6 Using SSL/TLS to Secure Communication

Oracle Coherence supports using the Transport Layer Security (TLS) protocol to secure communication between entities (typically clients and servers) over a network. TLS supersedes the now deprecated Secure Sockets Layer (SSL) protocol.

In Coherence, TLS is configured using Socket Providers, which you can modify to meet your specific security scenarios. Examples for these configuration options are provided throughout this chapter.

Note:

Although the terms TLS, SSL, and SSL/TLS are used interchangeably throughout Coherence documentation, it is expected and encouraged that you use a currently supported version of TLS, not SSL, to secure communication in Coherence.

This chapter includes the following sections:

Overview of SSL/TLS

SSL/TLS is a security protocol that secures communication between entities (typically, clients and servers) over a network. SSL/TLS works by authenticating clients and servers using digital certificates and by encrypting and decrypting communication using unique keys that are associated with authenticated clients and servers.

This section covers a brief description of SSL/TLS and some of the terms that will be used in the rest of this chapter.

Establishing Identity

The identity of an entity is established by using a digital certificate and public and private encryption keys. The digital certificate contains general information about the entity and contains the public encryption key embedded within it.

In Coherence, identity is controlled by an identity manager, which corresponds to an identity manager in a Java SSL context.

Establishing Trust

A digital certificate is verified by a Certificate Authority (CA) and signed using the CA's digital certificate. The CA's digital certificate establishes trust that the entity is authentic. When a connection is made, the received certificate is verified against the CA certificate's configured trust store or the JVM's default trust store.

In Coherence, trust is controlled by a trust manager configuration, which corresponds to a trust manager in a Java SSL context.

Encrypting and Decrypting Data

The digital certificate for an entity contains a public encryption key that is paired with a private encryption key. Certificates are passed between entities during an initial connection. Data is then encrypted using the public key. Data that is encrypted using the entity public key can only be decrypted using the entity private key. This ensures that only the entity that owns the public encryption key can decrypt the data.

One-Way Authentication and Two-Way Authentication

SSL communication between clients and servers is set up using either one-way or two-way authentication.

In one-way authentication, a server is required to identify itself to a client by sending its digital certificate for authentication. The client is not required to send the server a digital certificate and remains anonymous to the server.

In two-way authentication, both the client and the server must send their respective digital certificates to each other for mutual authentication. Two-way authentication provides stronger security by assuring that the identity on each side of the communication is known. Two-way TLS is also called mutual TLS (mTLS).

Oracle Coherence supports both one-way and two-way SSL. Configuration depends on various factors, such as whether this is for cluster membership, Extend or gRPC proxies, or Extend or gRPC clients.

Certificates With Extended Usage

You can add a extended usage field to restrict the uses of a certificate. The extended usage is typically one or more values. When securing Coherence communication, the extended usage must include the correct usage, typically either serverAuth or clientAuth.

The values of extended usage will differ depending on the type of Coherence communication and the specific SSL scenario. If an application only has access to certificates that are single use (that is, only serverAuth or only clientAuth), then this restricts which available SSL configurations can be used and whether mTLS or one-way TLS can be used.

The following list shows the extended usage required for certificates used to secure different parts of Coherence.

  • Cluster Membership using mTLS requires both serverAuth and clientAuth

  • Cluster Membership using one-way SSL requires serverAuth

  • Extend or gRPC proxies require serverAuth

  • Extend or gRPC clients require clientAuth

  • Federation using mTLS requires both serverAuth and clientAuth

  • Federation using one-way SSL requires serverAuth

  • Management over REST HTTP endpoint requires serverAuth

  • Metrics HTTP endpoint requires serverAuth

  • Coherence REST HTTP proxies require serverAuth

Coherence has a custom trust protocol called PeerX509 which is similar to mTLS but does not validate extended usage. Socket providers configured with this algorithm will work with any extended usage certificate. See Coherence PeerX509 Algorithm.

Coherence Socket Providers

Coherence communication is configured using Socket Providers. The <socket-providers> section of the operational configuration file contains zero or more named <socket-provider> elements.

To name the <socket-providers> element, set its id attribute. For example, if you specify <socket-providers id="ssl-config">, the socket provider configuration is named ssl-config and it can then be referenced from other parts of the Coherence operational or cache configuration files.

There are different types of socket providers in Coherence, and to use SSL, an <ssl> socket provider needs to be configured. Depending on the required security scenario, there are several XML elements that can be added to the <ssl> element. The most common are <identity-manager> and <trust-manager>.

Example 6-1 shows a basic mTLS <ssl> socket provider that is configured with an <identity-manager> keystore named server.jks that holds the private key and certificate to establish this JVMs identity, and a <trust-manager> keystore named trust.jks that holds the CA certificate to validate the certificates of client connections.

Example 6-1 Basic mTLS socket provider configuration

<socket-provider id="ssl-config">
    <ssl>
        <identity-manager>
            <key-store>
                <url>file:server.jks</url>
            </key-store>
        </identity-manager>
        <trust-manager>
            <key-store>
                <url>file:trust.jks</url>
            </key-store>
        </trust-manager>
    </ssl>
</socket-provider>

Although Example 6-1 uses Java keystores, it is also possible to configure a socket provider to directly use private key and certificate files as well as plug in custom providers that can obtain keystores, keys or certificates from any location. See Using Private Key and Certificate Files.

Additionally, Example 6-1 does not configure any passwords for keystores or keys. Configuring passwords is covered in Specifying Passwords in Socket Provider Configuration.

Configuring the Identity Manager

Use the <identity-manager> section of a socket provider to configure the identity of the socket. An identity manager requires a private key and a corresponding certificate. These can be provided either in a Java keystore, or individually as separate key and certificate files.

Note:

Some of the following examples include hard-coded password values. In production environments, avoid using hard-coded passwords which are insecure. Coherence provides several alternative ways to provide passwords. See Specifying Passwords in Socket Provider Configuration.

Using a Java keystore

To use a Java keystore containing the key and certificate pair, configure the <key-store> element inside the <identity-manager> element.

In Example 6-2, the <identity-manager> loads the key and certificate from a keystore file named server.jks.

Example 6-2 <identity-manager> configuration

<identity-manager>
   <key-store>
       <url>file:server.jks</url>
   </key-store>
</identity-manager>

Password Protected keystores

If the keystore is password protected, then specify the password using one of the password configuration options in the <key-store> element.

In Example 6-3, the configuration uses the <password> element in the <key-store> to set the password as foo.

