blob: 45254908c5c967400cfeb77b3f3f873f72ae9571 [file] [log] [blame]
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +00001/*
2 * Licensed to the Apache Software Foundation (ASF) under one or more
3 * contributor license agreements. See the NOTICE file distributed with
4 * this work for additional information regarding copyright ownership.
5 * The ASF licenses this file to You under the Apache License, Version 2.0
6 * (the "License"); you may not use this file except in compliance with
7 * the License. You may obtain a copy of the License at
8 *
9 * http://www.apache.org/licenses/LICENSE-2.0
10 *
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
16 */
17
18package android.util.jar;
19
Tobias Thierer9f00d712016-12-01 23:04:36 +000020import android.util.apk.ApkSignatureSchemeV2Verifier;
Daniel Cashman67096e02017-12-28 12:46:33 -080021import android.util.apk.ApkSignatureSchemeV3Verifier;
22
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000023import java.io.IOException;
24import java.io.OutputStream;
25import java.nio.charset.StandardCharsets;
26import java.security.GeneralSecurityException;
27import java.security.MessageDigest;
28import java.security.NoSuchAlgorithmException;
29import java.security.cert.Certificate;
30import java.security.cert.X509Certificate;
31import java.util.ArrayList;
32import java.util.HashMap;
33import java.util.Hashtable;
34import java.util.Iterator;
Alex Klyubin29045202016-05-31 16:04:49 -070035import java.util.List;
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000036import java.util.Locale;
37import java.util.Map;
Alex Klyubine4157182016-01-05 13:27:05 -080038import java.util.StringTokenizer;
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000039import java.util.jar.Attributes;
40import java.util.jar.JarFile;
Daniel Cashman67096e02017-12-28 12:46:33 -080041
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000042import sun.security.jca.Providers;
43import sun.security.pkcs.PKCS7;
Alex Klyubin29045202016-05-31 16:04:49 -070044import sun.security.pkcs.SignerInfo;
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000045
46/**
47 * Non-public class used by {@link JarFile} and {@link JarInputStream} to manage
48 * the verification of signed JARs. {@code JarFile} and {@code JarInputStream}
49 * objects are expected to have a {@code JarVerifier} instance member which
50 * can be used to carry out the tasks associated with verifying a signed JAR.
51 * These tasks would typically include:
52 * <ul>
53 * <li>verification of all signed signature files
54 * <li>confirmation that all signed data was signed only by the party or parties
55 * specified in the signature block data
56 * <li>verification that the contents of all signature files (i.e. {@code .SF}
57 * files) agree with the JAR entries information found in the JAR manifest.
58 * </ul>
59 */
60class StrictJarVerifier {
61 /**
Daniel Cashman67096e02017-12-28 12:46:33 -080062 * {@code .SF} file header section attribute indicating that the APK is signed not just with
63 * JAR signature scheme but also with APK Signature Scheme v2 or newer. This attribute
64 * facilitates v2 signature stripping detection.
65 *
66 * <p>The attribute contains a comma-separated set of signature scheme IDs.
67 */
68 private static final String SF_ATTRIBUTE_ANDROID_APK_SIGNED_NAME = "X-Android-APK-Signed";
69
70 /**
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000071 * List of accepted digest algorithms. This list is in order from most
72 * preferred to least preferred.
73 */
74 private static final String[] DIGEST_ALGORITHMS = new String[] {
75 "SHA-512",
76 "SHA-384",
77 "SHA-256",
78 "SHA1",
79 };
80
81 private final String jarName;
82 private final StrictJarManifest manifest;
83 private final HashMap<String, byte[]> metaEntries;
84 private final int mainAttributesEnd;
Alex Klyubin9b59bc42016-03-24 12:02:20 -070085 private final boolean signatureSchemeRollbackProtectionsEnforced;
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +000086
87 private final Hashtable<String, HashMap<String, Attributes>> signatures =
88 new Hashtable<String, HashMap<String, Attributes>>(5);
89
90 private final Hashtable<String, Certificate[]> certificates =
91 new Hashtable<String, Certificate[]>(5);
92
93 private final Hashtable<String, Certificate[][]> verifiedEntries =
94 new Hashtable<String, Certificate[][]>();
95
96 /**
97 * Stores and a hash and a message digest and verifies that massage digest
98 * matches the hash.
