Adds support for always-on VPN profiles, also called "lockdown." When enabled, LockdownVpnTracker manages the netd firewall to prevent unencrypted traffic from leaving the device. It creates narrow rules to only allow traffic to the selected VPN server. When an egress network becomes available, LockdownVpnTracker will try bringing up the VPN connection, and will reconnect if disconnected. ConnectivityService augments any NetworkInfo based on the lockdown VPN status to help apps wait until the VPN is connected. This feature requires that VPN profiles use an IP address for both VPN server and DNS. It also blocks non-default APN access when enabled. Waits for USER_PRESENT after boot to check KeyStore status. Bug: 5756357 Change-Id: If615f206b1634000d78a8350a17e88bfcac8e0d0
220 lines
7.4 KiB
Java
220 lines
7.4 KiB
Java
/*
|
|
* Copyright (C) 2009 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
package android.security;
|
|
|
|
import android.content.ActivityNotFoundException;
|
|
import android.content.Context;
|
|
import android.content.Intent;
|
|
import android.util.Log;
|
|
import com.android.org.bouncycastle.openssl.PEMReader;
|
|
import com.android.org.bouncycastle.openssl.PEMWriter;
|
|
import java.io.ByteArrayInputStream;
|
|
import java.io.ByteArrayOutputStream;
|
|
import java.io.IOException;
|
|
import java.io.InputStreamReader;
|
|
import java.io.ObjectOutputStream;
|
|
import java.io.OutputStreamWriter;
|
|
import java.io.Reader;
|
|
import java.io.Writer;
|
|
import java.nio.charset.Charsets;
|
|
import java.security.KeyPair;
|
|
import java.security.cert.X509Certificate;
|
|
import java.util.ArrayList;
|
|
import java.util.List;
|
|
|
|
/**
|
|
* {@hide}
|
|
*/
|
|
public class Credentials {
|
|
private static final String LOGTAG = "Credentials";
|
|
|
|
public static final String INSTALL_ACTION = "android.credentials.INSTALL";
|
|
|
|
public static final String UNLOCK_ACTION = "com.android.credentials.UNLOCK";
|
|
|
|
/** Key prefix for CA certificates. */
|
|
public static final String CA_CERTIFICATE = "CACERT_";
|
|
|
|
/** Key prefix for user certificates. */
|
|
public static final String USER_CERTIFICATE = "USRCERT_";
|
|
|
|
/** Key prefix for user private keys. */
|
|
public static final String USER_PRIVATE_KEY = "USRPKEY_";
|
|
|
|
/** Key prefix for VPN. */
|
|
public static final String VPN = "VPN_";
|
|
|
|
/** Key prefix for WIFI. */
|
|
public static final String WIFI = "WIFI_";
|
|
|
|
/** Key containing suffix of lockdown VPN profile. */
|
|
public static final String LOCKDOWN_VPN = "LOCKDOWN_VPN";
|
|
|
|
/** Data type for public keys. */
|
|
public static final String EXTRA_PUBLIC_KEY = "KEY";
|
|
|
|
/** Data type for private keys. */
|
|
public static final String EXTRA_PRIVATE_KEY = "PKEY";
|
|
|
|
// historically used by Android
|
|
public static final String EXTENSION_CRT = ".crt";
|
|
public static final String EXTENSION_P12 = ".p12";
|
|
// commonly used on Windows
|
|
public static final String EXTENSION_CER = ".cer";
|
|
public static final String EXTENSION_PFX = ".pfx";
|
|
|
|
/**
|
|
* Intent extra: name for the user's private key.
|
|
*/
|
|
public static final String EXTRA_USER_PRIVATE_KEY_NAME = "user_private_key_name";
|
|
|
|
/**
|
|
* Intent extra: data for the user's private key in PEM-encoded PKCS#8.
|
|
*/
|
|
public static final String EXTRA_USER_PRIVATE_KEY_DATA = "user_private_key_data";
|
|
|
|
/**
|
|
* Intent extra: name for the user's certificate.
|
|
*/
|
|
public static final String EXTRA_USER_CERTIFICATE_NAME = "user_certificate_name";
|
|
|
|
/**
|
|
* Intent extra: data for the user's certificate in PEM-encoded X.509.
|
|
*/
|
|
public static final String EXTRA_USER_CERTIFICATE_DATA = "user_certificate_data";
|
|
|
|
/**
|
|
* Intent extra: name for CA certificate chain
|
|
*/
|
|
public static final String EXTRA_CA_CERTIFICATES_NAME = "ca_certificates_name";
|
|
|
|
/**
|
|
* Intent extra: data for CA certificate chain in PEM-encoded X.509.
