lwm2m: fix bug commit validate keys
This commit is contained in:
parent
d491e0f664
commit
6335f49c07
@ -1,196 +0,0 @@
|
||||
/**
|
||||
* Copyright © 2016-2021 The Thingsboard Authors
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.thingsboard.server.service.lwm2m;
|
||||
|
||||
|
||||
import com.fasterxml.jackson.core.JsonProcessingException;
|
||||
import com.fasterxml.jackson.databind.JsonNode;
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.slf4j.Slf4j;
|
||||
import org.eclipse.leshan.core.SecurityMode;
|
||||
import org.eclipse.leshan.core.util.Hex;
|
||||
import org.eclipse.leshan.core.util.SecurityUtil;
|
||||
import org.eclipse.leshan.server.bootstrap.InvalidConfigurationException;
|
||||
import org.springframework.boot.autoconfigure.condition.ConditionalOnExpression;
|
||||
import org.springframework.stereotype.Service;
|
||||
import org.thingsboard.server.common.data.DeviceProfile;
|
||||
import org.thingsboard.server.common.data.device.profile.Lwm2mDeviceProfileTransportConfiguration;
|
||||
import org.thingsboard.server.common.data.lwm2m.ServerSecurityConfig;
|
||||
import org.thingsboard.server.common.data.security.DeviceCredentials;
|
||||
import org.thingsboard.server.transport.lwm2m.config.LwM2MSecureServerConfig;
|
||||
import org.thingsboard.server.transport.lwm2m.config.LwM2MTransportBootstrapConfig;
|
||||
import org.thingsboard.server.transport.lwm2m.config.LwM2MTransportServerConfig;
|
||||
|
||||
import java.io.IOException;
|
||||
import java.security.GeneralSecurityException;
|
||||
import java.security.KeyStore;
|
||||
import java.security.PrivateKey;
|
||||
import java.security.PublicKey;
|
||||
import java.security.cert.Certificate;
|
||||
import java.security.cert.X509Certificate;
|
||||
import java.util.Map;
|
||||
|
||||
@Slf4j
|
||||
@Service
|
||||
@RequiredArgsConstructor
|
||||
@ConditionalOnExpression("('${service.type:null}'=='tb-transport' && '${transport.lwm2m.enabled:false}'=='true') || '${service.type:null}'=='monolith' || '${service.type:null}'=='tb-core'")
|
||||
public class LwM2MServerSecurityInfoRepository {
|
||||
|
||||
private final LwM2MTransportServerConfig serverConfig;
|
||||
private final LwM2MTransportBootstrapConfig bootstrapConfig;
|
||||
|
||||
public ServerSecurityConfig getServerSecurityInfo(boolean bootstrapServer) {
|
||||
ServerSecurityConfig result = getServerSecurityConfig(bootstrapServer ? bootstrapConfig : serverConfig);
|
||||
result.setBootstrapServerIs(bootstrapServer);
|
||||
return result;
|
||||
}
|
||||
|
||||
private ServerSecurityConfig getServerSecurityConfig(LwM2MSecureServerConfig serverConfig) {
|
||||
ServerSecurityConfig bsServ = new ServerSecurityConfig();
|
||||
bsServ.setServerId(serverConfig.getId());
|
||||
bsServ.setHost(serverConfig.getHost());
|
||||
bsServ.setPort(serverConfig.getPort());
|
||||
bsServ.setSecurityHost(serverConfig.getSecureHost());
|
||||
bsServ.setSecurityPort(serverConfig.getSecurePort());
|
||||
bsServ.setServerPublicKey(getPublicKey(serverConfig));
|
||||
return bsServ;
|
||||
}
|
||||
|
||||
private String getPublicKey(LwM2MSecureServerConfig config) {
|
||||
try {
|
||||
KeyStore keyStore = serverConfig.getKeyStoreValue();
|
||||
if (keyStore != null) {
|
||||
X509Certificate serverCertificate = (X509Certificate) serverConfig.getKeyStoreValue().getCertificate(config.getCertificateAlias());
|
||||
return Hex.encodeHexString(serverCertificate.getPublicKey().getEncoded());
|
||||
}
|
||||
} catch (Exception e) {
|
||||
log.trace("Failed to fetch public key from key store!", e);
|
||||
|
||||
}
|
||||
return "";
|
||||
}
|
||||
|
||||
public void verifySecurityKeyDevice(DeviceCredentials deviceCredentials) throws InvalidConfigurationException, JsonProcessingException {
|
||||
JsonNode nodeCredentialsValue = deviceCredentials.getNodeCredentialsValue();
|
||||
checkClientKey (nodeCredentialsValue.get("client"));
|
||||
checkServerKey (nodeCredentialsValue.get("bootstrap").get("bootstrapServer"), "Client`s by bootstrapServer");
|
||||