99 */
100 static class VerifierEntry extends OutputStream {
101
102 private final String name;
103
104 private final MessageDigest digest;
105
106 private final byte[] hash;
107
108 private final Certificate[][] certChains;
109
110 private final Hashtable<String, Certificate[][]> verifiedEntries;
111
112 VerifierEntry(String name, MessageDigest digest, byte[] hash,
113 Certificate[][] certChains, Hashtable<String, Certificate[][]> verifedEntries) {
114 this.name = name;
115 this.digest = digest;
116 this.hash = hash;
117 this.certChains = certChains;
118 this.verifiedEntries = verifedEntries;
119 }
120
121 /**
122 * Updates a digest with one byte.
123 */
124 @Override
125 public void write(int value) {
126 digest.update((byte) value);
127 }
128
129 /**
130 * Updates a digest with byte array.
131 */
132 @Override
133 public void write(byte[] buf, int off, int nbytes) {
134 digest.update(buf, off, nbytes);
135 }
136
137 /**
138 * Verifies that the digests stored in the manifest match the decrypted
139 * digests from the .SF file. This indicates the validity of the
140 * signing, not the integrity of the file, as its digest must be
141 * calculated and verified when its contents are read.
142 *
143 * @throws SecurityException
144 * if the digest value stored in the manifest does <i>not</i>
145 * agree with the decrypted digest as recovered from the
146 * <code>.SF</code> file.
147 */
148 void verify() {
149 byte[] d = digest.digest();
Tobias Thierer9f00d712016-12-01 23:04:36 +0000150 if (!verifyMessageDigest(d, hash)) {
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000151 throw invalidDigest(JarFile.MANIFEST_NAME, name, name);
152 }
153 verifiedEntries.put(name, certChains);
154 }
155 }
156
157 private static SecurityException invalidDigest(String signatureFile, String name,
158 String jarName) {
159 throw new SecurityException(signatureFile + " has invalid digest for " + name +
160 " in " + jarName);
161 }
162
163 private static SecurityException failedVerification(String jarName, String signatureFile) {
164 throw new SecurityException(jarName + " failed verification of " + signatureFile);
165 }
166
167 private static SecurityException failedVerification(String jarName, String signatureFile,
168 Throwable e) {
169 throw new SecurityException(jarName + " failed verification of " + signatureFile, e);
170 }
171
172
173 /**
174 * Constructs and returns a new instance of {@code JarVerifier}.
175 *
176 * @param name
177 * the name of the JAR file being verified.
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700178 *
179 * @param signatureSchemeRollbackProtectionsEnforced {@code true} to enforce protections against
180 * stripping newer signature schemes (e.g., APK Signature Scheme v2) from the file, or
181 * {@code false} to ignore any such protections.
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000182 */
183 StrictJarVerifier(String name, StrictJarManifest manifest,
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700184 HashMap<String, byte[]> metaEntries, boolean signatureSchemeRollbackProtectionsEnforced) {
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000185 jarName = name;
186 this.manifest = manifest;
187 this.metaEntries = metaEntries;
188 this.mainAttributesEnd = manifest.getMainAttributesEnd();
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700189 this.signatureSchemeRollbackProtectionsEnforced =
190 signatureSchemeRollbackProtectionsEnforced;
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000191 }
192
193 /**
194 * Invoked for each new JAR entry read operation from the input
195 * stream. This method constructs and returns a new {@link VerifierEntry}
196 * which contains the certificates used to sign the entry and its hash value
197 * as specified in the JAR MANIFEST format.
198 *
199 * @param name
200 * the name of an entry in a JAR file which is <b>not</b> in the
201 * {@code META-INF} directory.
202 * @return a new instance of {@link VerifierEntry} which can be used by
203 * callers as an {@link OutputStream}.
204 */
205 VerifierEntry initEntry(String name) {
206 // If no manifest is present by the time an entry is found,
207 // verification cannot occur. If no signature files have
208 // been found, do not verify.
