Skip to content

Commit 3e41a78

Browse files
franferraxjerboaa
authored andcommitted
8339280: jarsigner -verify performs cross-checking between CEN and LOC
8353299: VerifyJarEntryName.java test fails 8367782: VerifyJarEntryName.java: Fix modifyJarEntryName to operate on bytes and re-introduce verifySignatureEntryName Reviewed-by: sgehwolf, abakhtin Backport-of: bbd5b174c50346152a624317b6bd76ec48f7e551
1 parent 1bfd049 commit 3e41a78

File tree

4 files changed

+323
-0
lines changed

4 files changed

+323
-0
lines changed

src/jdk.jartool/share/classes/sun/security/tools/jarsigner/Main.java

Lines changed: 148 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,8 @@
2828
import java.io.*;
2929
import java.net.UnknownHostException;
3030
import java.net.URLClassLoader;
31+
import java.nio.file.Files;
32+
import java.nio.file.Path;
3133
import java.security.cert.CertPathValidatorException;
3234
import java.security.cert.PKIXBuilderParameters;
3335
import java.security.interfaces.ECKey;
@@ -228,6 +230,8 @@ public static void main(String args[]) throws Exception {
228230
private Throwable chainNotValidatedReason = null;
229231
private Throwable tsaChainNotValidatedReason = null;
230232

233+
private List<String> crossChkWarnings = new ArrayList<>();
234+
231235
PKIXBuilderParameters pkixParameters;
232236
Set<X509Certificate> trustedCerts = new HashSet<>();
233237

@@ -1099,6 +1103,7 @@ void verifyJar(String jarName)
10991103
}
11001104
}
11011105
System.out.println();
1106+
crossCheckEntries(jarName);
11021107

11031108
if (!anySigned) {
11041109
if (disabledAlgFound) {
@@ -1133,6 +1138,143 @@ void verifyJar(String jarName)
11331138
System.exit(1);
11341139
}
11351140