checkServerKey (nodeCredentialsValue.get("bootstrap").get("lwm2mServer"), "Client`s by lwm2mServer");
|
||||
}
|
||||
|
||||
private void checkClientKey (JsonNode node) throws InvalidConfigurationException {
|
||||
String modeName = node.get("securityConfigClientMode").asText();
|
||||
// checks security config
|
||||
|
||||
if (SecurityMode.RPK.name().equals(modeName)) {
|
||||
String value = node.get("key").textValue();
|
||||
assertIf(decodeRfc7250PublicKey(Hex.decodeHex(((String) value).toCharArray())) == null,
|
||||
"raw-public-key mode, Client`s public key or id must be RFC7250 encoded public key");
|
||||
} else if (SecurityMode.X509.name().equals(modeName)) {
|
||||
String value = node.get("cert").textValue();
|
||||
if (value != null && !value.isEmpty()) {
|
||||
assertIf(decodeCertificate(Hex.decodeHex(((String) value).toCharArray())) == null,
|
||||
"x509 mode, Client`s public key must be DER encoded X.509 certificate");
|
||||
}
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
private void checkServerKey (JsonNode node, String serverType) throws InvalidConfigurationException {
|
||||
String modeName = node.get("securityMode").asText();
|
||||
// checks security config
|
||||
if (SecurityMode.RPK.name().equals(modeName)) {
|
||||
checkRPKServer(node, serverType);
|
||||
} else if (SecurityMode.X509.name().equals(modeName)) {
|
||||
checkX509Server(node, serverType);
|
||||
}
|
||||
}
|
||||
|
||||
protected void checkRPKServer(JsonNode node, String serverType) throws InvalidConfigurationException {
|
||||
String value = node.get("clientSecretKey").textValue();
|
||||
assertIf(decodeRfc5958PrivateKey(Hex.decodeHex(value.toCharArray())) == null,
|
||||
"raw-public-key mode, " + serverType + " secret key must be RFC5958 encoded private key");
|
||||
value = node.get("clientPublicKeyOrId").textValue();
|
||||
assertIf(decodeRfc7250PublicKey(Hex.decodeHex(value.toCharArray())) == null,
|
||||
"raw-public-key mode, " + serverType + " public key or id must be RFC7250 encoded public key");
|
||||
}
|
||||
|
||||
protected void checkX509Server(JsonNode node, String serverType) throws InvalidConfigurationException {
|
||||
String value = node.get("clientSecretKey").textValue();
|
||||
assertIf(decodeRfc5958PrivateKey(Hex.decodeHex(value.toCharArray())) == null,
|
||||
"x509 mode " + serverType + " secret key must be RFC5958 encoded private key");
|
||||
value = node.get("clientPublicKeyOrId").textValue();
|
||||
assertIf(decodeCertificate(Hex.decodeHex(value.toCharArray())) == null,
|
||||
"x509 mode " + serverType + " public key must be DER encoded X.509 certificate");
|
||||
|
||||
}
|
||||
|
||||
public void verifySecurityKeyDeviceProfile(DeviceProfile deviceProfile) throws InvalidConfigurationException, JsonProcessingException {
|
||||
Map serverBs = ((Lwm2mDeviceProfileTransportConfiguration)deviceProfile.getProfileData().getTransportConfiguration()).getBootstrap().getBootstrapServer();
|
||||
checkDeviceProfileServer (serverBs, "Servers: BootstrapServer`s");
|
||||
Map serverLwm2m = ((Lwm2mDeviceProfileTransportConfiguration)deviceProfile.getProfileData().getTransportConfiguration()).getBootstrap().getLwm2mServer();
|
||||
checkDeviceProfileServer (serverLwm2m, "Servers: Lwm2mServer`s");
|
||||
|
||||
}
|
||||
|
||||
protected void checkDeviceProfileServer (Map server, String serverType) throws InvalidConfigurationException{
|
||||
// checks security config
|
||||
String value = (String) server.get("serverPublicKey");
|
||||
if (SecurityMode.RPK.name().equals(server.get("securityMode"))) {
|
||||
assertIf(decodeRfc7250PublicKey(Hex.decodeHex(value.toCharArray())) == null,
|
||||
"raw-public-key mode, " + serverType + " public key or id must be RFC7250 encoded public key");
|
||||
} else if (SecurityMode.X509.name().equals(server.get("securityMode"))) {
|
||||
assertIf(decodeCertificate(Hex.decodeHex(value.toCharArray())) == null,
|
||||
"x509 mode, " + serverType + " public key must be DER encoded X.509 certificate");
|
||||
}
|
||||
}
|
||||
|
||||