Example 6-3 <identity-manager> configuration whose keystore is password protected

<identity-manager>
   <key-store>
       <url>file:server.jks</url>
       <password>foo</password>
   </key-store>
</identity-manager>

Using Private Key and Certificate Files

To use key and certificate files directly, configure the <key> and <cert> elements inside the <identity-manager> element.

In Example 6-4, the <identity-manager> loads the private key from a file named server.key and the certificate from a file named server.cert.

Example 6-4 <identity-manager> configuration that loads private key and certificate files

<identity-manager>
    <key>server.key</key>
    <cert>server.cert</cert>
</identity-manager>

Password Protected Private Keys

If the private key is encrypted and protected with a password, the credentials need to be configured in the <identity-manager> configuration using one of the supported password options.

In Example 6-5, the identity manager is configured to read the private key from a Java keystore named server.jks. The private key is protected with a password foo, which is supplied using the <password> element inside the <identity-manager> element.

Example 6-5 <identity-manager> configuration using password protected private keys

<identity-manager>
   <key-store>
       <url>file:server.jks</url>
  </key-store>
  <password>foo</password>
</identity-manager>

Note:

When using Java keystores where both the keystore and private key require a password, it is important to make sure that the two passwords are not confused in the configuration. The keystore password is inside the <key-store> element. The private key password is at the higher level inside the <identity-manager> element.

In Example 6-6, the identity manager is configured to read the private key from a file named server.key. The private key is protected with a password foo. The password is supplied using the <password> element inside the <identity-manager> element.

Example 6-6 <identity-manager> configuration using a private key

<identity-manager>
    <key>server.key</key>
    <cert>server.cert</cert>
    <password>foo</password>
</identity-manager>

Configuring a Trust Manager

When configuring a socket provider, a trust manager requires one or more CA certificates to verify trust. These can be provided either in a Java keystore, or individually as separate certificate files.

Note:

Some of the following examples use hard coded password values. In production environments, avoid using hard coded passwords, which are insecure. Coherence has several alternative ways to provide passwords. See Specifying Passwords in Socket Provider Configuration.

Using a Java keystore

To use a Java keystore containing the CA certificates, configure the <key-store> element inside the <trust-manager> element.

In Example 6-7, the <trust-manager> element loads the CA certificates from a keystore file named trust.jks.

Example 6-7 <trust-manager> configuration

<identity-manager>
   <key-store>
       <url>file:trust.jks</url>
   </key-store>
</identity-manager>

Password Protected keystores

If the keystore is password protected, then specify the password using one of the password configuration options in the <key-store> element.

In Example 6-8, the configuration uses the <password> element in the <key-store> to set the password as foo.

Example 6-8 <trust-manager> configuration whose keystore is password protected

<trust-manager>
   <key-store>
       <url>file:server.jks</url>
       <password>foo</password>
   </key-store>
</trust-manager>

Using Certificate Files

To use the certificate files directly, configure the <cert> elements inside the <trust-manager> element. The <trust-manager> element can contain multiple <cert> elements.

In Example 6-9, the <trust-manager> loads the certificates from the files named ca-one.cert and ca-two.cert.

Example 6-9 <trust-manager> configuration using certificate files

<trust-manager>
    <cert>ca-one.cert</cert>
    <cert>ca-two.cert</cert>
</trust-manager>

Resolving the Socket Provider URL

Some elements in a socket provider configuration are URLs. For example, the <url> element within the <key-store> element.

The following is an explanation of how the values of these elements are processed to locate the resources they refer to:

  1. The value of the XML element is converted to a Java URI.
  2. If the value is a valid URI and has a URI scheme, for example file: or http:, then it is assumed to be a valid URI and Coherence will try to open a stream to this URI to read the data.
  3. If the value has no scheme, then Coherence treats it as a file on the file system or on the class path. Coherence will first assume that the value is a file name (either fully qualified or relative to the working directory) and try to locate that file. If this fails, Coherence will try to find the same file as a resource on the class path.

Using a Socket Provider in Configuration

You can configure various places in Coherence configuration files using <socket-provider>. You can configure <socket-provider> in one of two ways: either a named reference to a named socket provider in the operational configuration file, or as an in-line socket-provider configuration.

Example 6-10 demonstrates an Extend proxy service in a cache configuration file. The proxy scheme is configured with a <socket-provider> element with a value of mtls which references the socket provider named mtls in the operational configuration file.

Example 6-10 Extend proxy service that references mtls socket provider

<proxy-scheme>
    <scheme-name>proxy</scheme-name>
    <service-name>Proxy</service-name>
    <acceptor-config>
        <tcp-acceptor>
            <socket-provider>mtls</socket-provider>
        </tcp-acceptor>
    </acceptor-config>
</proxy-scheme>

Example 6-11 demonstrates an Extend proxy service in a cache configuration file. The proxy scheme is configured with a <socket-provider> element containing the full socket provider configuration.

Example 6-11 Extend proxy service with inline socket provider configuration

<proxy-scheme>
    <scheme-name>proxy</scheme-name>
    <service-name>Proxy</service-name>
    <acceptor-config>
        <tcp-acceptor>
            <socket-provider>
                <identity-manager>
                    <key-store>
                        <url>file:server.jks</url>
                    </key-store>
                </identity-manager>
                <trust-manager>
                    <key-store>
                        <url>file:trust.jks</url>
                    </key-store>
                </trust-manager>
            </socket-provider>
        </tcp-acceptor>
    </acceptor-config>
</proxy-scheme>

Configure a Socket Provider at Runtime

When using named socket providers configured in the operational configuration file, you can change the socket provider used in a configuration at runtime based on Java system properties.

The optional system-property attribute of the <socket-provider> element specifies the name of the system property used to obtain the socket provider name at runtime. This allows flexibility to choose at runtime what sort of sockets are used. For example, developers can use plain TCP in development testing, without worrying about creating keys and certificates. Then, later in system testing and production, they can specify an SSL socket provider name.

Example 6-12 shows an Extend proxy service in a cache configuration file. The proxy scheme is configured with a <socket-provider> element without a value but with a system-property attribute set to proxy.socket.provider. By default, as the <socket-provider> element has no value, no provider will be set and the proxy will use plain TCP sockets.

Example 6-12 Configuration for an Extend proxy service configured to use plain TCP sockets

<proxy-scheme>
    <scheme-name>proxy</scheme-name>
    <service-name>Proxy</service-name>
    <acceptor-config>
        <tcp-acceptor>
            <socket-provider system-property="proxy.socket.provider"/>
        </tcp-acceptor>
    </acceptor-config>
</proxy-scheme>

If the JVM is started with the system property set, then that property value will be used as the socket provider name. For example, starting Coherence with -Dproxy.socket.provider=mtls will use mtls as the socket provider name (assuming there is a socket provider named mtls configured in the operational configuration file).

