ARTEMIS-2107 clarify identity for authn failures in notification
This commit is contained in:
parent
8edd9399d2
commit
b86cf69e6a
|
@ -62,6 +62,8 @@ public final class ManagementHelper {
|
||||||
|
|
||||||
public static final SimpleString HDR_USER = new SimpleString("_AMQ_User");
|
public static final SimpleString HDR_USER = new SimpleString("_AMQ_User");
|
||||||
|
|
||||||
|
public static final SimpleString HDR_CERT_SUBJECT_DN = new SimpleString("_AMQ_CertSubjectDN");
|
||||||
|
|
||||||
public static final SimpleString HDR_CHECK_TYPE = new SimpleString("_AMQ_CheckType");
|
public static final SimpleString HDR_CHECK_TYPE = new SimpleString("_AMQ_CheckType");
|
||||||
|
|
||||||
public static final SimpleString HDR_SESSION_NAME = new SimpleString("_AMQ_SessionName");
|
public static final SimpleString HDR_SESSION_NAME = new SimpleString("_AMQ_SessionName");
|
||||||
|
|
|
@ -141,20 +141,23 @@ public class SecurityStoreImpl implements SecurityStore, HierarchicalRepositoryC
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!userIsValid && validatedUser == null) {
|
if (!userIsValid && validatedUser == null) {
|
||||||
if (notificationService != null) {
|
|
||||||
TypedProperties props = new TypedProperties();
|
|
||||||
|
|
||||||
Notification notification = new Notification(null, CoreNotificationType.SECURITY_AUTHENTICATION_VIOLATION, props);
|
|
||||||
|
|
||||||
notificationService.sendNotification(notification);
|
|
||||||
}
|
|
||||||
|
|
||||||
String certSubjectDN = "unavailable";
|
String certSubjectDN = "unavailable";
|
||||||
X509Certificate[] certs = CertificateUtil.getCertsFromConnection(connection);
|
X509Certificate[] certs = CertificateUtil.getCertsFromConnection(connection);
|
||||||
if (certs != null && certs.length > 0 && certs[0] != null) {
|
if (certs != null && certs.length > 0 && certs[0] != null) {
|
||||||
certSubjectDN = certs[0].getSubjectDN().getName();
|
certSubjectDN = certs[0].getSubjectDN().getName();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (notificationService != null) {
|
||||||
|
TypedProperties props = new TypedProperties();
|
||||||
|
props.putSimpleStringProperty(ManagementHelper.HDR_USER, SimpleString.toSimpleString(user));
|
||||||
|
props.putSimpleStringProperty(ManagementHelper.HDR_CERT_SUBJECT_DN, SimpleString.toSimpleString(certSubjectDN));
|
||||||
|
props.putSimpleStringProperty(ManagementHelper.HDR_REMOTE_ADDRESS, SimpleString.toSimpleString(connection.getRemoteAddress()));
|
||||||
|
|
||||||
|
Notification notification = new Notification(null, CoreNotificationType.SECURITY_AUTHENTICATION_VIOLATION, props);
|
||||||
|
|
||||||
|
notificationService.sendNotification(notification);
|
||||||
|
}
|
||||||
|
|
||||||
Exception e = ActiveMQMessageBundle.BUNDLE.unableToValidateUser(connection.getRemoteAddress(), user, certSubjectDN);
|
Exception e = ActiveMQMessageBundle.BUNDLE.unableToValidateUser(connection.getRemoteAddress(), user, certSubjectDN);
|
||||||
|
|
||||||
ActiveMQServerLogger.LOGGER.securityProblemWhileAuthenticating(e.getMessage());
|
ActiveMQServerLogger.LOGGER.securityProblemWhileAuthenticating(e.getMessage());
|
||||||
|
|
|
@ -746,7 +746,7 @@ un-formatted result of a call to `java.lang.System.currentTimeMillis()`.
|
||||||
|
|
||||||
- `SECURITY_AUTHENTICATION_VIOLATION` (6)
|
- `SECURITY_AUTHENTICATION_VIOLATION` (6)
|
||||||
|
|
||||||
`_AMQ_User`
|
`_AMQ_User`, `_AMQ_CertSubjectDN`, `_AMQ_RemoteAddress`
|
||||||
|
|
||||||
- `SECURITY_PERMISSION_VIOLATION` (7)
|
- `SECURITY_PERMISSION_VIOLATION` (7)
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,181 @@
|
||||||
|
/*
|
||||||
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
||||||
|
* contributor license agreements. See the NOTICE file distributed with
|
||||||
|
* this work for additional information regarding copyright ownership.
