comma seperated Co-authored-by: Felix Dittrich <[email protected]>
- Loading branch information
1 parent
ac33d9a
commit e38924a
Showing
5 changed files
with
125 additions
and
25 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
118 changes: 118 additions & 0 deletions
118
src/main/java/app/coronawarn/verification/config/MtlsSecurityConfig.java
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,118 @@ | ||
/* | ||
* Corona-Warn-App / cwa-verification | ||
* | ||
* (C) 2020, T-Systems International GmbH | ||
* | ||
* Deutsche Telekom AG and all other contributors / | ||
* copyright owners license this file to you under the Apache | ||
* License, Version 2.0 (the "License"); you may not use this | ||
* file except in compliance with the License. | ||
* You may obtain a copy of the License at | ||
* | ||
* http://www.apache.org/licenses/LICENSE-2.0 | ||
* | ||
* Unless required by applicable law or agreed to in writing, | ||
* software distributed under the License is distributed on an | ||
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY | ||
* KIND, either express or implied. See the License for the | ||
* specific language governing permissions and limitations | ||
* under the License. | ||
*/ | ||
|
||
package app.coronawarn.verification.config; | ||
|
||
import java.security.MessageDigest; | ||
import java.security.NoSuchAlgorithmException; | ||
import java.security.cert.CertificateEncodingException; | ||
import java.security.cert.X509Certificate; | ||
import java.util.Arrays; | ||
import java.util.Collections; | ||
import java.util.stream.Stream; | ||
import lombok.RequiredArgsConstructor; | ||
import lombok.extern.slf4j.Slf4j; | ||
import org.springframework.boot.autoconfigure.condition.ConditionalOnProperty; | ||
import org.springframework.context.annotation.Bean; | ||
import org.springframework.context.annotation.Configuration; | ||
import org.springframework.http.HttpMethod; | ||
import org.springframework.http.HttpStatus; | ||
import org.springframework.security.config.annotation.web.builders.HttpSecurity; | ||
import org.springframework.security.config.annotation.web.configuration.EnableWebSecurity; | ||
import org.springframework.security.config.annotation.web.configuration.WebSecurityConfigurerAdapter; | ||
import org.springframework.security.core.userdetails.User; | ||
import org.springframework.security.core.userdetails.UserDetailsService; | ||
import org.springframework.security.crypto.codec.Hex; | ||
import org.springframework.security.web.authentication.preauth.x509.X509PrincipalExtractor; | ||
import org.springframework.security.web.firewall.HttpFirewall; | ||
import org.springframework.security.web.firewall.StrictHttpFirewall; | ||
import org.springframework.web.server.ResponseStatusException; | ||
|
||
@Configuration | ||
@Slf4j | ||
@RequiredArgsConstructor | ||
@ConditionalOnProperty(name = "server.ssl.client-auth", havingValue = "need") | ||
public class MtlsSecurityConfig extends WebSecurityConfigurerAdapter { | ||
|
||
private final VerificationApplicationConfig config; | ||
|
||
@Bean | ||
protected HttpFirewall strictFirewall() { | ||
StrictHttpFirewall firewall = new StrictHttpFirewall(); | ||
firewall.setAllowedHttpMethods(Arrays.asList( | ||
HttpMethod.GET.name(), | ||
HttpMethod.POST.name() | ||
)); | ||
return firewall; | ||
} | ||
|
||
@Override | ||
protected void configure(HttpSecurity http) throws Exception { | ||
http | ||
.authorizeRequests() | ||
.mvcMatchers("/api/**").authenticated().and() | ||
.requiresChannel().mvcMatchers("/api/**").requiresSecure().and() | ||
.x509().x509PrincipalExtractor(new ThumbprintX509PrincipalExtractor()).userDetailsService(userDetailsService()) | ||
.and().authorizeRequests() | ||
.mvcMatchers("/version/**").permitAll() | ||
.mvcMatchers("/actuator/**").permitAll() | ||
.anyRequest().denyAll() | ||
.and().csrf().disable(); | ||
} | ||
|
||
@Override | ||
public UserDetailsService userDetailsService() { | ||
return hash -> { | ||
|
||
boolean allowed = Stream.of(config.getAllowedClientCertificates() | ||
.split(",")) | ||
.map(String::trim) | ||
.anyMatch(entry -> entry.equalsIgnoreCase(hash)); | ||
|
||
if (allowed) { | ||
return new User(hash, "", Collections.emptyList()); | ||
} else { | ||
log.error("Failed to authenticate cert with hash {}", hash); | ||
throw new ResponseStatusException(HttpStatus.UNAUTHORIZED); | ||
} | ||
}; | ||
} | ||
|
||
private static class ThumbprintX509PrincipalExtractor implements X509PrincipalExtractor { | ||
|
||
MessageDigest messageDigest; | ||
|
||
private ThumbprintX509PrincipalExtractor() throws NoSuchAlgorithmException { | ||
messageDigest = MessageDigest.getInstance("SHA-256"); | ||
} | ||
|
||
@Override | ||
public Object extractPrincipal(X509Certificate x509Certificate) { | ||
try { | ||
return String.valueOf(Hex.encode(messageDigest.digest(x509Certificate.getEncoded()))); | ||
} catch (CertificateEncodingException e) { | ||
log.error("Failed to extract bytes from certificate"); | ||
return null; | ||
} | ||
} | ||
} | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -83,4 +83,4 @@ request: | |
|
||
cwa-testresult-server: | ||
url: http://localhost:8088 | ||
allowed-client-certificates: |