-
Notifications
You must be signed in to change notification settings - Fork 118
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Configure java connector to check CN instance name. Fixes #1995 #1996
Conversation
3e90ff4
to
13b73d3
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do we have a test that verifies a common name mismatch fails the TLS handshake?
I added a test for a CN mismatch. |
@jackwotherspoon We need to manually test this with a domain-scoped instance. Can you do that? |
@hessjcg sure, for manually testing should I just run the integration tests? Will that suffice? |
@jackwotherspoon: Yes, it will be sufficient to run the integration tests at the domain-scoped instance. |
@@ -62,6 +62,8 @@ public class CloudSqlCoreTestingBase { | |||
|
|||
ListenableFuture<KeyPair> clientKeyPair; | |||
|
|||
public CloudSqlCoreTestingBase() {} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
FWIW In my opinion, this base class deserves to be split up into small composable units. As is, it's an awkward tool.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1. Maybe in a different PR.
FakeSslServer sslServer = new FakeSslServer(); | ||
ConnectionConfig config = | ||
new ConnectionConfig.Builder() | ||
.withCloudSqlInstance("myProject:myRegion:otherInstance") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: let's make this blatantly wrong, e.g., "wrongwrongwrong" or something similar that catches the eye.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fixed.
This code will make that the connector checks that the server certificate's subject CN field matches the instance name
before allowing the TLS handshake to proceed.
This introduces new classes that are always installed as trust managers on all TLS connections to ensure that the TLS logic correctly checks that the server certificate's CN field matches the instance.
InstanceCheckingTrustManager
- Delegates to default TLS trust manager, then checks the CN field.InstanceCheckingTrustManagerFactory
andInstanceCheckingTrustManagerFactorySpi
- Installsour custom trust manager into connector TLS sockets.
The
ConscryptWorkaroundTrustManagerFactory
andConscryptWorkaroundTrustManagerFactorySpi
classes are no longer necessary. Logic to detect Conscrypt and use the workaroundConscryptWorkaroundTrustManager
moves intoInstanceCheckingTrustManagerFactorySpi
.