[color=blue]功能:1) 客户端首先必须以普通连接方式连接连接服务器
2) 服务器接收到连接后,通知客户端启用TLS/SSL方式连接
3) 双方都启用成功后,通过数据加密方式完成信息的通信
备注: TLS/SSL 实现是基于 MINA 的官方例子
地址: http://mina.apache.org/ [/color]
[color=darkred]客户端和服务器端通信内容:[/color]
[color=violet]客户端:HELLO[/color]
[color=green]服务器:Hello SSL[/color]
[color=violet]客户端:Client SSL Finished[/color]
[color=green]服务器:Server SSL Finished[/color]
[color=violet]客户端:信息安全吗?[/color]
[color=green]服务器:信息安全![/color]
[color=violet]客户端:lawless command[/color][color=orange](非法的命令)[/color]
[color=green]服务器:No Support Command[/color][color=orange](服务器响应不支持此命令)[/color]
服务器端代码:
[color=darkred]客户端代码:[/color]
[color=darkred]创建 KEY 文件指令:[/color]keytool -genkey -alias bogus -keysize 512 -validity 3650 -keyalg RSA -dname "CN=bogus.com, OU=XXX CA,O=Bogus Inc, L=Stockholm, S=Stockholm, C=SE" -keypass boguspw -storepass boguspw -keystore bogus.cert[color=orange]
(在 Java 源文件 BogusSslContextFactory.java 中也有,是官方的)[/color]
2) 服务器接收到连接后,通知客户端启用TLS/SSL方式连接
3) 双方都启用成功后,通过数据加密方式完成信息的通信
备注: TLS/SSL 实现是基于 MINA 的官方例子
地址: http://mina.apache.org/ [/color]
[color=darkred]客户端和服务器端通信内容:[/color]
[color=violet]客户端:HELLO[/color]
[color=green]服务器:Hello SSL[/color]
[color=violet]客户端:Client SSL Finished[/color]
[color=green]服务器:Server SSL Finished[/color]
[color=violet]客户端:信息安全吗?[/color]
[color=green]服务器:信息安全![/color]
[color=violet]客户端:lawless command[/color][color=orange](非法的命令)[/color]
[color=green]服务器:No Support Command[/color][color=orange](服务器响应不支持此命令)[/color]
服务器端代码:
package com.sariel.tls.server;
import java.net.InetSocketAddress;
import java.nio.charset.Charset;
import org.apache.mina.core.filterchain.DefaultIoFilterChainBuilder;
import org.apache.mina.filter.codec.ProtocolCodecFilter;
import org.apache.mina.filter.codec.textline.TextLineCodecFactory;
import org.apache.mina.transport.socket.SocketAcceptor;
import org.apache.mina.transport.socket.nio.NioSocketAcceptor;
public class TempTLSServer {
private static final int PORT = 50003;
public static void main(String[] args) throws Exception {
/** 创建服务器端连接器 **/
SocketAcceptor acceptor = new NioSocketAcceptor();
acceptor.setReuseAddress(true);
/** 获取默认过滤器 **/
DefaultIoFilterChainBuilder chain = acceptor.getFilterChain();
/** 设置编码过滤器和按行读取数据模式 **/
chain.addLast("codec", new ProtocolCodecFilter(new TextLineCodecFactory(Charset.forName("UTF-8"))));
/** 设置事件处理器 **/
acceptor.setHandler(new TempTLSServerHandler());
/** 服务绑定到此端口号 **/
acceptor.bind(new InetSocketAddress(PORT));
System.out.println("服务器在 [" + PORT + "] 等待连接...");
}
}
package com.sariel.tls.server;
import org.apache.mina.core.service.IoHandlerAdapter;
import org.apache.mina.core.session.IdleStatus;
import org.apache.mina.core.session.IoSession;
import org.apache.mina.filter.ssl.SslFilter;
import org.apache.mina.filter.ssl.SslFilter.SslFilterMessage;
import com.sariel.tls.BogusSslContextFactory;
public class TempTLSServerHandler extends IoHandlerAdapter {
public void sessionCreated(IoSession session) throws Exception {
System.out.println("[NIO Server]>> sessionCreated");
/** 启用加密过滤通知 **/
session.setAttribute(SslFilter.USE_NOTIFICATION);
}
public void sessionOpened(IoSession session) throws Exception {
System.out.println("[NIO Server]>> sessionOpened");
}
public void sessionClosed(IoSession session) throws Exception {
System.out.println("[NIO Server]>> sessionClosed");
}
public void sessionIdle(IoSession session, IdleStatus status) throws Exception {
System.out.println("[NIO Server]>> sessionIdle");
}
public void exceptionCaught(IoSession session, Throwable cause) throws Exception {
System.out.println("[NIO Server]>> exceptionCaught :");
cause.printStackTrace();
}
public void messageReceived(IoSession session, Object message) throws Exception {
System.out.println("[NIO Server]>> messageReceived");
String msg = "";
if (message instanceof SslFilterMessage) {
msg = ((SslFilterMessage) message).toString();
} else {
msg = (String) message;
}
System.out.println("[NIO Server Received]>> : " + msg);
if ("Hello".equalsIgnoreCase(msg)) {
session.write("Hello SSL");
} else if ("Client SSL Finished".equalsIgnoreCase(msg)) {
session.getFilterChain().addFirst("SSL", new SslFilter(BogusSslContextFactory.getInstance(true)));