Example 6-13 shows an Extend proxy service in a cache configuration file. The proxy scheme is configured with a <socket-provider> element with a value of mtls and with a system-property attribute set to proxy.socket.provider. By default, the socket provider named mtls from the operational configuration will be used. If the proxy.socket.provider system property is set, then the property value will be used as the socket provider name.

Example 6-13 Configuration for an Extend proxy service configured to use a referenced socket provider

<proxy-scheme>
    <scheme-name>proxy</scheme-name>
    <service-name>Proxy</service-name>
    <acceptor-config>
        <tcp-acceptor>
            <socket-provider system-property="proxy.socket.provider">
                mtls
            </socket-provider>
        </tcp-acceptor>
    </acceptor-config>
</proxy-scheme>

Using SSL to Secure Cluster Communication

In a Coherence cluster, all the cluster members communicate with each other over TCP in a peer-to-peer network. Each JVM is both a server that receives connections from other cluster members and a client that connects to other cluster members.

In addition, it is important to realize that TCMP is a peer-to-peer protocol that generally runs in trusted environments where many cluster nodes are expected to remain connected with each other. SSL negotiation is performed once, when the connection is made, and then the connection remains connected for the lifetime of the two cluster member JVMs involved. When configuring SSL, carefully consider the implications on key and certificate administration and on performance.

The socket provider used to control cluster traffic is configured by setting the <socket-provider> element inside the <unicast-listener> element of the cluster configuration in the operational configuration file.

In Example 6-14, the XML operational configuration file sets the unicast socket provider name to ssl-config which is a reference to the socket provider named ssl-config in the <socket-providers> section.

The actual socket provider configuration will depend on the security requirements of the application.

Example 6-14 Configuration where clusters use a socket provider to configure SSL/TLS

<?xml version='1.0'?>

<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
    xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
    coherence-operational-config.xsd">
    <cluster-config>
        <unicast-listener>
            <socket-provider>ssl-config</socket-provider>
        </unicast-listener>

        <socket-providers>
            <socket-provider id=ssl-config">
                <ssl>
                <!-- Actual config omitted for brevity -->
                </ssl>
            </socket-provider>
        </socket-providers>
    </cluster-config>
</coherence>

Cluster Communication Using mTLS

The most common and recommended configuration for using SSL to secure cluster communication is mTLS (or two-way TLS). To configure an <ssl> socket provider for mTLS, both identity and trust must be configured.

In Example 6-15, the socket provider mtls-config is configured with an <identity-manager> element containing a keystore named server.jks and a <trust-manager> element containing a keystore named trust.jks. The <unicast-listener> <socket-provider> element is then set to mtls-config to reference the SSL socket provider.

Example 6-15 Configuration for clusters communicating over mTLS

<?xml version='1.0'?>

<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
   coherence-operational-config.xsd">
   <cluster-config>
      <unicast-listener>
         <socket-provider>mtls-config</socket-provider>
     </unicast-listener>

      <socket-providers>
         <socket-provider id=mtls-config">
           <ssl>
              <identity-manager>
                 <key-store>
                     <url>file:server.jks</url>
                 </key-store>
              </identity-manager>
               <trust-manager>
                 <key-store>
                     <url>file:trust.jks</url>
                 </key-store>
               </trust-manager>
           </ssl>
        </socket-provider>
      </socket-providers>
   </cluster-config>
</coherence>

By default, when a <ssl> socket provider is configured with both identity and trust, Coherence will create a Java SSL context that is configured for mTLS.

Note:

When using a certificate with extended usage set in this configuration, the extended usage must include both serverAuth and clientAuth. The socket provider configuration is used to configure a single Java SSL Context used by both the cluster member's server sockets (used to receive connections from other cluster members) and its client sockets (used to connect to other cluster members).

Cluster Communication with One-Way SSL

You can configure one-way SSL for cluster members so that a cluster member will verify trust of a server certificate that it receives when making a connection to another cluster member. A cluster member will not verify trust for a member that connects to it.

Only a single socket provider can be configured for the unicast listener, therefore the <ssl> socket provider must be configured with both identity and trust, the same as with mTLS. To specify one-way SSL, add a <client-auth> element and set its value ot none.

The <client-auth> element configures the corresponding setting in the Java SSL context which determines whether the client must send a certificate. It has three possible values:

  • none - the client does not send a certificate (even if configured with an identity key and certificate)

    If you want clusters to communicate over one-way SSL, then set <client-auth> to none.

  • wanted - the client may send a certificate if it has one

  • required - the client must send a certificate.

    If you want clusters to communicate over mTLS, then set <client-auth> to required.

Example 6-16 shows the unicast listener configuration for one-way SSL.

Example 6-16 Unicast Listener Configuration for One-way SSL

<?xml version='1.0'?>

<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
   coherence-operational-config.xsd">
   <cluster-config>
      <unicast-listener>
         <socket-provider>one-way-config</socket-provider>
     </unicast-listener>

      <socket-providers>
         <socket-provider id=one-way-config>
           <ssl>
              <identity-manager>
                 <key-store>
                     <url>file:server.jks</url>
                 </key-store>
              </identity-manager>
               <trust-manager>
                 <key-store>
                     <url>file:trust.jks</url>
                 </key-store>
               </trust-manager>
<!-- This element changes the configuration to one-way SSL -->
               <client-auth>none<client-auth>
           </ssl>
         </socket-provider>
     </socket-providers>
   </cluster-config>
</coherence>

Note:

When using a certificate with extended usage set in this configuration, the extended usage must include serverAuth. In one-way SSL, only the server sends a certificate to the client, so the certificate must be valid for use as a server certificate.

Using SSL to Secure Extend and gRPC Client Communication

Oracle Coherence supports SSL to secure communication between Coherence Extend and gRPC clients and a cluster side Extend or gRPC proxy.

When SSL is used to secure communication between clients and proxies, it requires configuration on both the client side and the cluster side. SSL is supported for both Java and .NET Extend clients, but not for C++ Extend clients (without additional configuration as described in Securing the C++ Client with SSL/TLS. SSL is supported for all types of gRPC client.

Both mTLS and one-way SSL can be configured for clients and proxies.

Configuring a Cluster-Side Extend Proxy SSL Socket Provider

You can configure SSL in the cluster-side cache configuration file by defining an SSL socket provider for a proxy service.

There are two options for configuring an SSL socket provider depending on the level of granularity that is required.

  • Configure the socket provider by proxy service, where each proxy service defines an SSL socket provider configuration or references a predefined configuration that is included in the operational configuration file.

