/*
- * Copyright 2001-2006 Internet2
+ * Copyright 2001-2007 Internet2
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
#include "internal.h"
#include "exceptions.h"
-#include "RootObject.h"
#include "binding/MessageFlowRule.h"
-#include <xmltooling/util/NDC.h>
-#include <xmltooling/util/ReplayCache.h>
#include <log4cpp/Category.hh>
+#include <xmltooling/util/ReplayCache.h>
+#include <xercesc/util/XMLUniDefs.hpp>
using namespace opensaml;
using namespace xmltooling;
}
}
-pair<saml2::Issuer*,const saml2md::RoleDescriptor*> MessageFlowRule::evaluate(
- const GenericRequest& request,
- const XMLObject& message,
- const saml2md::MetadataProvider* metadataProvider,
- const QName* role,
- const opensaml::TrustEngine* trustEngine
- ) const
-{
- try {
- const RootObject& obj = dynamic_cast<const RootObject&>(message);
- check(obj.getID(), obj.getIssueInstantEpoch());
- }
- catch (bad_cast&) {
- throw BindingException("Message was not of a recognized SAML root type.");
- }
- return pair<saml2::Issuer*,const saml2md::RoleDescriptor*>(NULL,NULL);
-}
-
-void MessageFlowRule::check(const XMLCh* id, time_t issueInstant) const
+void MessageFlowRule::evaluate(const XMLObject& message, const GenericRequest* request, SecurityPolicy& policy) const
{
Category& log=Category::getInstance(SAML_LOGCAT".SecurityPolicyRule.MessageFlow");
log.debug("evaluating message flow policy (replay checking %s, expiration %lu)", m_checkReplay ? "on" : "off", m_expires);
-
- time_t skew = XMLToolingConfig::getConfig().clock_skew_secs;
+
time_t now = time(NULL);
- if (issueInstant > now + skew) {
- log.error("rejected not-yet-valid message, timestamp (%lu), now (%lu)", issueInstant, now + skew);
- throw BindingException("Message rejected, was issued in the future.");
+ time_t skew = XMLToolingConfig::getConfig().clock_skew_secs;
+ time_t issueInstant = policy.getIssueInstant();
+ if (issueInstant == 0) {
+ log.info("unknown message timestamp, assuming current time for replay checking");
+ issueInstant = now;
}
- else if (issueInstant < now - skew - m_expires) {
- log.error("rejected expired message, timestamp (%lu), oldest allowed (%lu)", issueInstant, now - skew - m_expires);
- throw BindingException("Message expired, was issued too long ago.");
+ else {
+ if (issueInstant > now + skew) {
+ log.errorStream() << "rejected not-yet-valid message, timestamp (" << issueInstant <<
+ "), newest allowed (" << now + skew << ")" << CategoryStream::ENDLINE;
+ throw BindingException("Message rejected, was issued in the future.");
+ }
+ else if (issueInstant < now - skew - m_expires) {
+ log.errorStream() << "rejected expired message, timestamp (" << issueInstant <<
+ "), oldest allowed (" << (now - skew - m_expires) << ")" << CategoryStream::ENDLINE;
+ throw BindingException("Message expired, was issued too long ago.");
+ }
}
// Check replay.
if (m_checkReplay) {
+ const XMLCh* id = policy.getMessageID();
+ if (!id || !*id) {
+ log.info("unknown message ID, no replay check possible");
+ return;
+ }
ReplayCache* replayCache = XMLToolingConfig::getConfig().getReplayCache();
if (!replayCache)
- throw BindingException("No ReplayCache instance available.");
- else if (!id)
- throw BindingException("Message did not contain an identifier.");
- auto_ptr_char temp(id);
- if (!replayCache->check("SAML", temp.get(), issueInstant + skew + m_expires)) {
+ throw BindingException("Message rejected, no ReplayCache instance available.");
+ auto_ptr_char temp(id);
+ if (!replayCache->check("MessageFlow", temp.get(), issueInstant + skew + m_expires)) {
log.error("replay detected of message ID (%s)", temp.get());
throw BindingException("Rejecting replayed message ID ($1).", params(1,temp.get()));
}