protected PrivateKey decodeRfc5958PrivateKey(byte[] encodedKey) throws InvalidConfigurationException {
|
||||
try {
|
||||
return SecurityUtil.privateKey.decode(encodedKey);
|
||||
} catch (IOException | GeneralSecurityException e) {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
protected PublicKey decodeRfc7250PublicKey(byte[] encodedKey) throws InvalidConfigurationException {
|
||||
try {
|
||||
return SecurityUtil.publicKey.decode(encodedKey);
|
||||
} catch (IOException | GeneralSecurityException e) {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
protected Certificate decodeCertificate(byte[] encodedCert) throws InvalidConfigurationException {
|
||||
try {
|
||||
return SecurityUtil.certificate.decode(encodedCert);
|
||||
} catch (IOException | GeneralSecurityException e) {
|
||||
return null;
|
||||
}
|
||||
}
|
||||
|
||||
protected static void assertIf(boolean condition, String message) throws InvalidConfigurationException {
|
||||
if (condition) {
|
||||
throw new InvalidConfigurationException(message);
|
||||
}
|
||||
}
|
||||
|
||||
protected static boolean isEmpty(byte[] array) {
|
||||
return array == null || array.length == 0;
|
||||
}
|
||||
|
||||
|
||||
}
|
||||
|
||||
@ -0,0 +1,71 @@
|
||||
/**
|
||||
* Copyright © 2016-2021 The Thingsboard Authors
|
||||
*
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
*/
|
||||
package org.thingsboard.server.service.lwm2m;
|
||||
|
||||
import lombok.RequiredArgsConstructor;
|
||||
import lombok.extern.slf4j.Slf4j;
|
||||
import org.eclipse.leshan.core.util.Hex;
|
||||
import org.springframework.boot.autoconfigure.condition.ConditionalOnExpression;
|
||||
import org.springframework.stereotype.Service;
|
||||
import org.thingsboard.server.common.data.lwm2m.ServerSecurityConfig;
|
||||
import org.thingsboard.server.transport.lwm2m.config.LwM2MSecureServerConfig;
|
||||
import org.thingsboard.server.transport.lwm2m.config.LwM2MTransportBootstrapConfig;
|
||||
import org.thingsboard.server.transport.lwm2m.config.LwM2MTransportServerConfig;
|
||||
import java.security.KeyStore;
|
||||
import java.security.cert.X509Certificate;
|
||||
|
||||
@Slf4j
|
||||
@Service
|
||||
@RequiredArgsConstructor
|
||||
@ConditionalOnExpression("('${service.type:null}'=='tb-transport' && '${transport.lwm2m.enabled:false}'=='true') || '${service.type:null}'=='monolith' || '${service.type:null}'=='tb-core'")
|
||||
public class LwM2MServiceImpl implements LwM2MService {
|
||||
|
||||
private final LwM2MTransportServerConfig serverConfig;
|
||||
private final LwM2MTransportBootstrapConfig bootstrapConfig;
|
||||
|
||||
@Override
|
||||
public ServerSecurityConfig getServerSecurityInfo(boolean bootstrapServer) {
|
||||
ServerSecurityConfig result = getServerSecurityConfig(bootstrapServer ? bootstrapConfig : serverConfig);
|
||||
result.setBootstrapServerIs(bootstrapServer);
|
||||
return result;
|
||||
}
|
||||
|
||||
private ServerSecurityConfig getServerSecurityConfig(LwM2MSecureServerConfig serverConfig) {
|
||||
ServerSecurityConfig bsServ = new ServerSecurityConfig();
|
||||
bsServ.setServerId(serverConfig.getId());
|
||||
bsServ.setHost(serverConfig.getHost());
|
||||
bsServ.setPort(serverConfig.getPort());
|
||||
bsServ.setSecurityHost(serverConfig.getSecureHost());
|
||||
bsServ.setSecurityPort(serverConfig.getSecurePort());
|
||||
bsServ.setServerPublicKey(getPublicKey(serverConfig));
|
||||
return bsServ;
|
||||
}
|
||||
|
||||
private String getPublicKey(LwM2MSecureServerConfig config) {
|
||||
try {
|
||||
KeyStore keyStore = serverConfig.getKeyStoreValue();
|
||||
if (keyStore != null) {
|
||||
X509Certificate serverCertificate = (X509Certificate) serverConfig.getKeyStoreValue().getCertificate(config.getCertificateAlias());
|
||||
return Hex.encodeHexString(serverCertificate.getPublicKey().getEncoded());
|
||||
}
|
||||
} catch (Exception e) {
|
||||
log.trace("Failed to fetch public key from key store!", e);
|
||||
|
||||
}
|
||||
return "";
|
||||
}
|
||||
}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user