  • Configure all proxy services to use the same SSL socket provider configuration by configuring a socket provider in the cache configuration <defaults> section.

A proxy service that provides its own configuration overrides the configuration in the <defaults> section. The socket provider configuration in the <defaults> section can reference a named socket provider configuration that is included in the operational configuration file or be a full in-line socket provider configuration.

Note:

When using a certificate with extended usage set in a cluster side proxy socket provider configuration, the extended usage must include serverAuth. A proxy opens server sockets to receive client connections so the certificate must be valid for server use.

Configure an SSL Socket Provider per Extend Proxy Service

To configure an SSL socket provider for an Extend proxy service, add a <socket-provider> element within the <tcp-acceptor> element of each <proxy-scheme> definition.

Example 6-17 demonstrates a proxy scheme that configures an SSL socket provider directly in the proxy configuration in the cache configuration file.

Example 6-17 Configuration for an SSL/TLS socket provider per Extend proxy service

<proxy-scheme>
   <service-name>ProxyService</service-name>
   <acceptor-config>
      <tcp-acceptor>
         <socket-provider>
            <ssl>
              <identity-manager>
                 <key-store>
                     <url>file:server.jks</url>
                </key-store>
              </identity-manager>
               <trust-manager>
                 <key-store>
                     <url>file:trust.jks</url>
                 </key-store>
               </trust-manager>
           </ssl>
         </socket-provider>
     </tcp-acceptor>
   </acceptor-config>
   <autostart>true</autostart>
</proxy-scheme>

Example 6-18 demonstrates configuring the proxy in the cache configuration to reference a named socket provider in the operational configuration file. In this case, the proxy will use the socket provider named ssl-config.

Example 6-18 Configuration for a single SSL/TLS socket provider for all Extend proxy services

<proxy-scheme>
   <service-name>ProxyService</service-name>
   <acceptor-config>
      <tcp-acceptor>
         <socket-provider>ssl-config</socket-provider>
     </tcp-acceptor>
   </acceptor-config>
   <autostart>true</autostart>
</proxy-scheme>

Extend or gRPC Proxy with mTLS

A proxy can be configured for mTLS using a <ssl> socket provider configured with both identity and trust.

Example 6-19 shows a socket provider configured for mTLS. By default, when a socket provider has both identity and trust configured, it will configure the SSL context to use two-way SSL.

Note:

If a proxy is configured for mTLS, then the client must also be configured for mTLS.

Example 6-19 Configuration for an Extend or gRPC Proxy using mTLS

<socket-provider id="mtls-config">
  <ssl>
     <identity-manager>
        <key-store>
            <url>file:server.jks</url>
        </key-store>
     </identity-manager>
      <trust-manager>
        <key-store>
            <url>file:trust.jks</url>
        </key-store>
      </trust-manager>
  </ssl>
</socket-provider>

Extend or gRPC Proxy with One-Way SSL

A proxy can be configured for one-way SSL using a <ssl> socket provider configured with only identity. In one-way SSL, the server sends a certificate to the client, which the client verifies against its trust store. When configuring one-way SSL it is important to set the socket provider configuration correctly, that is, the server only has <identity-manager> configured and the client has a <trust-manager> configured.

Example 6-20 shows a cluster side proxy socket provider configured for one-way SSL.

Example 6-20 Configuration for an Extend or gRPC Proxy using one-way SSL/TLS

<socket-provider id="oneway-proxy-config">
  <ssl>
     <identity-manager>
        <key-store>
            <url>file:server.jks</url>
        </key-store>
     </identity-manager>
 </ssl>
</socket-provider>

An alternative way to configure a cluster side proxy to use one-way SSL in a socket provider configured with both <identity-manager> and <trust-manager> is to set the <client-auth> element to none.

Example 6-21 shows a cluster side socket provider configured with both identity and trust which would normally be mTLS, but with the <client-auth> element set to none will be one-way and not require the client to send a certificate.

If a proxy is configured for one-way SSL, then the client may be configured with either an mTLS or a one-way configuration. If the client is configured as two-way (that is, it has identity and trust) it will still connect and verify the server certificate, but it will not send its own certificate.

Example 6-21 Configuration for an Extend or gRPC Proxy using one-way SSL/TLS by setting <client-auth> to none

<socket-provider id="one-way-config">
  <ssl>
     <identity-manager>
        <key-store>
            <url>file:server.jks</url>
        </key-store>
     </identity-manager>
      <trust-manager>
        <key-store>
            <url>file:trust.jks</url>
        </key-store>
      </trust-manager>
      <!-- This element changes the configuration to one-way SSL -->
      <client-auth>none<client-auth>
  </ssl>
</socket-provider>

Configuring the Cluster-Side gRPC Proxy SSL Socket Provider

The Coherence gRPC Proxy is configured using an internal proxy cache configuration file.

To configure SSL for the gRPC proxy, configure a named socket provider in the operational configuration file, then set the coherence.grpc.server.socketprovider system property (or environment variable) to the name of that socket provider.

The Coherence operational configuration contains a special gRPC socket provider configuration named grpc-insecure. This configures the default gRPC Java insecure credentials for use by the proxy or client.

Configuring a Java Extend or gRPC Client SSL Socket Provider

You can configure SSL in the Extend or gRPC client cache configuration file by defining an SSL socket provider for a remote scheme.

There are two options for configuring an SSL socket provider, depending on the level of granularity that is required.

  • Configure the socket provider per remote scheme, where each remote scheme defines an SSL socket provider configuration or references a predefined configuration that is included in the operational configuration file.

  • Configure all remote schemes to use the same SSL socket provider configuration by configuring a socket provider in the cache configuration <defaults> section.

A remote service that provides its own configuration overrides the configuration in the <defaults> section. The socket provider configuration in the <defaults> section can reference a named socket provider configuration that is included in the operational configuration file or be a full in-line socket provider configuration.

Note:

  • When using certificate with extended usage set in an Extend or gRPC client socket provider configuration, the extended usage must include clientAuth.

  • If the cluster side proxy is configured to use mTLS, then the client must also be configured for mTLS. If the cluster side proxy is configured to use one-way SSL, then the client may be configured as either one-way or mTLS. This is because it is the server that determines whether a connection is two-way or one-way (that is, whether the client should send its identity certificate).

Configure an SSL Socket Provider per Remote Service

To configure an SSL socket provider for an Extend remote service, add a <socket-provider> element within the <tcp-initiator> element of a <remote-cache-scheme> definition or a <remove-invocation-scheme>.

To configure an SSL socket provider for a gRPC remote service, add a <socket-provider> element within the <grpc-channel> element of a <remote-grpc-cache-scheme> definition.