|
||||||
|
* The ASF licenses this file to You under the Apache License, Version 2.0
|
||||||
|
* (the "License"); you may not use this file except in compliance with
|
||||||
|
* the License. You may obtain a copy of the License at
|
||||||
|
*
|
||||||
|
* http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
*
|
||||||
|
* Unless required by applicable law or agreed to in writing, software
|
||||||
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
* See the License for the specific language governing permissions and
|
||||||
|
* limitations under the License.
|
||||||
|
*/
|
||||||
|
package org.apache.activemq.artemis.tests.integration.management;
|
||||||
|
|
||||||
|
import java.lang.management.ManagementFactory;
|
||||||
|
import java.net.URL;
|
||||||
|
import java.util.HashMap;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Map;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import org.apache.activemq.artemis.api.config.ActiveMQDefaultConfiguration;
|
||||||
|
import org.apache.activemq.artemis.api.core.ActiveMQException;
|
||||||
|
import org.apache.activemq.artemis.api.core.SimpleString;
|
||||||
|
import org.apache.activemq.artemis.api.core.TransportConfiguration;
|
||||||
|
import org.apache.activemq.artemis.api.core.client.ActiveMQClient;
|
||||||
|
import org.apache.activemq.artemis.api.core.client.ClientConsumer;
|
||||||
|
import org.apache.activemq.artemis.api.core.client.ClientMessage;
|
||||||
|
import org.apache.activemq.artemis.api.core.client.ClientSession;
|
||||||
|
import org.apache.activemq.artemis.api.core.client.ClientSessionFactory;
|
||||||
|
import org.apache.activemq.artemis.api.core.client.ServerLocator;
|
||||||
|
import org.apache.activemq.artemis.api.core.management.ManagementHelper;
|
||||||
|
import org.apache.activemq.artemis.core.remoting.impl.netty.TransportConstants;
|
||||||
|
import org.apache.activemq.artemis.core.security.Role;
|
||||||
|
import org.apache.activemq.artemis.core.server.ActiveMQServer;
|
||||||
|
import org.apache.activemq.artemis.core.server.ActiveMQServers;
|
||||||
|
import org.apache.activemq.artemis.spi.core.security.ActiveMQJAASSecurityManager;
|
||||||
|
import org.apache.activemq.artemis.tests.integration.security.SecurityTest;
|
||||||
|
import org.apache.activemq.artemis.tests.util.ActiveMQTestBase;
|
||||||
|
import org.apache.activemq.artemis.utils.RandomUtil;
|
||||||
|
import org.junit.Assert;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
|
||||||
|
import static org.apache.activemq.artemis.api.core.management.CoreNotificationType.SECURITY_AUTHENTICATION_VIOLATION;
|
||||||
|
|
||||||
|
public class SSLSecurityNotificationTest extends ActiveMQTestBase {
|
||||||
|
|
||||||
|
static {
|
||||||
|
String path = System.getProperty("java.security.auth.login.config");
|
||||||
|
if (path == null) {
|
||||||
|
URL resource = SecurityTest.class.getClassLoader().getResource("login.config");
|
||||||
|
if (resource != null) {
|
||||||
|
path = resource.getFile();
|
||||||
|
System.setProperty("java.security.auth.login.config", path);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private ActiveMQServer server;
|
||||||
|
|
||||||
|
private ClientSession adminSession;
|
||||||
|
|
||||||
|
private ClientConsumer notifConsumer;
|
||||||
|
|
||||||
|
private SimpleString notifQueue;
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void testSECURITY_AUTHENTICATION_VIOLATION() throws Exception {
|
||||||
|
SSLSecurityNotificationTest.flush(notifConsumer);
|
||||||
|
|
||||||
|
TransportConfiguration tc = new TransportConfiguration(NETTY_CONNECTOR_FACTORY);
