在Java加密技術(八)中,咱們模擬了一個基於RSA非對稱加密網絡的安全通訊。如今咱們深度瞭解一下現有的安全網絡通訊——SSL。
咱們須要構建一個由CA機構簽發的有效證書,這裏咱們使用上文中生成的自簽名證書zlex.cer
這裏,咱們將證書導入到咱們的密鑰庫。
html
- keytool -import -alias www.zlex.org -file d:/zlex.cer -keystore d:/zlex.keystore
其中
-import表示導入
-alias指定別名,這裏是www.zlex.org
-file指定算法,這裏是d:/zlex.cer
-keystore指定存儲位置,這裏是d:/zlex.keystore
在這裏我使用的密碼爲654321
控制檯輸出: java
- 輸入keystore密碼:
- 再次輸入新密碼:
- 全部者:CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
- 簽發人:CN=www.zlex.org, OU=zlex, O=zlex, L=BJ, ST=BJ, C=CN
- 序列號:4a1e48df
- 有效期: Thu May 28 16:18:39 CST 2009 至Wed Aug 26 16:18:39 CST 2009
- 證書指紋:
- MD5:19:CA:E6:36:E2:DF:AD:96:31:97:2F:A9:AD:FC:37:6A
- SHA1:49:88:30:59:29:45:F1:69:CA:97:A9:6D:8A:CF:08:D2:C3:D5:C0:C4
- 簽名算法名稱:SHA1withRSA
- 版本: 3
- 信任這個認證? [否]: y
- 認證已添加至keystore中
OK,最複雜的準備工做已經完成。
接下來咱們將域名www.zlex.org定位到本機上。打開C:\Windows\System32\drivers\etc\hosts文件,將www.zlex.org綁定在本機上。在文件末尾追加127.0.0.1 www.zlex.org。如今經過地址欄訪問http://www.zlex.org,或者經過ping命令,若是可以定位到本機,域名映射就搞定了。
如今,配置tomcat。先將zlex.keystore拷貝到tomcat的conf目錄下,而後配置server.xml。將以下內容加入配置文件算法
- <Connector
- SSLEnabled="true"
- URIEncoding="UTF-8"
- clientAuth="false"
- keystoreFile="conf/zlex.keystore"
- keystorePass="123456"
- maxThreads="150"
- port="443"
- protocol="HTTP/1.1"
- scheme="https"
- secure="true"
- sslProtocol="TLS" />
注意clientAuth="false"測試階段,置爲false,正式使用時建議使用true。如今啓動tomcat,訪問https://www.zlex.org/。
顯然,證書未能經過認證,這個時候你能夠選擇安裝證書(上文中的zlex.cer文件就是證書),做爲受信任的根證書頒發機構導入,再次重啓瀏覽器(IE,其餘瀏覽器對於域名www.zlex.org不支持本地方式訪問),訪問https://www.zlex.org/,你會看到地址欄中會有個小鎖
,就說明安裝成功。全部的瀏覽器聯網操做已經在RSA加密解密系統的保護之下了。但彷佛咱們感覺不到。
這個時候不少人開始懷疑,若是咱們要手工作一個這樣的https的訪問是否是須要把瀏覽器的這些個功能都實現呢?不須要!
