001/* 002 * Licensed to the Apache Software Foundation (ASF) under one or more 003 * contributor license agreements. See the NOTICE file distributed with 004 * this work for additional information regarding copyright ownership. 005 * The ASF licenses this file to You under the Apache License, Version 2.0 006 * (the "License"); you may not use this file except in compliance with 007 * the License. You may obtain a copy of the License at 008 * 009 * http://www.apache.org/licenses/LICENSE-2.0 010 * 011 * Unless required by applicable law or agreed to in writing, software 012 * distributed under the License is distributed on an "AS IS" BASIS, 013 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 014 * See the License for the specific language governing permissions and 015 * limitations under the License. 016 */ 017 018package org.apache.commons.net.pop3; 019 020import java.io.BufferedWriter; 021import java.io.IOException; 022import java.io.InputStreamReader; 023import java.io.OutputStreamWriter; 024 025import javax.net.ssl.HostnameVerifier; 026import javax.net.ssl.KeyManager; 027import javax.net.ssl.SSLContext; 028import javax.net.ssl.SSLException; 029import javax.net.ssl.SSLHandshakeException; 030import javax.net.ssl.SSLSocket; 031import javax.net.ssl.SSLSocketFactory; 032import javax.net.ssl.TrustManager; 033 034import org.apache.commons.net.io.CRLFLineReader; 035import org.apache.commons.net.util.SSLContextUtils; 036import org.apache.commons.net.util.SSLSocketUtils; 037 038/** 039 * POP3 over SSL processing. Copied from FTPSClient.java and modified to suit POP3. 040 * If implicit mode is selected (NOT the default), SSL/TLS negotiation starts right 041 * after the connection has been established. In explicit mode (the default), SSL/TLS 042 * negotiation starts when the user calls execTLS() and the server accepts the command. 043 * Implicit usage: 044 * POP3SClient c = new POP3SClient(true); 045 * c.connect("127.0.0.1", 995); 046 * Explicit usage: 047 * POP3SClient c = new POP3SClient(); 048 * c.connect("127.0.0.1", 110); 049 * if (c.execTLS()) { /rest of the commands here/ } 050 * 051 * Warning: the hostname is not verified against the certificate by default, use 052 * {@link #setHostnameVerifier(HostnameVerifier)} or {@link #setEndpointCheckingEnabled(boolean)} 053 * (on Java 1.7+) to enable verification. 054 * @since 3.0 055 */ 056public class POP3SClient extends POP3Client 057{ 058 // from http://www.iana.org/assignments/port-numbers 059 060 // pop3s 995/tcp pop3 protocol over TLS/SSL (was spop3) 061 // pop3s 995/udp pop3 protocol over TLS/SSL (was spop3) 062 063 private static final int DEFAULT_POP3S_PORT = 995; 064 065 /** Default secure socket protocol name, like TLS */ 066 private static final String DEFAULT_PROTOCOL = "TLS"; 067 068 /** The security mode. True - Implicit Mode / False - Explicit Mode. */ 069 private final boolean isImplicit; 070 /** The secure socket protocol to be used, like SSL/TLS. */ 071 private final String protocol; 072 /** The context object. */ 073 private SSLContext context = null; 074 /** The cipher suites. SSLSockets have a default set of these anyway, 075 so no initialization required. */ 076 private String[] suites = null; 077 /** The protocol versions. */ 078 private String[] protocols = //null; 079 null;//{"SSLv2", "SSLv3", "TLSv1", "TLSv1.1", "SSLv2Hello"}; 080 081 /** The FTPS {@link TrustManager} implementation, default null. */ 082 private TrustManager trustManager = null; 083 084 /** The {@link KeyManager}, default null. */ 085 private KeyManager keyManager = null; 086 087 /** The {@link HostnameVerifier} to use post-TLS, default null (i.e. no verification). */ 088 private HostnameVerifier hostnameVerifier = null; 089 090 /** Use Java 1.7+ HTTPS Endpoint Identification Algorithim. */ 091 private boolean tlsEndpointChecking; 092 093 /** 094 * Constructor for POP3SClient, using {@link #DEFAULT_PROTOCOL} i.e. TLS 095 * Sets security mode to explicit. 096 */ 097 public POP3SClient() 098 { 099 this(DEFAULT_PROTOCOL, false); 100 } 101 102 /** 103 * Constructor for POP3SClient, using {@link #DEFAULT_PROTOCOL} i.e. TLS 104 * @param implicit The security mode, {@code true} for implicit, {@code false} for explicit 105 */ 106 public POP3SClient(boolean implicit) 107 { 108 this(DEFAULT_PROTOCOL, implicit); 109 } 110 111 /** 112 * Constructor for POP3SClient. 