IdentityVerifier.cs 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342
  1. //----------------------------------------------------------
  2. // Copyright (c) Microsoft Corporation. All rights reserved.
  3. //------------------------------------------------------------
  4. namespace System.ServiceModel.Security
  5. {
  6. using System.Net;
  7. using System.ServiceModel.Channels;
  8. using System.ServiceModel;
  9. using System.Net.Sockets;
  10. using System.Collections.ObjectModel;
  11. using System.IdentityModel.Selectors;
  12. using System.IdentityModel.Claims;
  13. using System.IdentityModel.Policy;
  14. using System.IdentityModel.Tokens;
  15. using System.Security.Principal;
  16. using System.ServiceModel.Security.Tokens;
  17. using System.Collections.Generic;
  18. using System.Runtime.Serialization;
  19. using System.Globalization;
  20. using System.ServiceModel.Diagnostics;
  21. using System.ServiceModel.Diagnostics.Application;
  22. using System.Runtime.Diagnostics;
  23. public abstract class IdentityVerifier
  24. {
  25. protected IdentityVerifier()
  26. {
  27. // empty
  28. }
  29. public static IdentityVerifier CreateDefault()
  30. {
  31. return DefaultIdentityVerifier.Instance;
  32. }
  33. internal bool CheckAccess(EndpointAddress reference, Message message)
  34. {
  35. if (reference == null)
  36. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("reference");
  37. if (message == null)
  38. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("message");
  39. EndpointIdentity identity;
  40. if (!this.TryGetIdentity(reference, out identity))
  41. return false;
  42. SecurityMessageProperty securityContextProperty = null;
  43. if (message.Properties != null)
  44. securityContextProperty = message.Properties.Security;
  45. if (securityContextProperty == null || securityContextProperty.ServiceSecurityContext == null)
  46. return false;
  47. return this.CheckAccess(identity, securityContextProperty.ServiceSecurityContext.AuthorizationContext);
  48. }
  49. public abstract bool CheckAccess(EndpointIdentity identity, AuthorizationContext authContext);
  50. public abstract bool TryGetIdentity(EndpointAddress reference, out EndpointIdentity identity);
  51. static void AdjustAddress(ref EndpointAddress reference, Uri via)
  52. {
  53. // if we don't have an identity and we have differing Uris, we should use the Via
  54. if (reference.Identity == null && reference.Uri != via)
  55. {
  56. reference = new EndpointAddress(via);
  57. }
  58. }
  59. internal bool TryGetIdentity(EndpointAddress reference, Uri via, out EndpointIdentity identity)
  60. {
  61. AdjustAddress(ref reference, via);
  62. return this.TryGetIdentity(reference, out identity);
  63. }
  64. internal void EnsureIncomingIdentity(EndpointAddress serviceReference, AuthorizationContext authorizationContext)
  65. {
  66. EnsureIdentity(serviceReference, authorizationContext, SR.IdentityCheckFailedForIncomingMessage);
  67. }
  68. internal void EnsureOutgoingIdentity(EndpointAddress serviceReference, Uri via, AuthorizationContext authorizationContext)
  69. {
  70. AdjustAddress(ref serviceReference, via);
  71. this.EnsureIdentity(serviceReference, authorizationContext, SR.IdentityCheckFailedForOutgoingMessage);
  72. }
  73. internal void EnsureOutgoingIdentity(EndpointAddress serviceReference, ReadOnlyCollection<IAuthorizationPolicy> authorizationPolicies)
  74. {
  75. if (authorizationPolicies == null)
  76. {
  77. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("authorizationPolicies");
  78. }
  79. AuthorizationContext ac = AuthorizationContext.CreateDefaultAuthorizationContext(authorizationPolicies);
  80. EnsureIdentity(serviceReference, ac, SR.IdentityCheckFailedForOutgoingMessage);
  81. }
  82. void EnsureIdentity(EndpointAddress serviceReference, AuthorizationContext authorizationContext, String errorString)
  83. {
  84. if (authorizationContext == null)
  85. {
  86. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("authorizationContext");
  87. }
  88. EndpointIdentity identity;
  89. if (!TryGetIdentity(serviceReference, out identity))