209 if (manifest == null || signatures.isEmpty()) {
210 return null;
211 }
212
213 Attributes attributes = manifest.getAttributes(name);
214 // entry has no digest
215 if (attributes == null) {
216 return null;
217 }
218
219 ArrayList<Certificate[]> certChains = new ArrayList<Certificate[]>();
220 Iterator<Map.Entry<String, HashMap<String, Attributes>>> it = signatures.entrySet().iterator();
221 while (it.hasNext()) {
222 Map.Entry<String, HashMap<String, Attributes>> entry = it.next();
223 HashMap<String, Attributes> hm = entry.getValue();
224 if (hm.get(name) != null) {
225 // Found an entry for entry name in .SF file
226 String signatureFile = entry.getKey();
227 Certificate[] certChain = certificates.get(signatureFile);
228 if (certChain != null) {
229 certChains.add(certChain);
230 }
231 }
232 }
233
234 // entry is not signed
235 if (certChains.isEmpty()) {
236 return null;
237 }
238 Certificate[][] certChainsArray = certChains.toArray(new Certificate[certChains.size()][]);
239
240 for (int i = 0; i < DIGEST_ALGORITHMS.length; i++) {
241 final String algorithm = DIGEST_ALGORITHMS[i];
242 final String hash = attributes.getValue(algorithm + "-Digest");
243 if (hash == null) {
244 continue;
245 }
246 byte[] hashBytes = hash.getBytes(StandardCharsets.ISO_8859_1);
247
248 try {
249 return new VerifierEntry(name, MessageDigest.getInstance(algorithm), hashBytes,
250 certChainsArray, verifiedEntries);
251 } catch (NoSuchAlgorithmException ignored) {
252 }
253 }
254 return null;
255 }
256
257 /**
258 * Add a new meta entry to the internal collection of data held on each JAR
259 * entry in the {@code META-INF} directory including the manifest
260 * file itself. Files associated with the signing of a JAR would also be
261 * added to this collection.
262 *
263 * @param name
264 * the name of the file located in the {@code META-INF}
265 * directory.
266 * @param buf
267 * the file bytes for the file called {@code name}.
268 * @see #removeMetaEntries()
269 */
270 void addMetaEntry(String name, byte[] buf) {
271 metaEntries.put(name.toUpperCase(Locale.US), buf);
272 }
273
274 /**
275 * If the associated JAR file is signed, check on the validity of all of the
276 * known signatures.
277 *
278 * @return {@code true} if the associated JAR is signed and an internal
279 * check verifies the validity of the signature(s). {@code false} if
280 * the associated JAR file has no entries at all in its {@code
281 * META-INF} directory. This situation is indicative of an invalid
282 * JAR file.
283 * <p>
284 * Will also return {@code true} if the JAR file is <i>not</i>
285 * signed.
286 * @throws SecurityException
287 * if the JAR file is signed and it is determined that a
288 * signature block file contains an invalid signature for the
289 * corresponding signature file.
290 */
291 synchronized boolean readCertificates() {
292 if (metaEntries.isEmpty()) {
293 return false;
294 }
295
296 Iterator<String> it = metaEntries.keySet().iterator();
297 while (it.hasNext()) {
298 String key = it.next();
299 if (key.endsWith(".DSA") || key.endsWith(".RSA") || key.endsWith(".EC")) {
300 verifyCertificate(key);
301 it.remove();
302 }
303 }
304 return true;
305 }
306
307 /**
308 * Verifies that the signature computed from {@code sfBytes} matches
309 * that specified in {@code blockBytes} (which is a PKCS7 block). Returns
310 * certificates listed in the PKCS7 block. Throws a {@code GeneralSecurityException}
311 * if something goes wrong during verification.
312 */
313 static Certificate[] verifyBytes(byte[] blockBytes, byte[] sfBytes)
314 throws GeneralSecurityException {
315
316 Object obj = null;
317 try {
318
319 obj = Providers.startJarVerification();
320 PKCS7 block = new PKCS7(blockBytes);
Alex Klyubin29045202016-05-31 16:04:49 -0700321 SignerInfo[] verifiedSignerInfos = block.verify(sfBytes);
322 if ((verifiedSignerInfos == null) || (verifiedSignerInfos.length == 0)) {
323 throw new GeneralSecurityException(
324 "Failed to verify signature: no verified SignerInfos");
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000325 }
Alex Klyubin29045202016-05-31 16:04:49 -0700326 // Ignore any SignerInfo other than the first one, to be compatible with older Android
327 // platforms which have been doing this for years. See
328 // libcore/luni/src/main/java/org/apache/harmony/security/utils/JarUtils.java
329 // verifySignature method of older platforms.
