Practical Dynamic Modules (OSGi) Security
Protecting More Than Just Data
David Smith James Gould VeriSign 201
Practical Dynamic Modules (OSGi) Security Protecting More Than Just - - PowerPoint PPT Presentation
Practical Dynamic Modules (OSGi) Security Protecting More Than Just Data David Smith James Gould VeriSign 201 AGENDA > Background on OSGi > Security per OSGI spec > Security beyond OSGI spec Background on OSGi > Why use
Protecting More Than Just Data
David Smith James Gould VeriSign 201
> Background on OSGi > Security per OSGI spec > Security beyond OSGI spec
> Why use OSGi? – Modularity – Service-oriented architecture – Hot-deployable updates – Multiple versions of code in residence – Hot-swappable versions > Ideal for highly available, highly adaptable applications > OSGi containers include: – Eclipse Equinox – Apache Felix – Knopflerfish
Starting, Started Stopping, Stopped Installed, Resolved
Application Bundle Management Bundle System Bundles user admin
> Java 2 Security! – Use of Security Manager, Security Policies with Permissions > Permission Admin Service > Conditional Permission Admin Service > User Admin Service
> Truly cross-cutting security apart from Java 2 Security > Java Authentication and Authorization Service (JAAS) integration > Securing the container from bad people > An easy way to apply user-based, declarative access protections – No @annotations – Only programmatic security – Not declarative
> Let’s walk through memory lane? > Protect what bundles can do – Bundles granted permissions based on code base and jar signing – Programmatic checking permissions in bundles
> Enable Security Manager
> Define security policy in policy file
> Create custom permissions or use java.security.BasicPermission new BasicPermission(“displayReports”); > Check permissions in protected code segments SecurityManager sm = System.getSecurityManager(); if (sm != null) sm.checkPermission(new BasicPermission(“displayReports”));
keystore “jazoon.jks”; grant codeBase "file:Untrusted*" { permission java.io.FilePermission "<<ALL FILES>>", "read"; }; grant signedBy ”jazoontest" { permission java.io.FilePermission "<<ALL FILES>>", "read, write, delete, execute"; }; grant { permission java.security.AllPermission; };
$ keytool -list -keystore jazoon.jks –storepass <pass> Keystore type: jks Keystore provider: SUN Your keystore contains 1 entry jazoontest, May 25, 2010, keyEntry, Certificate fingerprint (MD5): 93:48:DC:4B:E5:E3:B2:05:F2:9B:A4:74:73:22:A1:C9 }; $ jarsigner –keystore jazoon.jks jazoontest.jar jazoontest Enter Passphrase for keystore: <pass>
Class Loader A Class Loader B System Class Loader Protection Domain A Protection Domain B Class A Class B File System PD
Security.checkPermission( new FilePermission(file, “write”)); B.doAction() File.createTempFile(“pre”, null); AccessControlContext context = AccessController.getContext (); ProtectionDomain.implies(pe rm);
If all Protection Domains don’t imply the permission, then a SecurityException occurs Class A, Class B, and File must imply FilePermission(file, “write”)
Class Loader A Class Loader B System Class Loader Protection Domain A Protection Domain B Class A Class B File System PD What if B.doAction() needs to create a temp file independent of Class A’s permissions? Use AccessController.doPrivileged!
B.doAction()
AccessController.doPrivileged( new PrivilegedAction() { public Object run() { File.createTempFile( “pre”, null); return null; } }); AccessControlContext context = AccessController.getContext(); context.checkPermission(perm); ProtectionDomain.implies(perm);
> The Authorization of JAAS is handled by Java 2 Security > Policy grant supports Principals to define Permissions for users grant Principal com.acme.MyPrincipal “jim” { permission java.io.FilePermission “/home/jim/-”, “read, write, delete, execute”; } > To include user Principals with Protection Domain use Subject.doAs Subject.doAs(subject, new PrivilegedAction() { public Object run() { File newFile = new File(“/home/jim/test.txt”); newFile.createNewFile(); return null; });
> What is missing from Java 2 Security for OSGi? – Define permissions based on bundles (location) – Allow management agent to lookup bundle permissions – Allow management agent to manage bundle permissions > Superseded by Conditional Permission Admin Service > Features – Permissions persisted – Support for default permissions – OSGi service management interface – Integration into Bundle Protection Domains
> Default permission of AllPermission > First bundle to assign permissions wins! – Management Agent must load first – Management Agent must give itself AllPermission > Example permAdmin.setPermissions( context.getBundle().getLocation(), new PermissionInfo[]{ new PermissionInfo( AllPermission.class.getName(),"”,"")});
PermissionInfo[] getDefaultPermissions(); String[] getLocations(); PermissionInfo[] getPermissions(java.lang.String location); void setDefaultPermissions(PermissionInfo[] permissions); void setPermissions(String location, PermissionInfo[] permissions);