113 * Sets security mode to explicit. 114 * @param proto the protocol. 115 */ 116 public POP3SClient(String proto) 117 { 118 this(proto, false); 119 } 120 121 /** 122 * Constructor for POP3SClient. 123 * @param proto the protocol. 124 * @param implicit The security mode, {@code true} for implicit, {@code false} for explicit 125 */ 126 public POP3SClient(String proto, boolean implicit) 127 { 128 this(proto, implicit, null); 129 } 130 131 /** 132 * Constructor for POP3SClient. 133 * Sets the default port to {@link #DEFAULT_POP3S_PORT} - 995 - if using implicit mode 134 * @param proto the protocol. 135 * @param implicit The security mode, {@code true} for implicit, {@code false} for explicit 136 * @param ctx the context to be used 137 */ 138 public POP3SClient(String proto, boolean implicit, SSLContext ctx) 139 { 140 super(); 141 protocol = proto; 142 isImplicit = implicit; 143 context = ctx; 144 if (isImplicit) { 145 setDefaultPort(DEFAULT_POP3S_PORT); 146 } 147 } 148 149 /** 150 * Constructor for POP3SClient, using {@link #DEFAULT_PROTOCOL} i.e. TLS 151 * @param implicit The security mode, {@code true} for implicit, {@code false} for explicit 152 * @param ctx A pre-configured SSL Context. 153 */ 154 public POP3SClient(boolean implicit, SSLContext ctx) 155 { 156 this(DEFAULT_PROTOCOL, implicit, ctx); 157 } 158 159 /** 160 * Constructor for POP3SClient, using {@link #DEFAULT_PROTOCOL} - TLS - and isImplicit = false 161 * @param context A pre-configured SSL Context. 162 * @see #POP3SClient(boolean, SSLContext) 163 */ 164 public POP3SClient(SSLContext context) 165 { 166 this(false, context); 167 } 168 169 /** 170 * Because there are so many connect() methods, 171 * the _connectAction_() method is provided as a means of performing 172 * some action immediately after establishing a connection, 173 * rather than reimplementing all of the connect() methods. 174 * @throws IOException If it is thrown by _connectAction_(). 175 * @see org.apache.commons.net.SocketClient#_connectAction_() 176 */ 177 @Override 178 protected void _connectAction_() throws IOException 179 { 180 // Implicit mode. 181 if (isImplicit) { 182 performSSLNegotiation(); 183 } 184 super._connectAction_(); 185 // Explicit mode - don't do anything. The user calls execTLS() 186 } 187 188 /** 189 * Performs a lazy init of the SSL context. 190 * @throws IOException When could not initialize the SSL context. 191 */ 192 private void initSSLContext() throws IOException 193 { 194 if (context == null) 195 { 196 context = SSLContextUtils.createSSLContext(protocol, getKeyManager(), getTrustManager()); 197 } 198 } 199 200 /** 201 * SSL/TLS negotiation. Acquires an SSL socket of a 202 * connection and carries out handshake processing. 203 * @throws IOException If server negotiation fails. 204 */ 205 private void performSSLNegotiation() throws IOException 206 { 207 initSSLContext(); 208 209 SSLSocketFactory ssf = context.getSocketFactory(); 210 String host = (_hostname_ != null) ? _hostname_ : getRemoteAddress().getHostAddress(); 211 int port = getRemotePort(); 212 SSLSocket socket = 213 (SSLSocket) ssf.createSocket(_socket_, host, port, true); 214 socket.setEnableSessionCreation(true); 215 socket.setUseClientMode(true); 216 217 if (tlsEndpointChecking) { 218 SSLSocketUtils.enableEndpointNameVerification(socket); 219 } 220 221 if (protocols != null) { 222 socket.setEnabledProtocols(protocols); 223 } 224 if (suites != null) { 225 socket.setEnabledCipherSuites(suites); 226 } 227 socket.startHandshake(); 228 229 // TODO the following setup appears to duplicate that in the super class methods 230 _socket_ = socket; 231 _input_ = socket.getInputStream(); 232 _output_ = socket.getOutputStream(); 233 _reader = new CRLFLineReader(new InputStreamReader(_input_, _DEFAULT_ENCODING)); 234 _writer = new BufferedWriter(new OutputStreamWriter(_output_, _DEFAULT_ENCODING)); 235 236 if (hostnameVerifier != null && !hostnameVerifier.verify(host, socket.getSession())) { 237 throw new SSLHandshakeException("Hostname doesn't match certificate"); 238 } 239 } 240 241 /** 242 * Get the {@link KeyManager} instance. 243 * @return The current {@link KeyManager} instance. 