/* * CDDL HEADER START * * The contents of this file are subject to the terms of the * Common Development and Distribution License, Version 1.0 only * (the "License"). You may not use this file except in compliance * with the License. * * You can obtain a copy of the license at * trunk/opends/resource/legal-notices/OpenDS.LICENSE * or https://OpenDS.dev.java.net/OpenDS.LICENSE. * See the License for the specific language governing permissions * and limitations under the License. * * When distributing Covered Code, include this CDDL HEADER in each * file and include the License file at * trunk/opends/resource/legal-notices/OpenDS.LICENSE. If applicable, * add the following below this CDDL HEADER, with the fields enclosed * by brackets "[]" replaced with your own identifying information: * Portions Copyright [yyyy] [name of copyright owner] * * CDDL HEADER END * * * Portions Copyright 2007 Sun Microsystems, Inc. */ package org.opends.server.authorization.dseecompat; import static org.opends.server.messages.AciMessages.*; import static org.opends.server.authorization.dseecompat.Aci.*; import static org.opends.server.loggers.Error.*; import static org.opends.server.loggers.debug.DebugLogger.*; import static org.opends.server.messages.MessageHandler.getMessage; import static org.opends.server.util.StaticUtils.*; import java.net.InetAddress; import java.util.LinkedList; import java.util.regex.Matcher; import java.util.regex.Pattern; import org.opends.server.types.DebugLogLevel; import org.opends.server.types.ErrorLogCategory; import org.opends.server.types.ErrorLogSeverity; /** * This class implements the dns bind rule keyword. */ public class DNS implements KeywordBindRule { /* * List of patterns to match against. */ LinkedList patterns=null; /* * The enumeration representing the bind rule type of the DNS rule. */ private EnumBindRuleType type=null; /* * Regular expression group used to match a dns rule. */ private static final String valueRegex = "([a-zA-Z0-9\\.\\-\\*]+)"; /* * Regular expression group used to match one or more DNS values. */ private static final String valuesRegExGroup = valueRegex + ZERO_OR_MORE_WHITESPACE + "(," + ZERO_OR_MORE_WHITESPACE + valueRegex + ")*"; /** * Create a class representing a dns bind rule keyword. * @param patterns List of dns patterns to match against. * @param type An enumeration representing the bind rule type. */ private DNS(LinkedList patterns, EnumBindRuleType type) { this.patterns=patterns; this.type=type; } /** * Decode an string representing a dns bind rule. * @param expr A string representation of the bind rule. * @param type An enumeration representing the bind rule type. * @return A keyword bind rule class that can be used to evaluate * this bind rule. * @throws AciException If the expression string is invalid. */ public static DNS decode(String expr, EnumBindRuleType type) throws AciException { if (!Pattern.matches(valuesRegExGroup, expr)) { int msgID = MSGID_ACI_SYNTAX_INVALID_DNS_EXPRESSION; String message = getMessage(msgID, expr); throw new AciException(msgID, message); } LinkedListdns=new LinkedList(); int valuePos = 1; Pattern valuePattern = Pattern.compile(valueRegex); Matcher valueMatcher = valuePattern.matcher(expr); while (valueMatcher.find()) { String hn=valueMatcher.group(valuePos); String[] hnArray=hn.split("\\.", -1); for(int i=1, n=hnArray.length; i < n; i++) { if(hnArray[i].equals("*")) { int msgID = MSGID_ACI_SYNTAX_INVALID_DNS_WILDCARD; String message = getMessage(msgID, expr); throw new AciException(msgID, message); } } // If the provided hostname does not contain any wildcard // characters, then it must be the canonical hostname for the // associated IP address. If it is not, then it will not match the // intended target, and we should generate a warning message to let // the administrator know about it. If the provided value does not // match the canonical name for the associated IP address, and the // given hostname is "localhost", then we should treat it specially // and also match the canonical hostname. This is necessary because // "localhost" is likely to be very commonly used in these kinds of // rules and on some systems the canonical representation is // configured to be "localhost.localdomain" which may not be known // to the administrator. if (hn.indexOf("*") < 0) { try { for (InetAddress addr : InetAddress.getAllByName(hn)) { String canonicalName = addr.getCanonicalHostName(); if (! hn.equalsIgnoreCase(canonicalName)) { if (hn.equalsIgnoreCase("localhost") && (! dns.contains(canonicalName))) { dns.add(canonicalName); int msgID = MSGID_ACI_LOCALHOST_DOESNT_MATCH_CANONICAL_VALUE; String message = getMessage(msgID, expr, hn, canonicalName); logError(ErrorLogCategory.ACCESS_CONTROL, ErrorLogSeverity.INFORMATIONAL, message, msgID); } else { int msgID = MSGID_ACI_HOSTNAME_DOESNT_MATCH_CANONICAL_VALUE; String message = getMessage(msgID, expr, hn, addr.getHostAddress(), addr.getCanonicalHostName()); logError(ErrorLogCategory.ACCESS_CONTROL, ErrorLogSeverity.INFORMATIONAL, message, msgID); } } } } catch (Exception e) { if (debugEnabled()) { debugCaught(DebugLogLevel.ERROR, e); } int msgID = MSGID_ACI_ERROR_CHECKING_CANONICAL_HOSTNAME; String message = getMessage(msgID, hn, expr, stackTraceToSingleLineString(e)); logError(ErrorLogCategory.ACCESS_CONTROL, ErrorLogSeverity.INFORMATIONAL, message, msgID); } } dns.add(hn); } return new DNS(dns, type); } /** * Performs evaluation of dns keyword bind rule using the provided * evaluation context. * @param evalCtx An evaluation context to use in the evaluation. * @return An enumeration evaluation result. */ public EnumEvalResult evaluate(AciEvalContext evalCtx) { EnumEvalResult matched=EnumEvalResult.FALSE; String[] remoteHost = evalCtx.getHostName().split("\\.", -1); for(String p : patterns) { String[] pat = p.split("\\.", -1); if(evalHostName(remoteHost, pat)) { matched=EnumEvalResult.TRUE; break; } } return matched.getRet(type, false); } /* * TODO Verify that a DNS pattern of "*" is valid by writing a unit * test. Probably isn't. * * TODO Evaluate if extending the wild-card matching to multiple name * components should be supported. Currently wild-cards are only permitted * in the leftmost field and the rest of the domain name components must * match. * * TODO Evaluate extending wild-card matching to non-complete name matching. * * Is it acceptable to have a DNS address of just "*" * (which presumably will match any system)? * * Is it acceptable for a wildcard to match multiple name components? For * example, is "*.example.com" supposed to be considered a match for * "host.east.example.com"? Similarly, would a pattern like * "www.*.example.com" match "www.newyork.east.example.com"? It doesn't * appear that the current implementation matches either of them. * * Is it acceptable for a wildcard to appear as anything other than a * complete name component? For example, if I have three web servers * "www1.example.com","www2.example.com", and "www3.example.com", then * can I use "www*.example.com"? It doesn't appear that the current * implementation allows that. Further, would "www*.example.com" match * cases like "www.example.com" or "www1.east.example.com"? */ /** * Checks an array containing the remote client's hostname against * patterns specified in the bind rule expression. Wild-cards are * only permitted in the leftmost field and the rest of the domain * name array components must match. * @param remoteHostName Array containing components of the remote clients * hostname (split on "."). * @param pat An array containing the pattern specified in * the bind rule expression. The first array slot may be a wild-card "*". * @return True if the remote hostname matches the pattern. */ private boolean evalHostName(String[] remoteHostName, String[] pat) { if(remoteHostName.length != pat.length) return false; for(int i=0;i