|
||||||
|
tc.getParams().put(TransportConstants.SSL_ENABLED_PROP_NAME, true);
|
||||||
|
tc.getParams().put(TransportConstants.TRUSTSTORE_PATH_PROP_NAME, "client-side-truststore.jks");
|
||||||
|
tc.getParams().put(TransportConstants.TRUSTSTORE_PASSWORD_PROP_NAME, "secureexample");
|
||||||
|
tc.getParams().put(TransportConstants.KEYSTORE_PATH_PROP_NAME, "bad-client-side-keystore.jks");
|
||||||
|
tc.getParams().put(TransportConstants.KEYSTORE_PASSWORD_PROP_NAME, "secureexample");
|
||||||
|
|
||||||
|
ServerLocator locator = addServerLocator(ActiveMQClient.createServerLocatorWithoutHA(tc));
|
||||||
|
ClientSessionFactory sf = addSessionFactory(createSessionFactory(locator));
|
||||||
|
|
||||||
|
try {
|
||||||
|
sf.createSession();
|
||||||
|
Assert.fail("authentication must fail and a notification of security violation must be sent");
|
||||||
|
} catch (Exception e) {
|
||||||
|
}
|
||||||
|
|
||||||
|
ClientMessage[] notifications = SSLSecurityNotificationTest.consumeMessages(1, notifConsumer);
|
||||||
|
Assert.assertEquals(SECURITY_AUTHENTICATION_VIOLATION.toString(), notifications[0].getObjectProperty(ManagementHelper.HDR_NOTIFICATION_TYPE).toString());
|
||||||
|
Assert.assertEquals(null, notifications[0].getObjectProperty(ManagementHelper.HDR_USER));
|
||||||
|
Assert.assertEquals("CN=Bad Client, OU=Artemis, O=ActiveMQ, L=AMQ, ST=AMQ, C=AMQ", notifications[0].getObjectProperty(ManagementHelper.HDR_CERT_SUBJECT_DN).toString());
|
||||||
|
Assert.assertTrue(notifications[0].getObjectProperty(ManagementHelper.HDR_REMOTE_ADDRESS).toString().startsWith("/127.0.0.1"));
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
@Before
|
||||||
|
public void setUp() throws Exception {
|
||||||
|
super.setUp();
|
||||||
|
ActiveMQJAASSecurityManager securityManager = new ActiveMQJAASSecurityManager("CertLogin");
|
||||||
|
server = addServer(ActiveMQServers.newActiveMQServer(createDefaultInVMConfig().setSecurityEnabled(true), ManagementFactory.getPlatformMBeanServer(), securityManager, false));
|
||||||
|
|
||||||
|
Map<String, Object> params = new HashMap<>();
|
||||||
|
params.put(TransportConstants.SSL_ENABLED_PROP_NAME, true);
|
||||||
|
params.put(TransportConstants.KEYSTORE_PATH_PROP_NAME, "server-side-keystore.jks");
|
||||||
|
params.put(TransportConstants.KEYSTORE_PASSWORD_PROP_NAME, "secureexample");
|
||||||
|
params.put(TransportConstants.TRUSTSTORE_PATH_PROP_NAME, "server-side-truststore.jks");
|
||||||
|
params.put(TransportConstants.TRUSTSTORE_PASSWORD_PROP_NAME, "secureexample");
|
||||||
|
params.put(TransportConstants.NEED_CLIENT_AUTH_PROP_NAME, true);
|
||||||
|
|
||||||
|
server.getConfiguration().addAcceptorConfiguration(new TransportConfiguration(NETTY_ACCEPTOR_FACTORY, params));
|
||||||
|
|
||||||
|
server.start();
|
||||||
|
|
||||||
|
notifQueue = RandomUtil.randomSimpleString();
|
||||||
|
|
||||||
|
Role role = new Role("notif", true, true, true, true, true, true, true, true, true, true);
|
||||||
|
Set<Role> roles = new HashSet<>();
|
||||||
|
roles.add(role);
|
||||||
|
server.getSecurityRepository().addMatch(ActiveMQDefaultConfiguration.getDefaultManagementNotificationAddress().toString(), roles);
|
||||||
|
|
||||||
|
TransportConfiguration tc = new TransportConfiguration(NETTY_CONNECTOR_FACTORY);
|
||||||
|
tc.getParams().put(TransportConstants.SSL_ENABLED_PROP_NAME, true);
|
||||||
|
tc.getParams().put(TransportConstants.TRUSTSTORE_PATH_PROP_NAME, "client-side-truststore.jks");
|
||||||
|
tc.getParams().put(TransportConstants.TRUSTSTORE_PASSWORD_PROP_NAME, "secureexample");
