Skip to content

Commit 581ed18

Browse files
authored
Merge pull request #3833 from katzyn/password
Disallow plain webAdminPassword values to force usage of hashes
2 parents 578cb6d + 23ee3d0 commit 581ed18

File tree

7 files changed

+68
-16
lines changed

7 files changed

+68
-16
lines changed

h2/src/docsrc/html/tutorial.html

+3-1
Original file line numberDiff line numberDiff line change
@@ -443,7 +443,9 @@ <h2 id="console_settings">Settings of the H2 Console</h2>
443443
<ul><li><code>webAllowOthers</code>: allow other computers to connect.
444444
</li><li><code>webPort</code>: the port of the H2 Console
445445
</li><li><code>webSSL</code>: use encrypted TLS (HTTPS) connections.
446-
</li><li><code>webAdminPassword</code>: password to access preferences and tools of H2 Console.
446+
</li><li><code>webAdminPassword</code>: hash of password to access preferences and tools of H2 Console,
447+
use <code>org.h2.server.web.WebServer.encodeAdminPassword(String)</code> to generate a hash for your password.
448+
Always use long complex passwords, especially when access from other hosts is enabled.
447449
</li></ul>
448450
<p>
449451
In addition to those settings, the properties of the last recently used connection

h2/src/main/org/h2/api/ErrorCode.java

+2-3
Original file line numberDiff line numberDiff line change
@@ -1890,9 +1890,8 @@ public class ErrorCode {
18901890
/**
18911891
* The error with code <code>90125</code> is thrown when
18921892
* PreparedStatement.setBigDecimal is called with object that extends the
1893-
* class BigDecimal, and the system property h2.allowBigDecimalExtensions is
1894-
* not set. Using extensions of BigDecimal is dangerous because the database
1895-
* relies on the behavior of BigDecimal. Example of wrong usage:
1893+
* class BigDecimal. Using extensions of BigDecimal is dangerous because the
1894+
* database relies on the behavior of BigDecimal. Example of wrong usage:
18961895
* <pre>
18971896
* BigDecimal bd = new MyDecimal("$10.3");
18981897
* prep.setBigDecimal(1, bd);

h2/src/main/org/h2/engine/Constants.java

+5
Original file line numberDiff line numberDiff line change
@@ -472,6 +472,11 @@ public class Constants {
472472
*/
473473
public static final int QUERY_STATISTICS_MAX_ENTRIES = 100;
474474

475+
/**
476+
* The minimum number of characters in web admin password.
477+
*/
478+
public static final int MIN_WEB_ADMIN_PASSWORD_LENGTH = 12;
479+
475480
/**
476481
* Announced version for PgServer.
477482
*/

h2/src/main/org/h2/server/web/WebServer.java

+22-7
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ public class WebServer implements Service {
162162
private String externalNames;
163163
private boolean isDaemon;
164164
private final Set<WebThread> running =
165-
Collections.synchronizedSet(new HashSet<WebThread>());
165+
Collections.synchronizedSet(new HashSet<>());
166166
private boolean ssl;
167167
private byte[] adminPassword;
168168
private final HashMap<String, ConnectionInfo> connInfoMap = new HashMap<>();
@@ -926,17 +926,32 @@ void setAdminPassword(String password) {
926926
adminPassword = null;
927927
return;
928928
}
929-
if (password.length() == 128) {
930-
try {
931-
adminPassword = StringUtils.convertHexToBytes(password);
932-
return;
933-
} catch (Exception ex) {}
929+
if (password.length() != 128) {
930+
throw new IllegalArgumentException(
931+
"Use result of org.h2.server.web.WebServer.encodeAdminPassword(String)");
932+
}
933+
adminPassword = StringUtils.convertHexToBytes(password);
934+
}
935+
936+
/**
937+
* Generates a random salt and returns it with a hash of specified password
938+
* with this salt.
939+
*
940+
* @param password
941+
* the password
942+
* @return a salt and hash of salted password as a hex encoded string to be
943+
* used in configuration file
944+
* @throws IllegalArgumentException when password is too short
945+
*/
946+
public static String encodeAdminPassword(String password) {
947+
if (password.length() < Constants.MIN_WEB_ADMIN_PASSWORD_LENGTH) {
948+
throw new IllegalArgumentException("Min length: " + Constants.MIN_WEB_ADMIN_PASSWORD_LENGTH);
934949
}
935950
byte[] salt = MathUtils.secureRandomBytes(32);
936951
byte[] hash = SHA256.getHashWithSalt(password.getBytes(StandardCharsets.UTF_8), salt);
937952
byte[] total = Arrays.copyOf(salt, 64);
938953
System.arraycopy(hash, 0, total, 32, 32);
939-
adminPassword = total;
954+
return StringUtils.convertBytesToHex(total);
940955
}
941956

942957
/**

h2/src/main/org/h2/tools/Server.java

+15-2
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,7 @@ public class Server extends Tool implements Runnable, ShutdownHandler {
2929
private final Service service;
3030
private Server web, tcp, pg;
3131
private ShutdownHandler shutdownHandler;
32+
private boolean fromCommandLine;
3233
private boolean started;
3334