1141+
private void crossCheckEntries(String jarName) throws Exception {
1142+
Set<String> locEntries = new HashSet<>();
1143+
1144+
try (JarFile jarFile = new JarFile(jarName);
1145+
JarInputStream jis = new JarInputStream(
1146+
Files.newInputStream(Path.of(jarName)))) {
1147+
1148+
Manifest cenManifest = jarFile.getManifest();
1149+
Manifest locManifest = jis.getManifest();
1150+
compareManifest(cenManifest, locManifest);
1151+
1152+
JarEntry locEntry;
1153+
while ((locEntry = jis.getNextJarEntry()) != null) {
1154+
String entryName = locEntry.getName();
1155+
locEntries.add(entryName);
1156+
1157+
JarEntry cenEntry = jarFile.getJarEntry(entryName);
1158+
if (cenEntry == null) {
1159+
crossChkWarnings.add(String.format(rb.getString(
1160+
"entry.1.present.when.reading.jarinputstream.but.missing.via.jarfile"),
1161+
entryName));
1162+
continue;
1163+
}
1164+
1165+
try {
1166+
readEntry(jis);
1167+
} catch (SecurityException e) {
1168+
crossChkWarnings.add(String.format(rb.getString(
1169+
"signature.verification.failed.on.entry.1.when.reading.via.jarinputstream"),
1170+
entryName));
1171+
continue;
1172+
}
1173+
1174+
try (InputStream cenInputStream = jarFile.getInputStream(cenEntry)) {
1175+
if (cenInputStream == null) {
1176+
crossChkWarnings.add(String.format(rb.getString(
1177+
"entry.1.present.in.jarfile.but.unreadable"),
1178+
entryName));
1179+
continue;
1180+
} else {
1181+
try {
1182+
readEntry(cenInputStream);
1183+
} catch (SecurityException e) {
1184+
crossChkWarnings.add(String.format(rb.getString(
1185+
"signature.verification.failed.on.entry.1.when.reading.via.jarfile"),
1186+
entryName));
1187+
continue;
1188+
}
1189+
}
1190+
}
1191+
1192+
compareSigners(cenEntry, locEntry);
1193+
}
1194+
1195+
jarFile.stream()
1196+
.map(JarEntry::getName)
1197+
.filter(n -> !locEntries.contains(n) && !n.equals(JarFile.MANIFEST_NAME))
1198+
.forEach(n -> crossChkWarnings.add(String.format(rb.getString(
1199+
"entry.1.present.when.reading.jarfile.but.missing.via.jarinputstream"), n)));
1200+
}
1201+
}
1202+
1203+
private void readEntry(InputStream is) throws IOException {
1204+
is.transferTo(OutputStream.nullOutputStream());
1205+
}
1206+
1207+
private void compareManifest(Manifest cenManifest, Manifest locManifest) {
1208+
if (cenManifest == null) {
1209+
crossChkWarnings.add(rb.getString(
1210+
"manifest.missing.when.reading.jarfile"));
1211+
return;
1212+
}
1213+
if (locManifest == null) {
1214+
crossChkWarnings.add(rb.getString(
1215+
"manifest.missing.when.reading.jarinputstream"));
1216+
return;
1217+
}
1218+
1219+
Attributes cenMainAttrs = cenManifest.getMainAttributes();
1220+
Attributes locMainAttrs = locManifest.getMainAttributes();
1221+
1222+
for (Object key : cenMainAttrs.keySet()) {
1223+
Object cenValue = cenMainAttrs.get(key);
1224+
Object locValue = locMainAttrs.get(key);
1225+
1226+
if (locValue == null) {
1227+
crossChkWarnings.add(String.format(rb.getString(
1228+
"manifest.attribute.1.present.when.reading.jarfile.but.missing.via.jarinputstream"),
1229+
key));
1230+
} else if (!cenValue.equals(locValue)) {
1231+
crossChkWarnings.add(String.format(rb.getString(
1232+
"manifest.attribute.1.differs.jarfile.value.2.jarinputstream.value.3"),
1233+
key, cenValue, locValue));
1234+
}
1235+
}
1236+
1237+
for (Object key : locMainAttrs.keySet()) {
1238+
if (!cenMainAttrs.containsKey(key)) {
1239+
crossChkWarnings.add(String.format(rb.getString(
1240+
"manifest.attribute.1.present.when.reading.jarinputstream.but.missing.via.jarfile"),
1241+
key));
1242+
}
1243+
}
1244+
}
1245+
1246+
private void compareSigners(JarEntry cenEntry, JarEntry locEntry) {
1247+
CodeSigner[] cenSigners = cenEntry.getCodeSigners();
1248+
CodeSigner[] locSigners = locEntry.getCodeSigners();
1249+
1250+
boolean cenHasSigners = cenSigners != null;
1251+
boolean locHasSigners = locSigners != null;
1252+
1253+
if (cenHasSigners && locHasSigners) {
1254+
if (!Arrays.equals(cenSigners, locSigners)) {
1255+
crossChkWarnings.add(String.format(rb.getString(
1256+
"codesigners.different.for.entry.1.when.reading.jarfile.and.jarinputstream"),
1257+
cenEntry.getName()));
1258+
}
1259+
} else if (cenHasSigners) {
1260+
crossChkWarnings.add(String.format(rb.getString(
1261+
"entry.1.is.signed.in.jarfile.but.is.not.signed.in.jarinputstream"),
1262+
cenEntry.getName()));
1263+
} else if (locHasSigners) {
1264+
crossChkWarnings.add(String.format(rb.getString(
1265+
"entry.1.is.signed.in.jarinputstream.but.is.not.signed.in.jarfile"),
1266+
locEntry.getName()));
1267+
}
1268+
}
1269+
1270+
private void displayCrossChkWarnings() {
1271+
System.out.println();
1272+
// First is a summary warning
1273+
System.out.println(rb.getString("jar.contains.internal.inconsistencies.result.in.different.contents.via.jarfile.and.jarinputstream"));
1274+
// each warning message with prefix "- "
1275+
crossChkWarnings.forEach(warning -> System.out.println("- " + warning));
1276+
}
1277+
11361278
private void displayMessagesAndResult(boolean isSigning) {
11371279
String result;
11381280
List<String> errors = new ArrayList<>();
@@ -1359,13 +1501,19 @@ private void displayMessagesAndResult(boolean isSigning) {
13591501
System.out.println(rb.getString("Warning."));
13601502
warnings.forEach(System.out::println);
13611503
}
1504+
if (!crossChkWarnings.isEmpty()) {
1505+
displayCrossChkWarnings();
1506+
}
13621507
} else {
13631508
if (!errors.isEmpty() || !warnings.isEmpty()) {
13641509
System.out.println();
13651510
System.out.println(rb.getString("Warning."));
13661511
errors.forEach(System.out::println);
13671512
warnings.forEach(System.out::println);
13681513
}
1514+
if (!crossChkWarnings.isEmpty()) {
1515+
displayCrossChkWarnings();
1516+
}
13691517
}
13701518