|
|
*/
|
|
public static final String EXTRA_CA_CERTIFICATES_DATA = "ca_certificates_data";
|
|
|
|
/**
|
|
* Convert objects to a PEM format, which is used for
|
|
* CA_CERTIFICATE, USER_CERTIFICATE, and USER_PRIVATE_KEY
|
|
* entries.
|
|
*/
|
|
public static byte[] convertToPem(Object... objects) throws IOException {
|
|
ByteArrayOutputStream bao = new ByteArrayOutputStream();
|
|
Writer writer = new OutputStreamWriter(bao, Charsets.US_ASCII);
|
|
PEMWriter pw = new PEMWriter(writer);
|
|
for (Object o : objects) {
|
|
pw.writeObject(o);
|
|
}
|
|
pw.close();
|
|
return bao.toByteArray();
|
|
}
|
|
/**
|
|
* Convert objects from PEM format, which is used for
|
|
* CA_CERTIFICATE, USER_CERTIFICATE, and USER_PRIVATE_KEY
|
|
* entries.
|
|
*/
|
|
public static List<Object> convertFromPem(byte[] bytes) throws IOException {
|
|
ByteArrayInputStream bai = new ByteArrayInputStream(bytes);
|
|
Reader reader = new InputStreamReader(bai, Charsets.US_ASCII);
|
|
PEMReader pr = new PEMReader(reader);
|
|
|
|
List<Object> result = new ArrayList<Object>();
|
|
Object o;
|
|
while ((o = pr.readObject()) != null) {
|
|
result.add(o);
|
|
}
|
|
pr.close();
|
|
return result;
|
|
}
|
|
|
|
private static Credentials singleton;
|
|
|
|
public static Credentials getInstance() {
|
|
if (singleton == null) {
|
|
singleton = new Credentials();
|
|
}
|
|
return singleton;
|
|
}
|
|
|
|
public void unlock(Context context) {
|
|
try {
|
|
Intent intent = new Intent(UNLOCK_ACTION);
|
|
context.startActivity(intent);
|
|
} catch (ActivityNotFoundException e) {
|
|
Log.w(LOGTAG, e.toString());
|
|
}
|
|
}
|
|
|
|
public void install(Context context) {
|
|
try {
|
|
Intent intent = KeyChain.createInstallIntent();
|
|
context.startActivity(intent);
|
|
} catch (ActivityNotFoundException e) {
|
|
Log.w(LOGTAG, e.toString());
|
|
}
|
|
}
|
|
|
|
public void install(Context context, KeyPair pair) {
|
|
try {
|
|
Intent intent = KeyChain.createInstallIntent();
|
|
intent.putExtra(EXTRA_PRIVATE_KEY, pair.getPrivate().getEncoded());
|
|
intent.putExtra(EXTRA_PUBLIC_KEY, pair.getPublic().getEncoded());
|
|
context.startActivity(intent);
|
|
} catch (ActivityNotFoundException e) {
|
|
Log.w(LOGTAG, e.toString());
|
|
}
|
|
}
|
|
|
|
public void install(Context context, String type, byte[] value) {
|
|
try {
|
|
Intent intent = KeyChain.createInstallIntent();
|
|
intent.putExtra(type, value);
|
|
context.startActivity(intent);
|
|
} catch (ActivityNotFoundException e) {
|
|
Log.w(LOGTAG, e.toString());
|
|
}
|
|
}
|
|
|
|
/**
|
|
* Delete all types (private key, certificate, CA certificate) for a
|
|
* particular {@code alias}. All three can exist for any given alias.
|
|
* Returns {@code true} if there was at least one of those types.
|
|
*/
|
|
static boolean deleteAllTypesForAlias(KeyStore keystore, String alias) {
|
|
/*
|
|
* Make sure every type is deleted. There can be all three types, so
|
|
* don't use a conditional here.
|
|
*/
|
|
return keystore.delKey(Credentials.USER_PRIVATE_KEY + alias)
|
|
| deleteCertificateTypesForAlias(keystore, alias);
|
|
}
|
|
|
|
/**
|
|
* Delete all types (private key, certificate, CA certificate) for a
|
|
* particular {@code alias}. All three can exist for any given alias.
|
|
* Returns {@code true} if there was at least one of those types.
|
|
*/
|
|
static boolean deleteCertificateTypesForAlias(KeyStore keystore, String alias) {
|
|
/*
|
|
* Make sure every certificate type is deleted. There can be two types,
|
|
* so don't use a conditional here.
|
|
*/
|
|
return keystore.delete(Credentials.USER_CERTIFICATE + alias)
|
|
| keystore.delete(Credentials.CA_CERTIFICATE + alias);
|
|
}
|
|
}
|