244 */ 245 private KeyManager getKeyManager() 246 { 247 return keyManager; 248 } 249 250 /** 251 * Set a {@link KeyManager} to use. 252 * @param newKeyManager The KeyManager implementation to set. 253 * @see org.apache.commons.net.util.KeyManagerUtils 254 */ 255 public void setKeyManager(KeyManager newKeyManager) 256 { 257 keyManager = newKeyManager; 258 } 259 260 /** 261 * Controls which particular cipher suites are enabled for use on this 262 * connection. Called before server negotiation. 263 * @param cipherSuites The cipher suites. 264 */ 265 public void setEnabledCipherSuites(String[] cipherSuites) 266 { 267 suites = new String[cipherSuites.length]; 268 System.arraycopy(cipherSuites, 0, suites, 0, cipherSuites.length); 269 } 270 271 /** 272 * Returns the names of the cipher suites which could be enabled 273 * for use on this connection. 274 * When the underlying {@link java.net.Socket Socket} is not an {@link SSLSocket} instance, returns null. 275 * @return An array of cipher suite names, or <code>null</code>. 276 */ 277 public String[] getEnabledCipherSuites() 278 { 279 if (_socket_ instanceof SSLSocket) 280 { 281 return ((SSLSocket)_socket_).getEnabledCipherSuites(); 282 } 283 return null; 284 } 285 286 /** 287 * Controls which particular protocol versions are enabled for use on this 288 * connection. I perform setting before a server negotiation. 289 * @param protocolVersions The protocol versions. 290 */ 291 public void setEnabledProtocols(String[] protocolVersions) 292 { 293 protocols = new String[protocolVersions.length]; 294 System.arraycopy(protocolVersions, 0, protocols, 0, protocolVersions.length); 295 } 296 297 /** 298 * Returns the names of the protocol versions which are currently 299 * enabled for use on this connection. 300 * When the underlying {@link java.net.Socket Socket} is not an {@link SSLSocket} instance, returns null. 301 * @return An array of protocols, or <code>null</code>. 302 */ 303 public String[] getEnabledProtocols() 304 { 305 if (_socket_ instanceof SSLSocket) 306 { 307 return ((SSLSocket)_socket_).getEnabledProtocols(); 308 } 309 return null; 310 } 311 312 /** 313 * The TLS command execution. 314 * @throws SSLException If the server reply code is not positive. 315 * @throws IOException If an I/O error occurs while sending 316 * the command or performing the negotiation. 317 * @return TRUE if the command and negotiation succeeded. 318 */ 319 public boolean execTLS() throws SSLException, IOException 320 { 321 if (sendCommand("STLS") != POP3Reply.OK) 322 { 323 return false; 324 //throw new SSLException(getReplyString()); 325 } 326 performSSLNegotiation(); 327 return true; 328 } 329 330 /** 331 * Get the currently configured {@link TrustManager}. 332 * @return A TrustManager instance. 333 */ 334 public TrustManager getTrustManager() 335 { 336 return trustManager; 337 } 338 339 /** 340 * Override the default {@link TrustManager} to use. 341 * @param newTrustManager The TrustManager implementation to set. 342 * @see org.apache.commons.net.util.TrustManagerUtils 343 */ 344 public void setTrustManager(TrustManager newTrustManager) 345 { 346 trustManager = newTrustManager; 347 } 348 349 /** 350 * Get the currently configured {@link HostnameVerifier}. 351 * @return A HostnameVerifier instance. 352 * @since 3.4 353 */ 354 public HostnameVerifier getHostnameVerifier() 355 { 356 return hostnameVerifier; 357 } 358 359 /** 360 * Override the default {@link HostnameVerifier} to use. 361 * @param newHostnameVerifier The HostnameVerifier implementation to set or <code>null</code> to disable. 362 * @since 3.4 363 */ 364 public void setHostnameVerifier(HostnameVerifier newHostnameVerifier) 365 { 366 hostnameVerifier = newHostnameVerifier; 367 } 368 369 /** 370 * Return whether or not endpoint identification using the HTTPS algorithm 371 * on Java 1.7+ is enabled. The default behaviour is for this to be disabled. 372 * 373 * @return True if enabled, false if not. 374 * @since 3.4 375 */ 376 public boolean isEndpointCheckingEnabled() 377 { 378 return tlsEndpointChecking; 379 } 380 381 /** 382 * Automatic endpoint identification checking using the HTTPS algorithm 383 * is supported on Java 1.7+. The default behaviour is for this to be disabled. 384 * 385 * @param enable Enable automatic endpoint identification checking using the HTTPS algorithm on Java 1.7+. 386 * @since 3.4 387 */ 388 public void setEndpointCheckingEnabled(boolean enable) 389 { 390 tlsEndpointChecking = enable; 391 } 392} 393 394/* kate: indent-width 4; replace-tabs on; */