  90. {
  91. SecurityTraceRecordHelper.TraceIdentityVerificationFailure(identity, authorizationContext, this.GetType());
  92. throw DiagnosticUtility.ExceptionUtility.ThrowHelperWarning(new MessageSecurityException(SR.GetString(errorString, identity, serviceReference)));
  93. }
  94. else
  95. {
  96. if (!CheckAccess(identity, authorizationContext))
  97. {
  98. // CheckAccess performs a Trace on failure, no need to do it twice
  99. Exception e = CreateIdentityCheckException(identity, authorizationContext, errorString, serviceReference);
  100. throw DiagnosticUtility.ExceptionUtility.ThrowHelperWarning(e);
  101. }
  102. }
  103. }
  104. Exception CreateIdentityCheckException(EndpointIdentity identity, AuthorizationContext authorizationContext, string errorString, EndpointAddress serviceReference)
  105. {
  106. Exception result;
  107. if (identity.IdentityClaim != null
  108. && identity.IdentityClaim.ClaimType == ClaimTypes.Dns
  109. && identity.IdentityClaim.Right == Rights.PossessProperty
  110. && identity.IdentityClaim.Resource is string)
  111. {
  112. string expectedDnsName = (string)identity.IdentityClaim.Resource;
  113. string actualDnsName = null;
  114. for (int i = 0; i < authorizationContext.ClaimSets.Count; ++i)
  115. {
  116. ClaimSet claimSet = authorizationContext.ClaimSets[i];
  117. foreach (Claim claim in claimSet.FindClaims(ClaimTypes.Dns, Rights.PossessProperty))
  118. {
  119. if (claim.Resource is string)
  120. {
  121. actualDnsName = (string)claim.Resource;
  122. break;
  123. }
  124. }
  125. if (actualDnsName != null)
  126. {
  127. break;
  128. }
  129. }
  130. if (SR.IdentityCheckFailedForIncomingMessage.Equals(errorString))
  131. {
  132. if (actualDnsName == null)
  133. {
  134. result = new MessageSecurityException(SR.GetString(SR.DnsIdentityCheckFailedForIncomingMessageLackOfDnsClaim, expectedDnsName));
  135. }
  136. else
  137. {
  138. result = new MessageSecurityException(SR.GetString(SR.DnsIdentityCheckFailedForIncomingMessage, expectedDnsName, actualDnsName));
  139. }
  140. }
  141. else if (SR.IdentityCheckFailedForOutgoingMessage.Equals(errorString))
  142. {
  143. if (actualDnsName == null)
  144. {
  145. result = new MessageSecurityException(SR.GetString(SR.DnsIdentityCheckFailedForOutgoingMessageLackOfDnsClaim, expectedDnsName));
  146. }
  147. else
  148. {
  149. result = new MessageSecurityException(SR.GetString(SR.DnsIdentityCheckFailedForOutgoingMessage, expectedDnsName, actualDnsName));
  150. }
  151. }
  152. else
  153. {
  154. result = new MessageSecurityException(SR.GetString(errorString, identity, serviceReference));
  155. }
  156. }
  157. else
  158. {
  159. result = new MessageSecurityException(SR.GetString(errorString, identity, serviceReference));
  160. }
  161. return result;
  162. }
  163. class DefaultIdentityVerifier : IdentityVerifier
  164. {
  165. static readonly DefaultIdentityVerifier instance = new DefaultIdentityVerifier();
  166. public static DefaultIdentityVerifier Instance
  167. {
  168. get { return instance; }
  169. }
  170. public override bool TryGetIdentity(EndpointAddress reference, out EndpointIdentity identity)
  171. {
  172. if (reference == null)
  173. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("reference");
  174. identity = reference.Identity;
  175. if (identity == null)
  176. {
  177. identity = this.TryCreateDnsIdentity(reference);
  178. }
  179. if (identity == null)
  180. {
  181. SecurityTraceRecordHelper.TraceIdentityDeterminationFailure(reference, typeof(DefaultIdentityVerifier));
  182. return false;
  183. }
  184. else
  185. {
  186. SecurityTraceRecordHelper.TraceIdentityDeterminationSuccess(reference, identity, typeof(DefaultIdentityVerifier));
  187. return true;
  188. }
  189. }
  190. EndpointIdentity TryCreateDnsIdentity(EndpointAddress reference)
  191. {
  192. Uri toAddress = reference.Uri;
  193. if (!toAddress.IsAbsoluteUri)
  194. return null;
  195. return EndpointIdentity.CreateDnsIdentity(toAddress.DnsSafeHost);
  196. }
  197. SecurityIdentifier GetSecurityIdentifier(Claim claim)