Application Bundle Service Bundle Framework Application PD Service PD Application Service Framework PD Permission Admin Service Agent Permissions doService hasPermission hasPermission setPermissions Framework Service execute hasPermission
> What is missing from Permission Admin Service? – Permission Admin Service dependency on Bundle location as identifier – Not flexible for complex security models > Features – Introduction of ordered security conditions – Allow and deny policies – Support for local bundle permissions – Mutable and immutable conditions – Immediate and postponed conditions
> A Condition determines if a set of Permissions apply for a Bundle > A Condition is instantiated by the Bundle Protection Domain – Reference from Condition to Bundle > Features – Can be custom – Mutable – Postponed > Implying a Permission with Conditions – Is the Condition satisfied? – Are one of the permissions applied? – Policy access type (ALLOW or DENY) determines success or failure
> Allow Developer to specify what Permissions are needed by Bundle – Maximum Permissions for Bundle > Defined using Bundle Permission Resource in the Bundle – OSGI-INF/permissions.perm > Example # Require all FilePermissions (java.io.FilePermission "<<ALL FILES>>” "read, write, delete, execute”)
AccessControlContext getAccessControlContext( String[] signers); ConditionalPermissionUpdate newConditionalPermissionUpdate(); ConditionalPermissionInfo newConditionalPermissionInfo( String name, ConditionInfo conditions[], PermissionInfo permissions[], String access); ConditionalPermissionInfo newConditionalPermissionInfo( String encodedConditionalPermissionInfo);
Application Bundle Service Bundle Framework ApplicationPD Service PD Application Service Framework Service Framework PD Permission Admin Service Agent Permissions Conditional Permission Admin Service Conditional Permissions Security Manager doService execute hasPermission hasPermission hasPermission setPermissions commit hasPermission
> With Java 2 Security, Permission Admin Service, Conditional Permission Admin Server, and Local Permissions how is the effective permissions determined? – Java 2 Security always applies that can be extended with Implied Permissions – Local Permissions intersected with the Permission Services – Permission Admin Service takes precedence over Conditional Permission Admin Service
Local Permissions Java 2 Permissions & Implied Permissions
> What is missing from Permission Admin Services? – User level authentication and authorization! > Features – Contains Users, Roles, and Groups – Used to authenticate users – Used to create Authorization objects for authorizing user actions – Support for Basic (any) and Required (all) roles > Does not integrate with JAAS or Java 2 Security for user level security – Access to User Admin Service done via Java 2 Security
Role User Group 1..n roles Authorization user roles
Role createRole(String name, int type); boolean removeRole(String name); Role getRole(String name); Role[] getRoles(String filter) throws InvalidSyntaxException; Role[] getRoles(String filter) throws InvalidSyntaxException; User getUser(String key, String value); public Authorization getAuthorization(User user);
Application Bundle Service Bundle Framework Application Service User Admin Service Authenticate (“suzy”, “passwd”) authenticate
User user = userAdmin.getUser( “auth.userid”, “suzy”); If (user == null || !user.hasCredential( “auth.passwd”, hash(“passwd”))) throw SecurityException(“Invalid login”); Authorization auth = userAdmin.getAuthorization(user);
doService
Service.doService(auth);
authorize
Service.doService(Authorization auth) { if (!auth.hasRole(“ServiceRole”)) throw new SecurityException( “authorization error”); }
doAction
> Disable the command-line console – Containers support this – For instance, in Equinox use –noConsole > Disable any insecure access to remote command-line (e.g., telnet) – You wouldn’t allow telnet into a production box, would you? – Just in case, see whether your container starts this by default > Disable any insecure access to any remote management – Container may have web interface, or you may use Felix’s – Container may expose JMX commands
> Protect the command line – Custom authentication before granting access – Standard OS user security – LDAP, one-time password, custom challenge
public void acceptCommands () { BufferedReader consoleInput = new BufferedReader( new InputStreamReader( System.in ) ); while ( true ) { System.out.print( ">>> [install|start|stop]=[file|bundle]" ); String inputLine = null; try { inputLine = null; inputLine = consoleInput.readLine(); this.handle( inputLine ); } catch ( Exception e ) { e.printStackTrace(); } } }
private void handle ( String inputLine ) throws BundleException { String[] cmdAndArg = inputLine.split( "=" ); String cmd = cmdAndArg[ 0 ]; String arg = cmdAndArg[ 1 ]; if ( "install".equals( cmd ) ) { this.bundleContext.installBundle( arg ); } else if ( . . . ){ . . . } }