330 SignerInfo verifiedSignerInfo = verifiedSignerInfos[0];
331 List<X509Certificate> verifiedSignerCertChain =
332 verifiedSignerInfo.getCertificateChain(block);
333 if (verifiedSignerCertChain == null) {
334 // Should never happen
335 throw new GeneralSecurityException(
336 "Failed to find verified SignerInfo certificate chain");
337 } else if (verifiedSignerCertChain.isEmpty()) {
338 // Should never happen
339 throw new GeneralSecurityException(
340 "Verified SignerInfo certificate chain is emtpy");
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000341 }
Alex Klyubin29045202016-05-31 16:04:49 -0700342 return verifiedSignerCertChain.toArray(
343 new X509Certificate[verifiedSignerCertChain.size()]);
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000344 } catch (IOException e) {
345 throw new GeneralSecurityException("IO exception verifying jar cert", e);
346 } finally {
347 Providers.stopJarVerification(obj);
348 }
349 }
350
351 /**
352 * @param certFile
353 */
354 private void verifyCertificate(String certFile) {
355 // Found Digital Sig, .SF should already have been read
356 String signatureFile = certFile.substring(0, certFile.lastIndexOf('.')) + ".SF";
357 byte[] sfBytes = metaEntries.get(signatureFile);
358 if (sfBytes == null) {
359 return;
360 }
361
362 byte[] manifestBytes = metaEntries.get(JarFile.MANIFEST_NAME);
363 // Manifest entry is required for any verifications.
364 if (manifestBytes == null) {
365 return;
366 }
367
368 byte[] sBlockBytes = metaEntries.get(certFile);
369 try {
370 Certificate[] signerCertChain = verifyBytes(sBlockBytes, sfBytes);
371 if (signerCertChain != null) {
372 certificates.put(signatureFile, signerCertChain);
373 }
374 } catch (GeneralSecurityException e) {
375 throw failedVerification(jarName, signatureFile, e);
376 }
377
378 // Verify manifest hash in .sf file
379 Attributes attributes = new Attributes();
380 HashMap<String, Attributes> entries = new HashMap<String, Attributes>();
381 try {
382 StrictJarManifestReader im = new StrictJarManifestReader(sfBytes, attributes);
383 im.readEntries(entries, null);
384 } catch (IOException e) {
385 return;
386 }
387
Daniel Cashman67096e02017-12-28 12:46:33 -0800388 // If requested, check whether a newer APK Signature Scheme signature was stripped.
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700389 if (signatureSchemeRollbackProtectionsEnforced) {
390 String apkSignatureSchemeIdList =
Daniel Cashman67096e02017-12-28 12:46:33 -0800391 attributes.getValue(SF_ATTRIBUTE_ANDROID_APK_SIGNED_NAME);
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700392 if (apkSignatureSchemeIdList != null) {
393 // This field contains a comma-separated list of APK signature scheme IDs which
394 // were used to sign this APK. If an ID is known to us, it means signatures of that
395 // scheme were stripped from the APK because otherwise we wouldn't have fallen back
396 // to verifying the APK using the JAR signature scheme.
397 boolean v2SignatureGenerated = false;
Daniel Cashman67096e02017-12-28 12:46:33 -0800398 boolean v3SignatureGenerated = false;
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700399 StringTokenizer tokenizer = new StringTokenizer(apkSignatureSchemeIdList, ",");
400 while (tokenizer.hasMoreTokens()) {
401 String idText = tokenizer.nextToken().trim();
402 if (idText.isEmpty()) {
403 continue;
404 }
405 int id;
406 try {
407 id = Integer.parseInt(idText);
408 } catch (Exception ignored) {
409 continue;
410 }
411 if (id == ApkSignatureSchemeV2Verifier.SF_ATTRIBUTE_ANDROID_APK_SIGNED_ID) {
412 // This APK was supposed to be signed with APK Signature Scheme v2 but no
413 // such signature was found.
414 v2SignatureGenerated = true;
415 break;
416 }
Daniel Cashman67096e02017-12-28 12:46:33 -0800417 if (id == ApkSignatureSchemeV3Verifier.SF_ATTRIBUTE_ANDROID_APK_SIGNED_ID) {
418 // This APK was supposed to be signed with APK Signature Scheme v3 but no
419 // such signature was found.
420 v3SignatureGenerated = true;
421 break;
422 }
Alex Klyubine4157182016-01-05 13:27:05 -0800423 }
Alex Klyubine4157182016-01-05 13:27:05 -0800424
Alex Klyubin9b59bc42016-03-24 12:02:20 -0700425 if (v2SignatureGenerated) {
426 throw new SecurityException(signatureFile + " indicates " + jarName
427 + " is signed using APK Signature Scheme v2, but no such signature was"
428 + " found. Signature stripped?");
429 }
Daniel Cashman67096e02017-12-28 12:46:33 -0800430 if (v3SignatureGenerated) {
431 throw new SecurityException(signatureFile + " indicates " + jarName
432 + " is signed using APK Signature Scheme v3, but no such signature was"
433 + " found. Signature stripped?");
434 }
Alex Klyubine4157182016-01-05 13:27:05 -0800435 }
436 }
437
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000438 // Do we actually have any signatures to look at?