Example 6-22 demonstrates an Extend remote cache scheme that configures a socket provider that uses SSL. This example configures both an identity keystore (server.jks) and a trust keystore (trust.jks). This is typical of two-way SSL authentication, in which both the client and proxy must exchange digital certificates and confirm each other's identity.

Example 6-22 Configuration for an SSL/TLS socket provider per remote scheme

<?xml version="1.0"?>

<cache-config xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-cache-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-cache-config
   coherence-cache-config.xsd">
   <caching-scheme-mapping>
      <cache-mapping>
         <cache-name>*</cache-name>
         <scheme-name>remote-cache</scheme-name>
      </cache-mapping>
   </caching-scheme-mapping>

   <caching-schemes>
      <remote-cache-scheme>
         <scheme-name>remote-cache</scheme-name>
         <service-name>RemoteService</service-name>
         <initiator-config>
            <tcp-initiator>
               <socket-provider>
                  <ssl>
                    <identity-manager>
                       <key-store>
                           <url>file:server.jks</url>
                       </key-store>
                    </identity-manager>
                     <trust-manager>
                       <key-store>
                           <url>file:trust.jks</url>
                       </key-store>
                     </trust-manager>
                 </ssl>
               </socket-provider>
           </tcp-initiator>
        </initiator-config>
      </remote-cache-scheme>
   </caching-schemes>
</cache-config>

Example 6-23 demonstrates a gRPC remote cache scheme that configures a socket provider that uses SSL. This example configures both an identity keystore (server.jks) and a trust keystore (trust.jks). This is typical of two-way SSL authentication, in which both the client and proxy must exchange digital certificates and confirm each other's identity.

Example 6-23 Configuration for a gRPC remote cache scheme that configures a socket provider to use SSL/TLS

<?xml version="1.0"?>

<cache-config xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-cache-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-cache-config
   coherence-cache-config.xsd">
   <caching-scheme-mapping>
      <cache-mapping>
         <cache-name>*</cache-name>
         <scheme-name>remote-cache</scheme-name>
      </cache-mapping>
   </caching-scheme-mapping>

   <caching-schemes>
      <remote-grpc-cache-scheme>
         <scheme-name>remote-cache</scheme-name>
         <service-name>RemoteService</service-name>
         <grpc-channel>
              <socket-provider>
                  <ssl>
                    <identity-manager>
                       <key-store>
                           <url>file:server.jks</url>
                       </key-store>
                    </identity-manager>
                     <trust-manager>
                       <key-store>
                           <url>file:trust.jks</url>
                       </key-store>
                     </trust-manager>
                 </ssl>
               </socket-provider>
           </grpc-channel>
     </remote-grpc-cache-scheme>
   </caching-schemes>
</cache-config>

Example 6-24 configures remote schemes that references an SSL socket provider configuration named ssl-client that is defined in the <socket-providers> element of the operational configuration file.

Example 6-24 Configuration for a remote cache scheme that references a socket provider

<?xml version="1.0"?>

<cache-config xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-cache-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-cache-config
   coherence-cache-config.xsd">
   <caching-scheme-mapping>
      <cache-mapping>
         <cache-name>extend-*</cache-name>
         <scheme-name>remote-cache</scheme-name>
      </cache-mapping>

      <cache-mapping>
         <cache-name>grpc-*</cache-name>
         <scheme-name>grpc-cache</scheme-name>
      </cache-mapping>
   </caching-scheme-mapping>

   <caching-schemes>
      <remote-cache-scheme>
         <scheme-name>remote-cache</scheme-name>
         <service-name>RemoteCache</service-name>
         <initiator-config>
            <tcp-initiator>
               <socket-provider>ssl-client</socket-provider>
           </tcp-initiator>
     </remote-cache-scheme>

      <remote-grpc-cache-scheme>
         <scheme-name>grpc-cache</scheme-name>
         <service-name>RemoteGrpcCache</service-name>
        <grpc-channel>
            <socket-provider>ssl-client</socket-provider>
         </grpc-channel>
     </remote-grpc-cache-scheme>
   </caching-schemes>
</cache-config>

Extend or gRPC Client with mTLS

A client can be configured for mTLS using a <ssl> socket provider configured with both identity and trust.

Example 6-25 shows a socket provider configured for mTLS. If the cluster side proxy is configured to use mTLS the client certificate from the identity will be sent to the server. In both two-way and one-way SSL, the CA certificates in the trust store will be used to verify the proxy server identity.

Example 6-25 Configuration for an Extend or gRPC client with mTLS

<socket-provider id=mtls-config">
  <ssl>
     <identity-manager>
        <key-store>
            <url>file:server.jks</url>
        </key-store>
     </identity-manager>
      <trust-manager>
        <key-store>
            <url>file:trust.jks</url>
        </key-store>
      </trust-manager>
  </ssl>
</socket-provider>

Extend or gRPC Client with One-Way SSL

A client can be configured for one-way SSL using a <ssl> socket provider configured with only a trust store. The proxy server must also be configured for one-way SSL.

Example 6-26 shows a socket provider configured for one-way SSL. The CA certificates in the trust store will be used to verify the identity of the server certificate.

Example 6-26 Configuration for an Extend or gRPC client with one-way SSL/TLS

<socket-provider id=one-way-config>
  <ssl>
     <trust-manager>
        <key-store>
            <url>file:trust.jks</url>
        </key-store>
      </trust-manager>
  </ssl>
</socket-provider>

Configure a Default Socket Provider for a Cache Configuration File

You can configure a socket provider in the <defaults> section of the cache configuration file. This socket provider will then apply to all the schemes in that configuration file that do not specifically configure their own socket provider, such as any remote cache services, remote invocation services, proxy services, gRPC services, and so on.

In Example 6-27, the <defaults> section of the cache configuration file has a socket provider that references a provider named mtls from the operational configuration file. The cache configuration file contains three remote schemes, none of which have a socket provider configured so they will all use the mtls socket provider.