> Always use a secure network interface – Back-office communications should always be on secure interfaces – Accidental changes to ACLs can expose means of compromise > Apply additional security standards native to the means of access – For web access: https/certificates – JMX:
JAAS (w/LDAP or some other auth mechanism) User Admin Service
– Web services: https and/or standard WSS
> $JAVA_HOME/lib/management/jmxremote.password > $JAVA_HOME/lib/management/jmxremote.access
> Start Java with command-line arg – com.sun.management.jmxremote.authenticate=true
bob b@B bob readwrite
JMXServiceURL url = new JMXServiceURL(“service:jmx:rmi:///jndi/rmi://1.1.1.1:9379/<…>”); Map<String, Object> env = new HashMap<String, Object>(); String[] creds = {“bob”, “b@B”}; env.put(JMXConnector.CREDENTIALS, creds); JMXConnector conn = JMXConnectorFactory.newJMXConnector(url, env); conn.connect(); MBeanServerConnection mBeanServer = conn.getMBeanServerConnection();
> Authenticate with LDAP directory > Use Java 6 JAAS LDAP LoginModule MBeanServer mbs = ManagementFactory.getPlatformMBeanServer(); LocateRegistry.createRegistry(9379); JMXServiceURL jmxServiceURL = new JMXServiceURL(...); Map<String, Object> env = new HashMap<String, Object>(); env.put("jmx.remote.x.login.config", ”MyLdapConfig"); JMXConnectorServer cs = JMXConnectorServerFactory.newJMXConnectorServer (url, env, mbs); cs.start();
> jaas.config > Start with command-line arg – java.security.auth.login.config=jaas.config
MyLdapConfig {
com.sun.security.auth.module.LdapLoginModule REQUIRED userProvider= "ldap://sun-ds/ou=people,dc=sun,dc=com" userFilter="(&(uid={USERNAME}) (objectClass=inetOrgPerson))" authzIdentity=adminRole useSSL=false; };
> A Custom JMXAuthenticator can
– Authenticate to custom identity data store – Accept additional login credentials – Be an alternative to writing custom LoginModule
public class MyOsgiJmxAuthenticator implements JMXAuthenticator { public Subject authenticate(Object aCredentials) { final String[]credentials = (String[]) aCredentials; String username = (String) credentials[0]; String password = (String) credentials[1]; // Validate credentials... if ([ok]) { Set<JMXPrincipal> principals = new Set<JMXPrincipal>(); principals.add(new JMXPrincipal(username)); principals.add(new JMXPrincipal(“admin”)); return new Subject(true, principals, Collections.EMPTY_SET, Collections.EMPTY_SET); } else { throw new SecurityException(“Authentication failure”); } } }
JMXServiceURL url = new JMXServiceURL(. . .); Map<String, Object> env = new HashMap<String, Object>(); env.put(JMXConnectorServer.AUTHENTICATOR, new MyOsgiJmxAuthenticator()); JMXConnector conn = JMXConnectorFactory.newJMXConnector(url, env); conn.connect(); MBeanServerConnection mBeanServer = conn.getMBeanServerConnection();
I have a msg for you!
a window for you. Send it over here.
Cluster
> With clustering, remote distribution becomes a problem > Remote, secure distribution even more difficult Central JMX-Based Installer Instance
:JMX :1379
request install send jar
Instance Instance
:JMX :9731
request install
:JMX
> Deployment watchdog – Watches for deployments – Has criteria for allowed deployments – Alerts on unexpected deployments > Could ask bundle for shared secret/digital signature – bundle.getEntry( "/sharedSecret.txt" ); – bundle.findEntries(“secret", "*.txt", noRecurse);
public void bundleChanged ( BundleEvent aEvent ) { int type = aEvent.getType(); String symbolicName = bundle.getSymbolicName(); boolean bundleIsAllowed = allowedBundles.contains ( symbolicName ); BundleEventEnum eventType = BundleEventEnum.getByCode( type ); if ( !bundleIsAllowed && (eventType.isInProcessOfStarting()) ) { try { bundle.uninstall(); } catch ( Exception e ) { e.printStackTrace(); } } } Activator: context.addBundleListener( listener );
public enum BundleEventEnum { INSTALLED(BundleEvent.INSTALLED, "INSTALLED"), LAZY_ACTIVATION(BundleEvent.LAZY_ACTIVATION, "LAZY_ACTIVATION"), RESOLVED(BundleEvent.RESOLVED, "RESOLVED"), . . . ; private final String name; private final int code; BundleEventEnum ( final int aCode, final String aName ) { this.code = aCode; this.name = aName; } public boolean isInProcessOfStarting () { return (this == INSTALLED) || (this == RESOLVED) || (this == STARTED) || (this == STARTING) || (this == UPDATED); } }
> Not necessary to write your own listener > Works like ServiceTracker > Add BundleTrackerCustomizer
– addingBundle(Bundle bundle, BundleEvent event) – modifiedBundle(Bundle bundle, BundleEvent event, Object object) – removedBundle(Bundle bundle, BundleEvent event, Object object)
> We covered a lot of territory including – Java 2 Security – Permission Admin Service and Conditional Permission Admin Service – User Admin Service – Removing insecure admin access – Adding secure admin access > Let’s protect the OSGi Castle!
David Smith verisign.com VeriSign dsmith@verisign.com Jim Gould verisign.com VeriSign jgould@verisign.com