接着上篇內容,給出以下代碼實現:
express
- import java.io.FileInputStream;
- import java.security.KeyStore;
- import java.security.PrivateKey;
- import java.security.PublicKey;
- import java.security.Signature;
- import java.security.cert.Certificate;
- import java.security.cert.CertificateFactory;
- import java.security.cert.X509Certificate;
- import java.util.Date;
-
- import javax.crypto.Cipher;
- import javax.net.ssl.HttpsURLConnection;
- import javax.net.ssl.KeyManagerFactory;
- import javax.net.ssl.SSLContext;
- import javax.net.ssl.SSLSocketFactory;
- import javax.net.ssl.TrustManagerFactory;
-
- public abstract class CertificateCoder extends Coder {
-
-
- public static final String KEY_STORE = "JKS";
-
- public static final String X509 = "X.509";
- public static final String SunX509 = "SunX509";
- public static final String SSL = "SSL";
-
-
- private static PrivateKey getPrivateKey(String keyStorePath, String alias,
- String password) throws Exception {
- KeyStore ks = getKeyStore(keyStorePath, password);
- PrivateKey key = (PrivateKey) ks.getKey(alias, password.toCharArray());
- return key;
- }
-
-
- private static PublicKey getPublicKey(String certificatePath)
- throws Exception {
- Certificate certificate = getCertificate(certificatePath);
- PublicKey key = certificate.getPublicKey();
- return key;
- }
-
-
- private static Certificate getCertificate(String certificatePath)
- throws Exception {
- CertificateFactory certificateFactory = CertificateFactory
- .getInstance(X509);
- FileInputStream in = new FileInputStream(certificatePath);
-
- Certificate certificate = certificateFactory.generateCertificate(in);
- in.close();
-
- return certificate;
- }
-
-
- private static Certificate getCertificate(String keyStorePath,
- String alias, String password) throws Exception {
- KeyStore ks = getKeyStore(keyStorePath, password);
- Certificate certificate = ks.getCertificate(alias);
-
- return certificate;
- }
-
-
- private static KeyStore getKeyStore(String keyStorePath, String password)
- throws Exception {
- FileInputStream is = new FileInputStream(keyStorePath);
- KeyStore ks = KeyStore.getInstance(KEY_STORE);
- ks.load(is, password.toCharArray());
- is.close();
- return ks;
- }
-
-
- public static byte[] encryptByPrivateKey(byte[] data, String keyStorePath,
- String alias, String password) throws Exception {
-
- PrivateKey privateKey = getPrivateKey(keyStorePath, alias, password);
-
-
- Cipher cipher = Cipher.getInstance(privateKey.getAlgorithm());
- cipher.init(Cipher.ENCRYPT_MODE, privateKey);
-
- return cipher.doFinal(data);
-
- }
-
-
- public static byte[] decryptByPrivateKey(byte[] data, String keyStorePath,
- String alias, String password) throws Exception {
-
- PrivateKey privateKey = getPrivateKey(keyStorePath, alias, password);
-
-
- Cipher cipher = Cipher.getInstance(privateKey.getAlgorithm());
- cipher.init(Cipher.DECRYPT_MODE, privateKey);
-
- return cipher.doFinal(data);
-
- }
-
-
- public static byte[] encryptByPublicKey(byte[] data, String certificatePath)
- throws Exception {
-
-
- PublicKey publicKey = getPublicKey(certificatePath);
-
- Cipher cipher = Cipher.getInstance(publicKey.getAlgorithm());
- cipher.init(Cipher.ENCRYPT_MODE, publicKey);
-
- return cipher.doFinal(data);
-
- }
-
-
- public static byte[] decryptByPublicKey(byte[] data, String certificatePath)
- throws Exception {
-
- PublicKey publicKey = getPublicKey(certificatePath);
-
-
- Cipher cipher = Cipher.getInstance(publicKey.getAlgorithm());
- cipher.init(Cipher.DECRYPT_MODE, publicKey);
-
- return cipher.doFinal(data);
-
- }
-
-
- public static boolean verifyCertificate(String certificatePath) {
