/* Copyright (C) 2013 Red Hat, Inc. This file is part of IcedTea. IcedTea is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, version 2. IcedTea is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with IcedTea; see the file COPYING. If not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. Linking this library statically or dynamically with other modules is making a combined work based on this library. Thus, the terms and conditions of the GNU General Public License cover the whole combination. As a special exception, the copyright holders of this library give you permission to link this library with independent modules to produce an executable, regardless of the license terms of these independent modules, and to copy and distribute the resulting executable under terms of your choice, provided that you also meet, for each linked independent module, the terms and conditions of the license of that module. An independent module is a module which is not derived from or based on this library. If you modify this library, you may extend this exception to your version of the library, but you are not obligated to do so. If you do not wish to do so, delete this exception statement from your version. */ package net.sourceforge.jnlp.security.appletextendedsecurity; import static net.sourceforge.jnlp.runtime.Translator.R; import java.io.IOException; import java.net.URISyntaxException; import java.net.URL; import java.util.ArrayList; import java.util.Date; import java.util.List; import net.sourceforge.jnlp.util.UrlUtils; import net.sourceforge.jnlp.LaunchException; import net.sourceforge.jnlp.PluginBridge; import net.sourceforge.jnlp.cache.ResourceTracker; import net.sourceforge.jnlp.security.SecurityDialogs; import net.sourceforge.jnlp.security.UnsignedAppletTrustWarningPanel.UnsignedWarningAction; import net.sourceforge.jnlp.util.logging.OutputController; public class UnsignedAppletTrustConfirmation { private static final AppletStartupSecuritySettings securitySettings = AppletStartupSecuritySettings.getInstance(); private static boolean unsignedConfirmationIsRequired() { // If we are using the 'high' security setting or higher, we must confirm // if the user wishes to run unsigned applets (not applicable to JNLP-launched apps) return !(AppletSecurityLevel.ALLOW_UNSIGNED == securitySettings.getSecurityLevel()); } private static boolean unsignedAppletsAreForbidden() { // If we are using the 'very high' security setting or higher, we do not // run unsigned applets return AppletSecurityLevel.DENY_UNSIGNED == securitySettings.getSecurityLevel() || AppletSecurityLevel.DENY_ALL == securitySettings.getSecurityLevel(); } /** * Gets the remembered decision, first checking the user policy for an ALWAYS/NEVER, * and then the global policy. * * @param file the plugin file * @return the remembered decision */ public static ExecuteUnsignedApplet getStoredAction(PluginBridge file) { UnsignedAppletActionStorage userActionStorage = securitySettings.getUnsignedAppletActionCustomStorage(); UnsignedAppletActionStorage globalActionStorage = securitySettings.getUnsignedAppletActionGlobalStorage(); UnsignedAppletActionEntry globalEntry = getMatchingItem(globalActionStorage, file); UnsignedAppletActionEntry userEntry = getMatchingItem(userActionStorage, file); ExecuteUnsignedApplet globalAction = globalEntry == null ? null : globalEntry.getUnsignedAppletAction(); ExecuteUnsignedApplet userAction = userEntry == null ? null : userEntry.getUnsignedAppletAction(); if (userAction == ExecuteUnsignedApplet.ALWAYS || userAction == ExecuteUnsignedApplet.NEVER) { return userAction; } else if (globalAction == ExecuteUnsignedApplet.ALWAYS || globalAction == ExecuteUnsignedApplet.NEVER) { return globalAction; } else { return userAction; } } private static UnsignedAppletActionEntry getMatchingItem(UnsignedAppletActionStorage actionStorage, PluginBridge file) { return actionStorage.getMatchingItem( UrlUtils.normalizeUrlAndStripParams(file.getSourceLocation(), true /* encode local files */).toString(), UrlUtils.normalizeUrlAndStripParams(file.getCodeBase(), true /* encode local files */).toString(), toRelativePaths(file.getArchiveJars(), file.getCodeBase().toString())); } /* Extract the archives as relative paths */ static List toRelativePaths(List paths, String rootPath) { List fileNames = new ArrayList(); for (String path : paths) { if (path.startsWith(rootPath)) { fileNames.add(path.substring(rootPath.length())); } else { fileNames.add(path); } } return fileNames; } private static void updateAppletAction(PluginBridge file, ExecuteUnsignedApplet behaviour, boolean rememberForCodeBase) { UnsignedAppletActionStorage userActionStorage = securitySettings.getUnsignedAppletActionCustomStorage(); userActionStorage.lock(); // We should ensure this operation is atomic try { UnsignedAppletActionEntry oldEntry = getMatchingItem(userActionStorage, file); /* Update, if entry exists */ if (oldEntry != null) { oldEntry.setUnsignedAppletAction(behaviour); oldEntry.setTimeStamp(new Date()); userActionStorage.update(oldEntry); return; } URL codebase = UrlUtils.normalizeUrlAndStripParams(file.getCodeBase(), true /* encode local files */); URL documentbase = UrlUtils.normalizeUrlAndStripParams(file.getSourceLocation(), true /* encode local files */); /* Else, create a new entry */ UrlRegEx codebaseRegex = new UrlRegEx("\\Q" + codebase + "\\E"); UrlRegEx documentbaseRegex = new UrlRegEx(".*"); // Match any from codebase List archiveMatches = null; // Match any from codebase if (!rememberForCodeBase) { documentbaseRegex = new UrlRegEx("\\Q" + documentbase + "\\E"); // Match only this applet archiveMatches = toRelativePaths(file.getArchiveJars(), file.getCodeBase().toString()); // Match only this applet } UnsignedAppletActionEntry entry = new UnsignedAppletActionEntry( behaviour, new Date(), documentbaseRegex, codebaseRegex, archiveMatches ); userActionStorage.add(entry); } finally { userActionStorage.unlock(); } } public static void checkUnsignedWithUserIfRequired(PluginBridge file) throws LaunchException { if (unsignedAppletsAreForbidden()) { OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "Not running unsigned applet at " + file.getCodeBase() +" because unsigned applets are disallowed by security policy."); throw new LaunchException(file, null, R("LSFatal"), R("LCClient"), R("LUnsignedApplet"), R("LUnsignedAppletPolicyDenied")); } if (!unsignedConfirmationIsRequired()) { OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "Running unsigned applet at " + file.getCodeBase() +" does not require confirmation according to security policy."); return; } ExecuteUnsignedApplet storedAction = getStoredAction(file); OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "Stored action for unsigned applet at " + file.getCodeBase() +" was " + storedAction); boolean appletOK; if (storedAction == ExecuteUnsignedApplet.ALWAYS) { appletOK = true; } else if (storedAction == ExecuteUnsignedApplet.NEVER) { appletOK = false; } else { // No remembered decision, prompt the user UnsignedWarningAction warningResponse = SecurityDialogs.showUnsignedWarningDialog(file); ExecuteUnsignedApplet executeAction = warningResponse.getAction(); appletOK = (executeAction == ExecuteUnsignedApplet.YES || executeAction == ExecuteUnsignedApplet.ALWAYS); if (executeAction != null) { updateAppletAction(file, executeAction, warningResponse.rememberForCodeBase()); } OutputController.getLogger().log(OutputController.Level.ERROR_DEBUG, "Decided action for unsigned applet at " + file.getCodeBase() +" was " + executeAction); } if (!appletOK) { throw new LaunchException(file, null, R("LSFatal"), R("LCClient"), R("LUnsignedApplet"), R("LUnsignedAppletUserDenied")); } } }