13711519
if (!isSigning && (!errors.isEmpty() || !warnings.isEmpty())) {

src/jdk.jartool/share/classes/sun/security/tools/jarsigner/Resources.java

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -325,6 +325,34 @@ public class Resources extends java.util.ListResourceBundle {
325325
{"Cannot.find.file.", "Cannot find file: "},
326326
{"event.ocsp.check", "Contacting OCSP server at %s ..."},
327327
{"event.crl.check", "Downloading CRL from %s ..."},
328+
{"manifest.missing.when.reading.jarfile",
329+
"Manifest is missing when reading via JarFile"},
330+
{"manifest.missing.when.reading.jarinputstream",
331+
"Manifest is missing when reading via JarInputStream"},
332+
{"manifest.attribute.1.present.when.reading.jarfile.but.missing.via.jarinputstream",
333+
"Manifest main attribute %s is present when reading via JarFile but missing when reading via JarInputStream"},
334+
{"manifest.attribute.1.present.when.reading.jarinputstream.but.missing.via.jarfile",
335+
"Manifest main attribute %s is present when reading via JarInputStream but missing when reading via JarFile"},
336+
{"manifest.attribute.1.differs.jarfile.value.2.jarinputstream.value.3",
337+
"Manifest main attribute %1$s differs: JarFile value = %2$s, JarInputStream value = %3$s"},
338+
{"entry.1.present.when.reading.jarinputstream.but.missing.via.jarfile",
339+
"Entry %s is present when reading via JarInputStream but missing when reading via JarFile"},
340+
{"entry.1.present.when.reading.jarfile.but.missing.via.jarinputstream",
341+
"Entry %s is present when reading via JarFile but missing when reading via JarInputStream"},
342+
{"entry.1.present.in.jarfile.but.unreadable",
343+
"Entry %s is present in JarFile but unreadable"},
344+
{"codesigners.different.for.entry.1.when.reading.jarfile.and.jarinputstream",
345+
"Code signers are different for entry %s when reading from JarFile and JarInputStream"},
346+
{"entry.1.is.signed.in.jarfile.but.is.not.signed.in.jarinputstream",
347+
"Entry %s is signed in JarFile but is not signed in JarInputStream"},
348+
{"entry.1.is.signed.in.jarinputstream.but.is.not.signed.in.jarfile",
349+
"Entry %s is signed in JarInputStream but is not signed in JarFile"},
350+
{"jar.contains.internal.inconsistencies.result.in.different.contents.via.jarfile.and.jarinputstream",
351+
"This JAR file contains internal inconsistencies that may result in different contents when reading via JarFile and JarInputStream:"},
352+
{"signature.verification.failed.on.entry.1.when.reading.via.jarinputstream",
353+
"Signature verification failed on entry %s when reading via JarInputStream"},
354+
{"signature.verification.failed.on.entry.1.when.reading.via.jarfile",
355+
"Signature verification failed on entry %s when reading via JarFile"},
328356
};
329357