- return verifyCertificate(new Date(), certificatePath);
- }
-
-
- public static boolean verifyCertificate(Date date, String certificatePath) {
- boolean status = true;
- try {
-
- Certificate certificate = getCertificate(certificatePath);
-
- status = verifyCertificate(date, certificate);
- } catch (Exception e) {
- status = false;
- }
- return status;
- }
-
-
- private static boolean verifyCertificate(Date date, Certificate certificate) {
- boolean status = true;
- try {
- X509Certificate x509Certificate = (X509Certificate) certificate;
- x509Certificate.checkValidity(date);
- } catch (Exception e) {
- status = false;
- }
- return status;
- }
-
-
- public static String sign(byte[] sign, String keyStorePath, String alias,
- String password) throws Exception {
-
- X509Certificate x509Certificate = (X509Certificate) getCertificate(
- keyStorePath, alias, password);
-
- KeyStore ks = getKeyStore(keyStorePath, password);
-
- PrivateKey privateKey = (PrivateKey) ks.getKey(alias, password
- .toCharArray());
-
-
- Signature signature = Signature.getInstance(x509Certificate
- .getSigAlgName());
- signature.initSign(privateKey);
- signature.update(sign);
- return encryptBASE64(signature.sign());
- }
-
-
- public static boolean verify(byte[] data, String sign,
- String certificatePath) throws Exception {
-
- X509Certificate x509Certificate = (X509Certificate) getCertificate(certificatePath);
-
- PublicKey publicKey = x509Certificate.getPublicKey();
-
- Signature signature = Signature.getInstance(x509Certificate
- .getSigAlgName());
- signature.initVerify(publicKey);
- signature.update(data);
-
- return signature.verify(decryptBASE64(sign));
-
- }
-
-
- public static boolean verifyCertificate(Date date, String keyStorePath,
- String alias, String password) {
- boolean status = true;
- try {
- Certificate certificate = getCertificate(keyStorePath, alias,
- password);
- status = verifyCertificate(date, certificate);
- } catch (Exception e) {
- status = false;
- }
- return status;
- }
-
-
- public static boolean verifyCertificate(String keyStorePath, String alias,
- String password) {
- return verifyCertificate(new Date(), keyStorePath, alias, password);
- }
-
-
- private static SSLSocketFactory getSSLSocketFactory(String password,
- String keyStorePath, String trustKeyStorePath) throws Exception {
-
- KeyManagerFactory keyManagerFactory = KeyManagerFactory
- .getInstance(SunX509);
- KeyStore keyStore = getKeyStore(keyStorePath, password);
- keyManagerFactory.init(keyStore, password.toCharArray());
-
-
- TrustManagerFactory trustManagerFactory = TrustManagerFactory
- .getInstance(SunX509);
- KeyStore trustkeyStore = getKeyStore(trustKeyStorePath, password);
- trustManagerFactory.init(trustkeyStore);
-
-
- SSLContext ctx = SSLContext.getInstance(SSL);
- ctx.init(keyManagerFactory.getKeyManagers(), trustManagerFactory
- .getTrustManagers(), null);
- SSLSocketFactory sf = ctx.getSocketFactory();
-
- return sf;
- }
-
-
- public static void configSSLSocketFactory(HttpsURLConnection conn,
- String password, String keyStorePath, String trustKeyStorePath)
- throws Exception {
- conn.setSSLSocketFactory(getSSLSocketFactory(password, keyStorePath,
- trustKeyStorePath));
- }
- }
增長了configSSLSocketFactory方法供外界調用,該方法爲HttpsURLConnection配置了SSLSocketFactory。當HttpsURLConnection配置了SSLSocketFactory後,咱們就能夠經過HttpsURLConnection的getInputStream、getOutputStream,像往常使用HttpURLConnection作操做了。尤爲要說明一點,未配置SSLSocketFactory前,HttpsURLConnection的getContentLength()得到值永遠都是-1。
給出相應測試類:
apache
- import static org.junit.Assert.*;
-
- import java.io.DataInputStream;
