view test/sun/security/ssl/SSLContextImpl/IllegalProtocolProperty.java @ 14930:f2f0ceec19fb

8202343: Disable TLS 1.0 and 1.1 Reviewed-by: xuelei, dfuchs, coffeys, sgehwolf
author mullan
date Thu, 19 Nov 2020 14:15:57 +0000
parents 3ec03c289ff2
children
line wrap: on
line source

/*
 * Copyright (c) 2013, 2020, Oracle and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
 * or visit www.oracle.com if you need additional information or have any
 * questions.
 */

// SunJSSE does not support dynamic system properties, no way to re-use
// system properties in samevm/agentvm mode.

/*
 * @test
 * @bug 7093640
 * @summary Enable TLS 1.1 and TLS 1.2 by default in client side of SunJSSE
 * @library /lib/security
 * @run main/othervm -Djdk.tls.client.protocols="XSLv3,TLSv1"
 *      IllegalProtocolProperty
 */

import javax.net.ssl.*;
import java.security.NoSuchAlgorithmException;

public class IllegalProtocolProperty {
    static enum ContextVersion {
        TLS_CV_01("SSL", "TLSv1", "TLSv1.2", true),
        TLS_CV_02("TLS", "TLSv1", "TLSv1.2", true),
        TLS_CV_03("SSLv3", "TLSv1", "TLSv1.2", false),
        TLS_CV_04("TLSv1", "TLSv1", "TLSv1.2", false),
        TLS_CV_05("TLSv1.1", "TLSv1.1", "TLSv1.2", false),
        TLS_CV_06("TLSv1.2", "TLSv1.2", "TLSv1.2", false),
        TLS_CV_07("Default", "TLSv1", "TLSv1.2", true);

        final String contextVersion;
        final String defaultProtocolVersion;
        final String supportedProtocolVersion;
        final boolean impacted;

        ContextVersion(String contextVersion, String defaultProtocolVersion,
                String supportedProtocolVersion, boolean impacted) {
            this.contextVersion = contextVersion;
            this.defaultProtocolVersion = defaultProtocolVersion;
            this.supportedProtocolVersion = supportedProtocolVersion;
            this.impacted = impacted;
        }
    }

    public static void main(String[] args) throws Exception {
        // Re-enable TLSv1 and TLSv1.1 since test depends on them.
        SecurityUtils.removeFromDisabledTlsAlgs("TLSv1", "TLSv1.1");

        for (ContextVersion cv : ContextVersion.values()) {
            System.out.println("Checking SSLContext of " + cv.contextVersion);

            SSLContext context;
            try {
                context = SSLContext.getInstance(cv.contextVersion);
                if (cv.impacted) {
                    throw new Exception(
                        "illegal system property jdk.tls.client.protocols: " +
                        System.getProperty("jdk.tls.client.protocols"));
                }
            } catch (NoSuchAlgorithmException nsae) {
                if (cv.impacted) {
                    System.out.println(
                        "\tIgnore: illegal system property " +
                        "jdk.tls.client.protocols=" +
                        System.getProperty("jdk.tls.client.protocols"));
                    continue;
                } else {
                    throw nsae;
                }
            }

            // Default SSLContext is initialized automatically.
            if (!cv.contextVersion.equals("Default")) {
                // Use default TK, KM and random.
                context.init((KeyManager[])null, (TrustManager[])null, null);
            }

            SSLParameters parameters = context.getDefaultSSLParameters();

            String[] protocols = parameters.getProtocols();
            String[] ciphers = parameters.getCipherSuites();

            if (protocols.length == 0 || ciphers.length == 0) {
                throw new Exception("No default protocols or cipher suites");
            }

            boolean isMatch = false;
            for (String protocol : protocols) {
                System.out.println("\tdefault protocol version " + protocol);
                if (protocol.equals(cv.defaultProtocolVersion)) {
                    isMatch = true;
                    break;
                }
            }

            if (!isMatch) {
                throw new Exception("No matched default protocol");
            }

            parameters = context.getSupportedSSLParameters();

            protocols = parameters.getProtocols();
            ciphers = parameters.getCipherSuites();

            if (protocols.length == 0 || ciphers.length == 0) {
                throw new Exception("No supported protocols or cipher suites");
            }

            isMatch = false;
            for (String protocol : protocols) {
                System.out.println("\tsupported protocol version " + protocol);
                if (protocol.equals(cv.supportedProtocolVersion)) {
                    isMatch = true;
                    break;
                }
            }

            if (!isMatch) {
                throw new Exception("No matched supported protocol");
            }
            System.out.println("\t... Success");
        }
    }
}