// ((SslFilter)session.getFilterChain().get("SSL")).startSsl(session);
session.write("Server SSL Finished");
} else if ("信息安全吗?".equals(msg)) {
session.write("信息安全!");
} else {
session.write("No Support Command");
}
}
public void messageSent(IoSession session, Object message) throws Exception {
System.out.println("[NIO Server]>> messageSent");
System.out.println("[NIO Server messageSent]>> : " + (String) message);
}
}
[color=darkred]客户端代码:[/color]
package com.sariel.tls.client;
import java.net.InetSocketAddress;
import java.nio.charset.Charset;
import java.security.GeneralSecurityException;
import org.apache.mina.core.future.ConnectFuture;
import org.apache.mina.core.service.IoConnector;
import org.apache.mina.core.session.IoSession;
import org.apache.mina.filter.codec.ProtocolCodecFilter;
import org.apache.mina.filter.codec.textline.TextLineCodecFactory;
import org.apache.mina.transport.socket.nio.NioSocketConnector;
public class TempTLSClient {
private static final int PORT = 50003;
private static final String TARGET_IP = "192.168.12.41";
public static void main(String[] args) throws GeneralSecurityException {
/** 创建客户端连接器 **/
IoConnector connector = new NioSocketConnector();
/** 设置事件处理器 **/
connector.setHandler(new TempTLSClientHandler());
/** 设置编码过滤器和按行读取数据模式 **/
connector.getFilterChain().addLast("codec", new ProtocolCodecFilter(new TextLineCodecFactory(Charset.forName("UTF-8"))));
/** 创建连接 **/
ConnectFuture future = connector.connect(new InetSocketAddress(TARGET_IP, PORT));
/** 等待连接创建完成 **/
future.awaitUninterruptibly();
/** 获取连接会话 **/
IoSession session = future.getSession();
/** 发送信息 **/
session.write("HELLO");
/** 等待连接断开 **/
session.getCloseFuture().awaitUninterruptibly();
connector.dispose();
}
}
package com.sariel.tls.client;
import org.apache.mina.core.service.IoHandlerAdapter;
import org.apache.mina.core.session.IdleStatus;
import org.apache.mina.core.session.IoSession;
import org.apache.mina.filter.ssl.SslFilter;
import com.sariel.tls.BogusSslContextFactory;
public class TempTLSClientHandler extends IoHandlerAdapter {
public void sessionCreated(IoSession session) throws Exception {
System.out.println("[NIO Client]>> sessionCreated");
}
public void sessionOpened(IoSession session) throws Exception {
System.out.println("[NIO Client]>> sessionOpened");
}
public void sessionClosed(IoSession session) throws Exception {
System.out.println("[NIO Client]>> sessionClosed");
}
public void sessionIdle(IoSession session, IdleStatus status) throws Exception {
System.out.println("[NIO Client]>> sessionIdle");
}
public void exceptionCaught(IoSession session, Throwable cause) throws Exception {
System.out.println("[NIO Client]>> exceptionCaught :");
cause.printStackTrace();
}
public void messageReceived(IoSession session, Object message) throws Exception {
System.out.println("[NIO Client]>> messageReceived");
System.out.println("[NIO Client Received]>>" + (String) message);
if ("Hello SSL".equals((String) message)) {
session.write("Client SSL Finished");
} else if ("Server SSL Finished".equals((String) message)) {
session.write("信息安全吗?");
} else if ("信息安全!".equals((String) message)) {
session.write("lawless command");
}
}
public void messageSent(IoSession session, Object message) throws Exception {
System.out.println("[NIO Client]>> messageSent");
System.out.println("[NIO Client messageSent]>> : " + (String) message);
if ("Client SSL Finished".equals((String) message)) {
SslFilter connectorTLSFilter = new SslFilter(BogusSslContextFactory.getInstance(false));
connectorTLSFilter.setUseClientMode(true);
session.getFilterChain().addFirst("SSL", connectorTLSFilter);
// ((SslFilter)session.getFilterChain().get("SSL")).startSsl(session);
}
}
}
[color=darkred]创建 KEY 文件指令:[/color]keytool -genkey -alias bogus -keysize 512 -validity 3650 -keyalg RSA -dname "CN=bogus.com, OU=XXX CA,O=Bogus Inc, L=Stockholm, S=Stockholm, C=SE" -keypass boguspw -storepass boguspw -keystore bogus.cert[color=orange]
(在 Java 源文件 BogusSslContextFactory.java 中也有,是官方的)[/color]
本文介绍了一个基于Apache Mina实现的TLS/SSL安全通信示例,包括客户端和服务端的交互过程,从普通连接升级为加密连接,并完成数据的安全交换。
1980

被折叠的 条评论
为什么被折叠?