3435
public Server() {
@@ -75,7 +76,11 @@ public Server(Service service, String... args) throws SQLException {
7576
* <tr><td>[-webSSL]</td>
7677
* <td>Use encrypted (HTTPS) connections</td></tr>
7778
* <tr><td>[-webAdminPassword]</td>
78-
* <td>Password of DB Console administrator</td></tr>
79+
* <td>Hash of password of DB Console administrator, can be generated with
80+
* {@linkplain WebServer#encodeAdminPassword(String)}. Can be passed only to
81+
* the {@link #runTool(String...)} method, this method rejects it. It is
82+
* also possible to store this setting in configuration file of H2
83+
* Console.</td></tr>
7984
* <tr><td>[-browser]</td>
8085
* <td>Start a browser connecting to the web server</td></tr>
8186
* <tr><td>[-tcp]</td>
@@ -123,7 +128,9 @@ public Server(Service service, String... args) throws SQLException {
123128
* @throws SQLException on failure
124129
*/
125130
public static void main(String... args) throws SQLException {
126-
new Server().runTool(args);
131+
Server server = new Server();
132+
server.fromCommandLine = true;
133+
server.runTool(args);
127134
}
128135

129136
private void verifyArgs(String... args) throws SQLException {
@@ -146,6 +153,9 @@ private void verifyArgs(String... args) throws SQLException {
146153
} else if ("-webPort".equals(arg)) {
147154
i++;
148155
} else if ("-webAdminPassword".equals(arg)) {
156+
if (fromCommandLine) {
157+
throwUnsupportedOption(arg);
158+
}
149159
i++;
150160
} else {
151161
throwUnsupportedOption(arg);
@@ -249,6 +259,9 @@ public void runTool(String... args) throws SQLException {
249259
} else if ("-webPort".equals(arg)) {
250260
i++;
251261
} else if ("-webAdminPassword".equals(arg)) {
262+
if (fromCommandLine) {
263+
throwUnsupportedOption(arg);
264+
}
252265
i++;
253266
} else {
254267
showUsageAndThrowUnsupportedOption(arg);

h2/src/test/org/h2/test/server/TestWeb.java

+20-2
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,9 @@
4242
import org.h2.api.ErrorCode;
4343
import org.h2.engine.Constants;
4444
import org.h2.engine.SysProperties;
45+
import org.h2.jdbc.JdbcSQLFeatureNotSupportedException;
46+
import org.h2.jdbc.JdbcSQLNonTransientException;
47+
import org.h2.server.web.WebServer;
4548
import org.h2.server.web.WebServlet;
4649
import org.h2.store.fs.FileUtils;
4750
import org.h2.test.TestBase;
@@ -159,18 +162,33 @@ private void testTools() throws Exception {
159162
conn.createStatement().execute(
160163
"create table test(id int) as select 1");
161164
conn.close();
165+
String hash = WebServer.encodeAdminPassword("1234567890AB");
166+
try {
167+
Server.main("-web", "-webPort", "8182",
168+
"-properties", "null", "-tcp", "-tcpPort", "9101", "-webAdminPassword", hash);
169+
fail("Expected exception");
170+
} catch (JdbcSQLFeatureNotSupportedException e) {
171+
// Expected
172+
}
162173
Server server = new Server();
163174
server.setOut(new PrintStream(new ByteArrayOutputStream()));
175+
try {
176+
server.runTool("-web", "-webPort", "8182",
177+
"-properties", "null", "-tcp", "-tcpPort", "9101", "-webAdminPassword", "123");
178+
fail("Expected exception");
179+
} catch (JdbcSQLNonTransientException e) {
180+
// Expected
181+
}
164182
server.runTool("-web", "-webPort", "8182",
165-
"-properties", "null", "-tcp", "-tcpPort", "9101", "-webAdminPassword", "123");
183+
"-properties", "null", "-tcp", "-tcpPort", "9101", "-webAdminPassword", hash);
166184
try {
167185
String url = "http://localhost:8182";
168186
WebClient client;
169187
String result;
170188
client = new WebClient();
171189
result = client.get(url);
172190
client.readSessionId(result);
173-
result = client.get(url, "adminLogin.do?password=123");
191+
result = client.get(url, "adminLogin.do?password=1234567890AB");
174192
result = client.get(url, "tools.jsp");
175193
FileUtils.delete(getBaseDir() + "/backup.zip");
176194
result = client.get(url, "tools.do?tool=Backup&args=-dir," +

h2/src/tools/org/h2/build/doc/dictionary.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -854,4 +854,4 @@ allotted mismatched wise terminator guarding revolves notion piece submission re
854854
duplicating unnested hardening sticky massacred
855855
bck clo cur hwm materializedview udca vol connectionpooldatasource xadatasource
856856
ampm sssssff sstzh tzs yyyysssss newsequentialid solidus openjdk furthermore ssff secons nashorn fractions
857-
btrim underscores ffl decomposed decomposition subfield infinities retryable
857+
btrim underscores ffl decomposed decomposition subfield infinities retryable salted

0 commit comments

Comments
 (0)