Skip to content

Commit 6ce7985

Browse files
Avoid checking RestrictedSecurity profile hash during jar verification
If the process of verifying a jar is started before the RestrictedSecurity profile is loaded, the hash calculation is triggered as part of it leading to a nested jar verification and a subsequent error. To avoid that, the hash calulation of a profile is skipped if triggered by a jar verification process and is performed later in the loading process. Signed-off-by: Kostas Tsiounis <[email protected]>
1 parent 659b5b5 commit 6ce7985

File tree

2 files changed

+47
-1
lines changed

2 files changed

+47
-1
lines changed

closed/src/java.base/share/classes/openj9/internal/security/RestrictedSecurity.java

+46
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,8 @@
4747
import java.util.stream.Collectors;
4848
import java.util.stream.Stream;
4949

50+
import sun.security.jca.ProviderList;
51+
import sun.security.jca.Providers;
5052
import sun.security.util.Debug;
5153

5254
/**
@@ -79,6 +81,8 @@ public final class RestrictedSecurity {
7981

8082
private static RestrictedSecurityProperties restricts;
8183

84+
private static boolean profileHashChecked = false;
85+
8286
private static final Set<String> unmodifiableProperties = new HashSet<>();
8387

8488
private static final Map<String, List<String>> supportedPlatformsNSS = new HashMap<>();
@@ -202,6 +206,11 @@ public static String getRandomProvider() {
202206
printStackTraceAndExit(
203207
"Restricted security mode secure random provider can only be used when restricted security mode is enabled.");
204208
}
209+
210+
if (!profileHashChecked) {
211+
profileHashChecked = true;
212+
checkHashValues();
213+
}
205214
return restricts.jdkSecureRandomProvider;
206215
}
207216

@@ -218,6 +227,10 @@ public static String getRandomAlgorithm() {
218227
printStackTraceAndExit(
219228
"Restricted security mode secure random algorithm can only be used when restricted security mode is enabled.");
220229
}
230+
if (!profileHashChecked) {
231+
profileHashChecked = true;
232+
checkHashValues();
233+
}
221234
return restricts.jdkSecureRandomAlgorithm;
222235
}
223236

@@ -231,6 +244,10 @@ public static String getRandomAlgorithm() {
231244
*/
232245
public static boolean isFIPSEnabled() {
233246
if (securityEnabled) {
247+
if (!profileHashChecked) {
248+
profileHashChecked = true;
249+
checkHashValues();
250+
}
234251
return isFIPSEnabled;
235252
}
236253
return false;
@@ -244,6 +261,10 @@ public static boolean isFIPSEnabled() {
244261
*/
245262
public static boolean isServiceAllowed(Service service) {
246263
if (securityEnabled) {
264+
if (!(profileHashChecked || isJarVerifierinStackTrace())) {
265+
profileHashChecked = true;
266+
checkHashValues();
267+
}
247268
return restricts.isRestrictedServiceAllowed(service, true);
248269
}
249270
return true;
@@ -257,6 +278,10 @@ public static boolean isServiceAllowed(Service service) {
257278
*/
258279
public static boolean canServiceBeRegistered(Service service) {
259280
if (securityEnabled) {
281+
if (!profileHashChecked) {
282+
checkHashValues();
283+
profileHashChecked = true;
284+
}
260285
return restricts.isRestrictedServiceAllowed(service, false);
261286
}
262287
return true;
@@ -270,6 +295,10 @@ public static boolean canServiceBeRegistered(Service service) {
270295
*/
271296
public static boolean isProviderAllowed(String providerName) {
272297
if (securityEnabled) {
298+
if (!(profileHashChecked || isJarVerifierinStackTrace())) {
299+
profileHashChecked = true;
300+
checkHashValues();
301+
}
273302
// Remove argument, e.g. -NSS-FIPS, if present.
274303
int pos = providerName.indexOf('-');
275304
if (pos >= 0) {
@@ -289,6 +318,10 @@ public static boolean isProviderAllowed(String providerName) {
289318
*/
290319
public static boolean isProviderAllowed(Class<?> providerClazz) {
291320
if (securityEnabled) {
321+
if (!(profileHashChecked || isJarVerifierinStackTrace())) {
322+
profileHashChecked = true;
323+
checkHashValues();
324+
}
292325
String providerClassName = providerClazz.getName();
293326

294327
// Check if the specified class extends java.security.Provider.
@@ -378,6 +411,18 @@ private static void getProfileID(Properties props) {
378411
}
379412
}
380413

414+
private static boolean isJarVerifierinStackTrace() {
415+
StackTraceElement[] elements = Thread.currentThread().getStackTrace();
416+
for (int i = 1; i < elements.length; i++) {
417+
StackTraceElement stackTraceElement = elements[i];
418+
if ("java.util.jar.JarVerifier".equals(stackTraceElement.getClassName())
419+
&& "java.base".equals(stackTraceElement.getModuleName())) {
420+
return true;
421+
}
422+
}
423+
return false;
424+
}
425+
381426
private static void checkIfKnownProfileSupported() {
382427
if (profileID.contains("NSS") && !isNSSSupported) {
383428
printStackTraceAndExit("NSS RestrictedSecurity profiles are not supported"
@@ -516,6 +561,7 @@ public static boolean configure(Properties props) {
516561
}
517562
printStackTraceAndExit(e);
518563
}
564+
519565
return securityEnabled;
520566
}
521567

src/java.base/share/classes/sun/security/jca/Providers.java

+1-1
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ private Providers() {
111111
// triggers a getInstance() call (although that should not happen)
112112
providerList = ProviderList.EMPTY;
113113
providerList = ProviderList.fromSecurityProperties();
114-
RestrictedSecurity.checkHashValues();
114+
//RestrictedSecurity.checkHashValues();
115115
}
116116

117117
// Return Sun provider.

0 commit comments

Comments
 (0)