Example 6-27 Configuration for referencing sockets providers in the <defaults> section of cache configuration

<?xml version="1.0"?>
<cache-config xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
        xmlns="http://xmlns.oracle.com/coherence/coherence-cache-config"
        xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-cache-config 
            coherence-cache-config.xsd">

    <defaults>
        <socket-provider>mtls</socket-provider>
    </defaults>

    <caching-scheme-mapping>
        <cache-mapping>
            <cache-name>*</cache-name>
            <scheme-name>remote</scheme-name>
        </cache-mapping>

        <cache-mapping>
            <cache-name>grpc-cache</cache-name>
            <scheme-name>remote-grpc</scheme-name>
        </cache-mapping>
    </caching-scheme-mapping>

    <caching-schemes>
        <remote-cache-scheme>
            <scheme-name>remote</scheme-name>
            <service-name>RemoteService</service-name>
        </remote-cache-scheme>

        <remote-invocation-scheme>
            <scheme-name>invocation</scheme-name>
            <service-name>RemoteInvocation</service-name>
        </remote-invocation-scheme>

        <remote-grpc-cache-scheme>
            <scheme-name>remote-grpc</scheme-name>
            <service-name>RemoteGrpcCache</service-name>
        </remote-grpc-cache-scheme>
    </caching-schemes>
</cache-config>

In Example 6-28, the <defaults> section of the cache configuration file has a socket provider that references a provider named mtls from the operational configuration file. The cache configuration file contains three remote schemes: a remote cache scheme, a remote invocation scheme, and a remote gRPC cache scheme. The remote cache scheme and the remote invocation scheme do not specify a socket provider so they use the mtls socket provider. However, the remote gRPC scheme does have a socket provider configured and so it references a socket provider named one-way in the operational configuration file.

Example 6-28

<?xml version="1.0"?>
<cache-config xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xmlns="http://xmlns.oracle.com/coherence/coherence-cache-config"
    xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-cache-config
        coherence-cache-config.xsd"
    xml-override="{coherence.cacheconfig.override}">

    <defaults>
        <socket-provider>mtls-config</socket-provider>
    </defaults>

    <caching-scheme-mapping>
        <cache-mapping>
            <cache-name>*</cache-name>
            <scheme-name>remote</scheme-name>
        </cache-mapping>

        <cache-mapping>
            <cache-name>grpc-cache</cache-name>
            <scheme-name>remote-grpc</scheme-name>
        </cache-mapping>
    </caching-scheme-mapping>

    <caching-schemes>
        <remote-cache-scheme>
            <scheme-name>remote</scheme-name>
            <service-name>RemoteService</service-name>
        </remote-cache-scheme>

        <remote-invocation-scheme>
            <scheme-name>invocation</scheme-name>
            <service-name>RemoteInvocation</service-name>
        </remote-invocation-scheme>

        <remote-grpc-cache-scheme>
            <scheme-name>remote-grpc</scheme-name>
            <service-name>RemoteGrpcCache</service-name>
            <grpc-channel>
                <socket-provider>one-way</socket-provider>
            </grpc-channel>
        </remote-grpc-cache-scheme>
    </caching-schemes>
</cache-config>

Configuring a .NET Client-Side Stream Provider

Configure SSL in the .NET client-side cache configuration file by defining an SSL stream provider for remote services. The SSL stream provider is defined using the <stream-provider> element within the <tcp-initiator> element.

Note:

Certificates are managed on Window servers at the operating system level using the Certificate Manager. The sample configuration assumes that the Certificate Manager includes the extend proxy's certificate and the trusted CA's certificate that signed the proxy's certificate.

Example 6-29 demonstrates a remote cache scheme that configures an SSL stream provider. Refer to the cache configuration XML schema (INSTALL_DIR\config\cache-config.xsd) for details on the elements that are used to configure an SSL stream provider.

Note:

The <protocol> element support any allowed SslProtocols enumeration values as well as a comma separated list of protocol values. For example:

<protocol>Tls11,Tls12</protocol>

Ensure the protocol is specified in both the client-side and server-side configuration.

Example 6-29 Sample .NET Client-Side SSL Configuration

<?xml version="1.0"?>

<cache-config xmlns="http://schemas.tangosol.com/cache"
   xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xsi:schemaLocation="http://schemas.tangosol.com/cache
   assembly://Coherence/Tangosol.Config/cache-config.xsd">
   <caching-scheme-mapping>
      <cache-mapping>
         <cache-name>dist-extend</cache-name>
         <scheme-name>extend-dist</scheme-name>
      </cache-mapping>
   </caching-scheme-mapping>

   <caching-schemes>
      <remote-cache-scheme>
         <scheme-name>extend-dist</scheme-name>
         <service-name>ExtendTcpSSLCacheService</service-name>
         <initiator-config>
            <tcp-initiator>
               <stream-provider>
                  <ssl>
                     <protocol>Tls12</protocol>
                     <local-certificates>
                        <certificate>
                           <url>C:\</url>
                           <password>password</password>
                           <flags>DefaultKeySet</flags>
                        </certificate>
                     </local-certificates>
                  </ssl>
               </stream-provider>
               <remote-addresses>
                  <socket-address>
                     <address>198.168.1.5</address>
                     <port>9099</port>
                  </socket-address>
               </remote-addresses>
               <connect-timeout>10s</connect-timeout>
            </tcp-initiator>
            <outgoing-message-handler>
               <request-timeout>5s</request-timeout>
            </outgoing-message-handler>
         </initiator-config>
      </remote-cache-scheme>
   </caching-schemes>
</cache-config>

Securing the C++ Client with SSL/TLS

The Coherence C++ Extend Client does not officially support SSL/TLS. However, you can use one of the following options to work around this limitation to run C++ extend clients securely against an SSL/TLS enabled Coherence proxy server.

Secure the C++ client using a Load Balancer

You can configure a load balancer such as F5 to perform encryption on behalf of your C++ client and communicate with the SSL/TLS proxy servers behind the load balancer. Refer to the documentation for the load balancer service for information on how to configure it to provide data protection.

Secure C++ Client using SSH Tunneling

When SSH tunneling is enabled, the C++ client connects to a port on the local host that the SSH client listens on. The SSH client then forwards the requests over its encrypted tunnel to the server. The server connects to the SSL/TLS enabled Coherence proxy server - usually on the same machine or in the same data center as the SSH server. You can easily find examples on how to configure an SSH tunnel. Coherence proxy servers are behind the SSH server.

Secure C++ Client in a Cloud

If you are in a cloud environment, such as Oracle Cloud Infrastructure Container Engine for Kubernetes (OKE), you can configure an NGINX container on the same pod as the C++ client to serve as an SSL/TLS proxy to communicate with the Coherence SSL/TLS proxy server. You can also use an Istio sidecar proxy or egress gateway to perform encryption on behalf of the C++ client. Refer to the corresponding documentation for your cloud environment for instructions on how to secure data to the upstream servers.

Using SSL to Secure Federation Communication

Oracle Coherence supports using SSL to secure communication between cluster participants in a federated cluster. Communication is secured between federated service members and requires SSL to be configured on each cluster participant.

To use SSL to secure federation communication, you can configure the <socket-provider> element in the <federated-scheme>.