|
||||||
|
tc.getParams().put(TransportConstants.KEYSTORE_PATH_PROP_NAME, "client-side-keystore.jks");
|
||||||
|
tc.getParams().put(TransportConstants.KEYSTORE_PASSWORD_PROP_NAME, "secureexample");
|
||||||
|
|
||||||
|
ServerLocator locator = addServerLocator(ActiveMQClient.createServerLocatorWithoutHA(tc));
|
||||||
|
ClientSessionFactory sf = addSessionFactory(createSessionFactory(locator));
|
||||||
|
adminSession = sf.createSession(true, true, 1);
|
||||||
|
adminSession.start();
|
||||||
|
|
||||||
|
adminSession.createTemporaryQueue(ActiveMQDefaultConfiguration.getDefaultManagementNotificationAddress(), notifQueue);
|
||||||
|
|
||||||
|
notifConsumer = adminSession.createConsumer(notifQueue);
|
||||||
|
}
|
||||||
|
|
||||||
|
// Private -------------------------------------------------------
|
||||||
|
|
||||||
|
private static void flush(final ClientConsumer notifConsumer) throws ActiveMQException {
|
||||||
|
ClientMessage message = null;
|
||||||
|
do {
|
||||||
|
message = notifConsumer.receive(500);
|
||||||
|
}
|
||||||
|
while (message != null);
|
||||||
|
}
|
||||||
|
|
||||||
|
protected static ClientMessage[] consumeMessages(final int expected,
|
||||||
|
final ClientConsumer consumer) throws Exception {
|
||||||
|
ClientMessage[] messages = new ClientMessage[expected];
|
||||||
|
|
||||||
|
ClientMessage m = null;
|
||||||
|
for (int i = 0; i < expected; i++) {
|
||||||
|
m = consumer.receive(500);
|
||||||
|
if (m != null) {
|
||||||
|
for (SimpleString key : m.getPropertyNames()) {
|
||||||
|
System.out.println(key + "=" + m.getObjectProperty(key));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Assert.assertNotNull("expected to received " + expected + " messages, got only " + i, m);
|
||||||
|
messages[i] = m;
|
||||||
|
m.acknowledge();
|
||||||
|
}
|
||||||
|
m = consumer.receiveImmediate();
|
||||||
|
if (m != null) {
|
||||||
|
for (SimpleString key : m.getPropertyNames()) {
|
||||||
|
System.out.println(key + "=" + m.getObjectProperty(key));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Assert.assertNull("received one more message than expected (" + expected + ")", m);
|
||||||
|
|
||||||
|
return messages;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Inner classes -------------------------------------------------
|
||||||
|
|
||||||
|
}
|
|
@ -80,6 +80,9 @@ public class SecurityNotificationTest extends ActiveMQTestBase {
|
||||||
|
|
||||||
ClientMessage[] notifications = SecurityNotificationTest.consumeMessages(1, notifConsumer);
|
ClientMessage[] notifications = SecurityNotificationTest.consumeMessages(1, notifConsumer);
|
||||||
Assert.assertEquals(SECURITY_AUTHENTICATION_VIOLATION.toString(), notifications[0].getObjectProperty(ManagementHelper.HDR_NOTIFICATION_TYPE).toString());
|
Assert.assertEquals(SECURITY_AUTHENTICATION_VIOLATION.toString(), notifications[0].getObjectProperty(ManagementHelper.HDR_NOTIFICATION_TYPE).toString());
|
||||||
|
Assert.assertEquals(unknownUser, notifications[0].getObjectProperty(ManagementHelper.HDR_USER).toString());
|
||||||
|
Assert.assertEquals("unavailable", notifications[0].getObjectProperty(ManagementHelper.HDR_CERT_SUBJECT_DN).toString());
|
||||||
|
Assert.assertEquals("invm:0", notifications[0].getObjectProperty(ManagementHelper.HDR_REMOTE_ADDRESS).toString());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -17,3 +17,4 @@
|
||||||
|
|
||||||
programmers=first
|
programmers=first
|
||||||
widgets=second
|
widgets=second
|
||||||
|
notif=first
|
||||||
|
|
Loading…
Reference in New Issue