- import java.io.InputStream;
- import java.net.URL;
-
- import javax.net.ssl.HttpsURLConnection;
-
- import org.junit.Test;
-
- public class CertificateCoderTest {
- private String password = "123456";
- private String alias = "www.zlex.org";
- private String certificatePath = "d:/zlex.cer";
- private String keyStorePath = "d:/zlex.keystore";
- private String clientKeyStorePath = "d:/zlex-client.keystore";
- private String clientPassword = "654321";
-
- @Test
- public void test() throws Exception {
- System.err.println("公鑰加密——私鑰解密");
- String inputStr = "Ceritifcate";
- byte[] data = inputStr.getBytes();
-
- byte[] encrypt = CertificateCoder.encryptByPublicKey(data,
- certificatePath);
-
- byte[] decrypt = CertificateCoder.decryptByPrivateKey(encrypt,
- keyStorePath, alias, password);
- String outputStr = new String(decrypt);
-
- System.err.println("加密前: " + inputStr + "\n\r" + "解密後: " + outputStr);
-
-
- assertArrayEquals(data, decrypt);
-
-
- assertTrue(CertificateCoder.verifyCertificate(certificatePath));
-
- }
-
- @Test
- public void testSign() throws Exception {
- System.err.println("私鑰加密——公鑰解密");
-
- String inputStr = "sign";
- byte[] data = inputStr.getBytes();
-
- byte[] encodedData = CertificateCoder.encryptByPrivateKey(data,
- keyStorePath, alias, password);
-
- byte[] decodedData = CertificateCoder.decryptByPublicKey(encodedData,
- certificatePath);
-
- String outputStr = new String(decodedData);
- System.err.println("加密前: " + inputStr + "\n\r" + "解密後: " + outputStr);
- assertEquals(inputStr, outputStr);
-
- System.err.println("私鑰簽名——公鑰驗證簽名");
-
- String sign = CertificateCoder.sign(encodedData, keyStorePath, alias,
- password);
- System.err.println("簽名:\r" + sign);
-
-
- boolean status = CertificateCoder.verify(encodedData, sign,
- certificatePath);
- System.err.println("狀態:\r" + status);
- assertTrue(status);
-
- }
-
- @Test
- public void testHttps() throws Exception {
- URL url = new URL("https://www.zlex.org/examples/");
- HttpsURLConnection conn = (HttpsURLConnection) url.openConnection();
-
- conn.setDoInput(true);
- conn.setDoOutput(true);
-
- CertificateCoder.configSSLSocketFactory(conn, clientPassword,
- clientKeyStorePath, clientKeyStorePath);
-
- InputStream is = conn.getInputStream();
-
- int length = conn.getContentLength();
-
- DataInputStream dis = new DataInputStream(is);
- byte[] data = new byte[length];
- dis.readFully(data);
-
- dis.close();
- System.err.println(new String(data));
- conn.disconnect();
- }
- }
注意testHttps方法,幾乎和咱們往常作HTTP訪問沒有差異,咱們來看控制檯輸出:
瀏覽器
- <!--
- Licensed to the Apache Software Foundation (ASF) under one or more
- contributor license agreements. See the NOTICE file distributed with
- this work for additional information regarding copyright ownership.
- The ASF licenses this file to You under the Apache License, Version 2.0
- (the "License"); you may not use this file except in compliance with
- the License. You may obtain a copy of the License at
-
- http://www.apache.org/licenses/LICENSE-2.0
-
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- -->
- <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
- <HTML><HEAD><TITLE>Apache Tomcat Examples</TITLE>
- <META http-equiv=Content-Type content="text/html">
- </HEAD>
- <BODY>
- <P>
- <H3>Apache Tomcat Examples</H3>
- <P></P>
- <ul>
- <li><a href="servlets">Servlets examples</a></li>
- <li><a href="jsp">JSP Examples</a></li>
- </ul>
- </BODY></HTML>
經過瀏覽器直接訪問https://www.zlex.org/examples/你也會得到上述內容。也就是說應用甲方做爲服務器構建tomcat服務,乙方能夠經過上述方式訪問甲方受保護的SSL應用,而且不須要考慮具體的加密解密問題。甲乙雙方能夠通過相應配置,經過雙方的tomcat配置有效的SSL服務,簡化上述代碼實現,徹底經過證書配置完成SSL雙向認證!
tomcat