The socket provider for federation is similar to the one used for the clusters unicast sockets, that is, the socket provider configures both server and client sockets. This restricts the types of configuration that are supported.

Example 6-30 shows a <federated-scheme> with a <socket-provider> configured within the scheme definition.

Example 6-30 Configuration for using an inline <socket-provider> to configure SSL/TLS between cluster participants in a federated cluster

<federated-scheme>
   <scheme-name>federated</scheme-name>
   <service-name>federated</service-name>
   <backing-map-scheme>
      <local-scheme />
   </backing-map-scheme>
   <autostart>true</autostart>
   <socket-provider>
     <ssl>
         <identity-manager>
            <key-store>
                <url>file:server.jks</url>
            </key-store>
         </identity-manager>
          <trust-manager>
            <key-store>
                <url>file:trust.jks</url>
            </key-store>
          </trust-manager>
      </ssl>
   </socket-provider>
  <topologies>
      <topology>
         <name>MyTopology</name>
      </topology>
   </topologies>
</federated-scheme>

Example 6-31 shows a <federated-scheme> with a <socket-provider> that references a socket provider named ssl-federation (which has been configured in the <socket-providers> section of the operational configuration file).

Example 6-31 Configuration for using a referenced <socket-provider> to configure SSL/TLS between cluster participants in a federated cluster

<federated-scheme>
   <scheme-name>federated</scheme-name>
   <service-name>federated</service-name>
   <backing-map-scheme>
      <local-scheme />
   </backing-map-scheme>
   <autostart>true</autostart>
   <socket-provider>ssl-federation</socket-provider>
  <topologies>
      <topology>
         <name>MyTopology</name>
      </topology>
   </topologies>
</federated-scheme>

Federation with mTLS

The most common and recommended configuration for using SSL to secure federation is mTLS. To configure an <ssl> socket provider for mTLS, both identity and trust must be configured.

In Example 6-32, the socket provider is configured with an <identity-manager> element that contains a keystore named server.jks, and a <trust-manager> element that contains a keystore named trust.jks. By default, when a <ssl> socket provider is configured with both identity and trust, Coherence will create a Java SSL context that is configured for mTLS.

Note:

When using certificate with extended usage set in this configuration, the extended usage must include both serverAuth and clientAuth. The socket provider configuration is used to configure a single Java SSL Context used by both the federated scheme server sockets (used to receive connections from other federations participants) and its client sockets (used to connect to other federations participants).

Example 6-32 Configuration for securing federated cluster communication over mTLS

<socket-provider>
   <ssl>
      <identity-manager>
         <key-store>
             <url>file:server.jks</url>
         </key-store>
      </identity-manager>
       <trust-manager>
         <key-store>
             <url>file:trust.jks</url>
         </key-store>
       </trust-manager>
   </ssl>
</socket-provider>

Federation with One-Way SSL

You can configure one-way SSL for federation participants so that a participant will verify trust of a server certificate that it receives when making a connection to another participants. A federation participant will not verify trust for a member that connects to it.

Only a single socket provider can be configured for the federated scheme, therefore, the <ssl> socket provider must be configured with both identity and trust, the same as with the mTLS example. To specify one-way SSL, add a <client-auth>element and set its value to none.

The <client-auth> element is used to configure the corresponding setting in the Java SSL context which determines whether the client must send a certificate. When set to none the client does not send a certificate (even if configured with an identity key and certificate).

Example 6-33 shows the federated scheme socket provider configuration for one-way SSL.

Note:

When using certificate with extended usage set in this configuration, the extended usage must include serverAuth. In one-way SSL, only the server sends a certificate to the client, so the certificate must be valid for use as a server certificate.

Example 6-33 Configuration for securing federated cluster communication over one-way SSL/TLS

<socket-provider>
   <ssl>
      <identity-manager>
         <key-store>
             <url>file:server.jks</url>
         </key-store>
      </identity-manager>
       <trust-manager>
         <key-store>
             <url>file:trust.jks</url>
         </key-store>
       </trust-manager>
<!-- This element changes the configuration to one-way SSL -->
       <client-auth>none<client-auth>
   </ssl>
 </socket-provider>

Coherence PeerX509 Algorithm

Oracle Coherence includes a proprietary peer trust algorithm, PeerX509, which works by assuming trust (and only trust) of the certificates that are in the trust manager keystore. It also leverages the peer-to-peer protocol features of TCMP. Specifically, for the SSL negotiation to succeed, the certificate received must be the same as one of the certificates held by the trust manager .

You can configure PeerX509 by setting the <algorithm> element in the <trust-manager> element.

In Example 6-34, the trust manager uses the PeerX509 algorithm. Both the identity manager and the trust manager are configured to use the same keystore. This is a common approach for PeerX509 when used for to secure cluster membership, because all cluster members use the same configuration, and the certificate sent by the client or server socket is guaranteed to be in the trust store.

Note:

  • PeerX509 is a Coherence proprietary algorithm and is not compliant with standards such as Federal Information Processing Standards (FIPS). It may not be usable in highly restricted environments.

  • Trust is verified if the certificate received matches one of those in the trust store. There is no checking of additional certificate data such as extended usages or if the certificate is signed.

Example 6-34 Configuration where the trust manager uses the PeerX509 algorithm

<socket-provider>
    <ssl>
        <identity-manager>
            <key-store>
                <url>file:server.jks</url>
            </key-store>
        </identity-manager>
        <trust-manager>
            <algorithm>PeerX509</algorithm>
            <key-store>
                <url>file:server.jks</url>
            </key-store>
        </trust-manager>
    </ssl>
</socket-provider>

Specifying a Global Socket Provider

You can configure a global socket provider in the Coherence operational configuration file. When set, every server or client socket that Coherence creates will use this configuration unless it has been overridden with a specific socket provider of its own.

In the Coherence operational configuration file, within the <cluster-config> element, specify a <global-socket-provider> element.

In Example 6-35, the operational configuration file configures a socket provider named mtls-config that is configured for mTLS. The <global-socket-provider> element is then set to mtls-config so that this socket provider will be used everywhere.

Example 6-35 Configuration for specifying a global socket provider

<?xml version='1.0'?>

<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
   coherence-operational-config.xsd">
   <cluster-config>

      <global-socket-provider>mtls-config</global-socket-provider>

      <socket-providers>
         <socket-provider id=mtls-config">
           <ssl>
              <identity-manager>
                 <key-store>
                     <url>file:server.jks</url>
                 </key-store>
              </identity-manager>
               <trust-manager>
                 <key-store>
                     <url>file:trust.jks</url>
                 </key-store>
               </trust-manager>
           </ssl>
        </socket-provider>
      </socket-providers>
   </cluster-config>
</coherence>

The default operational configuration file allows the global socket provider to be set using the system property coherence.global.socketprovider (or the environment variable COHERENCE_GLOBAL_SOCKET_PROVIDER).