330358
/**

src/jdk.jartool/share/man/jarsigner.1

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1208,6 +1208,11 @@ months.
12081208
hasExpiringTsaCert
12091209
The timestamp will expire within one year on \f[V]YYYY-MM-DD\f[R].
12101210
.TP
1211+
internalInconsistenciesDetected
1212+
This JAR contains internal inconsistencies detected during verification
1213+
that may result in different contents when reading via JarFile
1214+
and JarInputStream.
1215+
.TP
12111216
legacyAlg
12121217
An algorithm used is considered a security risk but not disabled.
12131218
.TP
Lines changed: 142 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,142 @@
1+
/*
2+
* Copyright (c) 2025, Oracle and/or its affiliates. All rights reserved.
3+
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4+
*
5+
* This code is free software; you can redistribute it and/or modify it
6+
* under the terms of the GNU General Public License version 2 only, as
7+
* published by the Free Software Foundation.
8+
*
9+
* This code is distributed in the hope that it will be useful, but WITHOUT
10+
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11+
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12+
* version 2 for more details (a copy is included in the LICENSE file that
13+
* accompanied this code).
14+
*
15+
* You should have received a copy of the GNU General Public License version
16+
* 2 along with this work; if not, write to the Free Software Foundation,
17+
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18+
*
19+
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
20+
* or visit www.oracle.com if you need additional information or have any
21+
* questions.
22+
*/
23+
24+
/*
25+
* @test
26+
* @bug 8339280
27+
* @summary Test that jarsigner -verify emits a warning when the filename of
28+
* an entry in the LOC is changed
29+
* @library /test/lib
30+
* @run junit VerifyJarEntryName
31+
*/
32+
33+
import org.junit.jupiter.api.BeforeAll;
34+
import org.junit.jupiter.api.BeforeEach;
35+
import org.junit.jupiter.api.Test;
36+
37+
import java.io.FileOutputStream;
38+
import java.nio.charset.StandardCharsets;
39+
import java.nio.file.Files;
40+
import java.nio.file.Path;
41+
import java.util.Arrays;
42+
import java.util.jar.JarFile;
43+
import java.util.zip.ZipEntry;
44+
import java.util.zip.ZipOutputStream;
45+
46+
import jdk.test.lib.SecurityTools;
47+
import static org.junit.jupiter.api.Assertions.fail;
48+
49+
public class VerifyJarEntryName {
50+
51+
private static final Path ORIGINAL_JAR = Path.of("test.jar");
52+
private static final Path MODIFIED_JAR = Path.of("modified_test.jar");
53+
54+
@BeforeAll
55+
static void setup() throws Exception {
56+
try (FileOutputStream fos = new FileOutputStream(ORIGINAL_JAR.toFile());
57+
ZipOutputStream zos = new ZipOutputStream(fos)) {
58+
zos.putNextEntry(new ZipEntry(JarFile.MANIFEST_NAME));
59+
zos.write("Manifest-Version: 1.0\nCreated-By: Test\n".
60+
getBytes(StandardCharsets.UTF_8));
61+
zos.closeEntry();
62+
63+
// Add hello.txt file
64+
ZipEntry textEntry = new ZipEntry("hello.txt");
65+
zos.putNextEntry(textEntry);
66+
zos.write("hello".getBytes(StandardCharsets.UTF_8));
67+
zos.closeEntry();
68+
}
69+
70+
SecurityTools.keytool("-genkeypair -keystore ks -storepass changeit "
71+
+ "-alias mykey -keyalg rsa -dname CN=me ");
72+
73+
SecurityTools.jarsigner("-keystore ks -storepass changeit "
74+
+ ORIGINAL_JAR + " mykey")
75+
.shouldHaveExitValue(0);
76+
}
77+
78+
@BeforeEach
79+
void cleanup() throws Exception {
80+
Files.deleteIfExists(MODIFIED_JAR);
81+
}
82+
83+
/*
84+
* Modify a single byte in "MANIFEST.MF" filename in LOC, and
85+
* validate that jarsigner -verify emits a warning message.
86+
*/
87+
@Test
88+
void verifyManifestEntryName() throws Exception {
89+
modifyJarEntryName(ORIGINAL_JAR, MODIFIED_JAR, "META-INF/MANIFEST.MF");
90+
SecurityTools.jarsigner("-verify -verbose " + MODIFIED_JAR)
91+
.shouldContain("This JAR file contains internal " +
92+
"inconsistencies that may result in different " +
93+
"contents when reading via JarFile and JarInputStream:")
94+
.shouldContain("- Manifest is missing when " +
95+
"reading via JarInputStream")
96+
.shouldHaveExitValue(0);
97+
}
98+
99+
/*
100+
* Modify a single byte in signature filename in LOC, and
101+
* validate that jarsigner -verify emits a warning message.
102+
*/
103+
@Test
104+
void verifySignatureEntryName() throws Exception {
105+
modifyJarEntryName(ORIGINAL_JAR, MODIFIED_JAR, "META-INF/MYKEY.SF");
106+
SecurityTools.jarsigner("-verify -verbose " + MODIFIED_JAR)
107+
.shouldContain("This JAR file contains internal " +
108+
"inconsistencies that may result in different " +
109+
"contents when reading via JarFile and JarInputStream:")
110+
.shouldContain("- Entry XETA-INF/MYKEY.SF is present when reading " +
111+
"via JarInputStream but missing when reading via JarFile")
112+
.shouldHaveExitValue(0);
113+
}
114+
115+
/*
116+
* Validate that jarsigner -verify on a valid JAR works without
117+
* emitting warnings about internal inconsistencies.
118+
*/
119+
@Test
120+
void verifyOriginalJar() throws Exception {
121+
SecurityTools.jarsigner("-verify -verbose " + ORIGINAL_JAR)
122+
.shouldNotContain("This JAR file contains internal " +
123+
"inconsistencies that may result in different contents when " +
124+
"reading via JarFile and JarInputStream:")
125+
.shouldHaveExitValue(0);
126+
}
127+
128+
private void modifyJarEntryName(Path origJar, Path modifiedJar,
129+
String entryName) throws Exception {
130+
byte[] jarBytes = Files.readAllBytes(origJar);
131+
byte[] entryNameBytes = entryName.getBytes(StandardCharsets.UTF_8);
132+
int pos = 0;
133+
try {
134+
while (!Arrays.equals(jarBytes, pos, pos + entryNameBytes.length,
135+
entryNameBytes, 0, entryNameBytes.length)) pos++;
136+
} catch (ArrayIndexOutOfBoundsException ignore) {
137+
fail(entryName + " is not present in the JAR");
138+
}
139+
jarBytes[pos] = 'X';
140+
Files.write(modifiedJar, jarBytes);
141+
}
142+
}

0 commit comments

Comments
 (0)