439 if (attributes.get(Attributes.Name.SIGNATURE_VERSION) == null) {
440 return;
441 }
442
443 boolean createdBySigntool = false;
444 String createdBy = attributes.getValue("Created-By");
445 if (createdBy != null) {
446 createdBySigntool = createdBy.indexOf("signtool") != -1;
447 }
448
449 // Use .SF to verify the mainAttributes of the manifest
450 // If there is no -Digest-Manifest-Main-Attributes entry in .SF
451 // file, such as those created before java 1.5, then we ignore
452 // such verification.
453 if (mainAttributesEnd > 0 && !createdBySigntool) {
454 String digestAttribute = "-Digest-Manifest-Main-Attributes";
455 if (!verify(attributes, digestAttribute, manifestBytes, 0, mainAttributesEnd, false, true)) {
456 throw failedVerification(jarName, signatureFile);
457 }
458 }
459
460 // Use .SF to verify the whole manifest.
461 String digestAttribute = createdBySigntool ? "-Digest" : "-Digest-Manifest";
462 if (!verify(attributes, digestAttribute, manifestBytes, 0, manifestBytes.length, false, false)) {
463 Iterator<Map.Entry<String, Attributes>> it = entries.entrySet().iterator();
464 while (it.hasNext()) {
465 Map.Entry<String, Attributes> entry = it.next();
466 StrictJarManifest.Chunk chunk = manifest.getChunk(entry.getKey());
467 if (chunk == null) {
468 return;
469 }
470 if (!verify(entry.getValue(), "-Digest", manifestBytes,
471 chunk.start, chunk.end, createdBySigntool, false)) {
472 throw invalidDigest(signatureFile, entry.getKey(), jarName);
473 }
474 }
475 }
476 metaEntries.put(signatureFile, null);
477 signatures.put(signatureFile, entries);
478 }
479
480 /**
481 * Returns a <code>boolean</code> indication of whether or not the
482 * associated jar file is signed.
483 *
484 * @return {@code true} if the JAR is signed, {@code false}
485 * otherwise.
486 */
487 boolean isSignedJar() {
488 return certificates.size() > 0;
489 }
490
491 private boolean verify(Attributes attributes, String entry, byte[] data,
492 int start, int end, boolean ignoreSecondEndline, boolean ignorable) {
493 for (int i = 0; i < DIGEST_ALGORITHMS.length; i++) {
494 String algorithm = DIGEST_ALGORITHMS[i];
495 String hash = attributes.getValue(algorithm + entry);
496 if (hash == null) {
497 continue;
498 }
499
500 MessageDigest md;
501 try {
502 md = MessageDigest.getInstance(algorithm);
503 } catch (NoSuchAlgorithmException e) {
504 continue;
505 }
506 if (ignoreSecondEndline && data[end - 1] == '\n' && data[end - 2] == '\n') {
507 md.update(data, start, end - 1 - start);
508 } else {
509 md.update(data, start, end - start);
510 }
511 byte[] b = md.digest();
Tobias Thierer9f00d712016-12-01 23:04:36 +0000512 byte[] encodedHashBytes = hash.getBytes(StandardCharsets.ISO_8859_1);
513 return verifyMessageDigest(b, encodedHashBytes);
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000514 }
515 return ignorable;
516 }
517
Tobias Thierer9f00d712016-12-01 23:04:36 +0000518 private static boolean verifyMessageDigest(byte[] expected, byte[] encodedActual) {
519 byte[] actual;
520 try {
521 actual = java.util.Base64.getDecoder().decode(encodedActual);
522 } catch (IllegalArgumentException e) {
523 return false;
524 }
525 return MessageDigest.isEqual(expected, actual);
526 }
527
Przemyslaw Szczepaniak8a7c1602015-11-03 09:47:56 +0000528 /**
529 * Returns all of the {@link java.security.cert.Certificate} chains that
530 * were used to verify the signature on the JAR entry called
531 * {@code name}. Callers must not modify the returned arrays.
532 *
533 * @param name
534 * the name of a JAR entry.
535 * @return an array of {@link java.security.cert.Certificate} chains.
536 */
537 Certificate[][] getCertificateChains(String name) {
538 return verifiedEntries.get(name);
539 }
540
541 /**
542 * Remove all entries from the internal collection of data held about each
543 * JAR entry in the {@code META-INF} directory.
544 */
545 void removeMetaEntries() {
546 metaEntries.clear();
547 }
548}