  198. {
  199. // if the incoming claim is a SID and the EndpointIdentity is UPN/SPN/DNS, try to find the SID corresponding to
  200. // the UPN/SPN/DNS (transactions case)
  201. if (claim.Resource is WindowsIdentity)
  202. return ((WindowsIdentity)claim.Resource).User;
  203. else if (claim.Resource is WindowsSidIdentity)
  204. return ((WindowsSidIdentity)claim.Resource).SecurityIdentifier;
  205. return claim.Resource as SecurityIdentifier;
  206. }
  207. Claim CheckDnsEquivalence(ClaimSet claimSet, string expectedSpn)
  208. {
  209. // host/<machine-name> satisfies the DNS identity claim
  210. IEnumerable<Claim> claims = claimSet.FindClaims(ClaimTypes.Spn, Rights.PossessProperty);
  211. foreach (Claim claim in claims)
  212. {
  213. if (expectedSpn.Equals((string)claim.Resource, StringComparison.OrdinalIgnoreCase))
  214. {
  215. return claim;
  216. }
  217. }
  218. return null;
  219. }
  220. Claim CheckSidEquivalence(SecurityIdentifier identitySid, ClaimSet claimSet)
  221. {
  222. foreach (Claim claim in claimSet)
  223. {
  224. SecurityIdentifier sid = GetSecurityIdentifier(claim);
  225. if (sid != null)
  226. {
  227. if (identitySid.Equals(sid))
  228. {
  229. return claim;
  230. }
  231. }
  232. }
  233. return null;
  234. }
  235. public override bool CheckAccess(EndpointIdentity identity, AuthorizationContext authContext)
  236. {
  237. EventTraceActivity eventTraceActivity = null;
  238. if (identity == null)
  239. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("identity");
  240. if (authContext == null)
  241. throw DiagnosticUtility.ExceptionUtility.ThrowHelperArgumentNull("authContext");
  242. if (FxTrace.Trace.IsEnd2EndActivityTracingEnabled)
  243. {
  244. eventTraceActivity = EventTraceActivityHelper.TryExtractActivity((OperationContext.Current != null) ? OperationContext.Current.IncomingMessage : null);
  245. }
  246. for (int i = 0; i < authContext.ClaimSets.Count; ++i)
  247. {
  248. ClaimSet claimSet = authContext.ClaimSets[i];
  249. if (claimSet.ContainsClaim(identity.IdentityClaim))
  250. {
  251. SecurityTraceRecordHelper.TraceIdentityVerificationSuccess(eventTraceActivity, identity, identity.IdentityClaim, this.GetType());
  252. return true;
  253. }
  254. // try Claim equivalence
  255. string expectedSpn = null;
  256. if (ClaimTypes.Dns.Equals(identity.IdentityClaim.ClaimType))
  257. {
  258. expectedSpn = string.Format(CultureInfo.InvariantCulture, "host/{0}", (string)identity.IdentityClaim.Resource);
  259. Claim claim = CheckDnsEquivalence(claimSet, expectedSpn);
  260. if (claim != null)
  261. {
  262. SecurityTraceRecordHelper.TraceIdentityVerificationSuccess(eventTraceActivity, identity, claim, this.GetType());
  263. return true;
  264. }
  265. }
  266. // Allow a Sid claim to support UPN, and SPN identities
  267. SecurityIdentifier identitySid = null;
  268. if (ClaimTypes.Sid.Equals(identity.IdentityClaim.ClaimType))
  269. {
  270. identitySid = GetSecurityIdentifier(identity.IdentityClaim);
  271. }
  272. else if (ClaimTypes.Upn.Equals(identity.IdentityClaim.ClaimType))
  273. {
  274. identitySid = ((UpnEndpointIdentity)identity).GetUpnSid();
  275. }
  276. else if (ClaimTypes.Spn.Equals(identity.IdentityClaim.ClaimType))
  277. {
  278. identitySid = ((SpnEndpointIdentity)identity).GetSpnSid();
  279. }
  280. else if (ClaimTypes.Dns.Equals(identity.IdentityClaim.ClaimType))
  281. {
  282. identitySid = new SpnEndpointIdentity(expectedSpn).GetSpnSid();
  283. }
  284. if (identitySid != null)
  285. {
  286. Claim claim = CheckSidEquivalence(identitySid, claimSet);
  287. if (claim != null)
  288. {
  289. SecurityTraceRecordHelper.TraceIdentityVerificationSuccess(eventTraceActivity, identity, claim, this.GetType());
  290. return true;
  291. }
  292. }
  293. }
  294. SecurityTraceRecordHelper.TraceIdentityVerificationFailure(identity, authContext, this.GetType());
  295. if (TD.SecurityIdentityVerificationFailureIsEnabled())
  296. {
  297. TD.SecurityIdentityVerificationFailure(eventTraceActivity);
  298. }
  299. return false;
  300. }
  301. }
  302. }
  303. }