In Example 6-36, the operational configuration configures a socket provider named mtls-config for two-way SSL, but it does not set the global socket provider element.

Example 6-36 Configuration for a socket provider without a global socket provider

<?xml version='1.0'?>

<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
   coherence-operational-config.xsd">
   <cluster-config>

      <socket-providers>
         <socket-provider id=mtls-config">
           <ssl>
              <identity-manager>
                 <key-store>
                     <url>file:server.jks</url>
                 </key-store>
              </identity-manager>
               <trust-manager>
                 <key-store>
                     <url>file:trust.jks</url>
                 </key-store>
               </trust-manager>
           </ssl>
        </socket-provider>
      </socket-providers>
   </cluster-config>
</coherence>

If Coherence is now started with the system property -Dcoherence.global.socketprovider=mtls-config, then the mtls-config socket provider will be used as the global socket provider.

Note:

The global socket provider will be used for all server and client sockets. Therefore, the configured socket provider must be capable of being used for both server and client sockets. Typically, this means you should configure the global socket provider for mTLS, or for one-way SSL as described in Cluster Communication with One-Way SSL.

Specifying Passwords in Socket Provider Configuration

Java keystores and private keys can be secured with credentials, typically a password. The socket provider configuration provides several ways to specify a password. It is up to the application developer to choose the most suitable approach based on the required level of security versus simplicity of configuration.

Specify Plain Text Passwords

You can specify a plain text password directly in the XML configuration using the <password> element.

Configuring a plain text password directly in the XML is the least secure way to specify passwords, but it is simple to use and is often used in cases such as integration testing that does not access production data. However, hardcoding a password is also inflexible; whenever the password changes, you need to update the configuration file.

In Example 6-37, the <password> element specifies a plain text password for a key store in an <identity-manager> element.

Example 6-37 Configuration with a plain text password

<identity-manager>
   <key-store>
       <url>file:server.jks</url>
   </key-store>
   <password>secret</password>
</identity-manager>

Passwords From Java System Properties

You can use the Coherence configuration system property replacement feature to specify a password using a system property. The <password> element has an optional system-property attribute that specifies which Java system property to use to obtain the value for the XML element.

In Example 6-38, the <password> element is configured to read an encrypted private key. Its system-property attribute is set to key.credentials, so at runtime, when the XML configuration is parsed, the value of the <password> system property will be used as the password.

Using system properties is more flexible than plain text, hardcoded passwords, but it is not particularly secure. The passwords will be injected into the XML after it is loaded and stored in the Coherence configuration classes in memory in plain text.

Example 6-38 Configuration for specifying a password using Java system properties

<identity-manager>
   <key>server.key</key>
   <cert>server.cert</cert>
   <password system-property=key.credentials/>
</identity-manager>

Reading Passwords From a URL

You can load a password from a URL, such as a file on the file system using the <password-url element.

Example 6-39 shows an SSL socket provider configuration that reads the keystore and private key passwords from files on the file system.

  • The identity manager's keystore password is read from /coherence/security/server-pass.txtfile.

  • The private key used by the identity manager is read from /coherence/security/key-pass.txtfile.

  • The keystore password used by the trust manager is read from the /coherence/security/trust-pass.txtfile.

Although Example 6-39 uses files, you can use any valid URL that is readable, for example, a simple HTTP URL to get the password from a web server.

Example 6-39 Configuration for retrieving passwords from a URL

<socket-provider>
   <ssl>
      <identity-manager>
         <key-store>
            <url>file:server.jks</url>
            <password-url>
              file:/coherence/security/server-pass.txt
            </password-url>
         </key-store>
         <password-url>
           file:/coherence/security/key-pass.txt
         </password-url>
      </identity-manager>
      <trust-manager>
         <key-store>
            <url>file:trust.jks</url>
            <password-url>
              file:/coherence/security/trust-pass.txt
            </password-url>
         </key-store>
      </trust-manager>
   </ssl>
</socket-provider>

Custom Password Providers

A password provider allows you to get the SSL passwords from any source, including those using encryption. Password providers implement the com.tangosol.net.PasswordProviderinterface. The class has a get method that returns a password as a Java char array.

Example 6-40 shows a simple password provider implementation that supplies a password char array. A real password provider would obtain the password from somewhere more secure than a hardcoded char array.

Example 6-40 Custom password provider implementation using a password char array

package com.example.security;

import com.tangosol.net.PasswordProvider;

public class GetPassword implements PasswordProvider {

    public GetPassword() {
    }

    @Override
    public char[] get()
        {
        return new char[]{'s', 'e', 'c', 'r', 'e', 't'};
        }
    }

You can specify custom password providers in a socket provider configuration using the <password-provider> element. Either provide the full configuration inside the <password-provider> element, or set the value of the <password-provider> element to the name of a password provider that is configured in the <password-providers> section of the operational configuration file.

Example 6-41 uses the password provider in Example 6-40 to obtain the password for a private key in an identity manager configuration.

Example 6-41 Configuration for using a custom password provider to retrieve a password

<socket-provider>
   <ssl>
      <identity-manager>
         <key>server.key</key>
         <cert>server.cert</cert>
         <password-provider>
             <class-name>com.example.security.GetPassword</class-name>
         </password-provider>
      </identity-manager>
      <trust-manager>
         <key-store>
            <url>file:trust.jks</url>
         </key-store>
      </trust-manager>
   </ssl>
</socket-provider>

Named Password Provider References

If a common password provider configuration will be used multiple times, it is simpler to provide the configuration once in the <password-providers> section of the operational configuration file and then reference the named provider from the socket provider configuration.

Example 6-42 shows a password provider specified in the <password-providers> section of the operational configuration file. The password provider has a name of MyPasswordProvider.

The named password provider can now be referenced from a socket provider.

Example 6-42 Configuration for naming a password provider for reference from a socket provider

<?xml version='1.0'?>
<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
   coherence-operational-config.xsd">
   <cluster-config>
      <password-providers>
          <password-provider id="MyPasswordProvider">
              <class-name>com.example.security.GetPassword</class-name>
          </password-provider>
      <password-providers>
   </cluster-config>
</coherence>

In Example 6-43, the socket provider uses MyPasswordProvider to provide the credentials for an encrypted private key file.

This can provide a flexible method of providing passwords. The socket provider configuration refers to a named password provider, rather than a hardcoded value. At runtime, different operational configuration files can be used to provide different configurations or implementations of that named provider.

Example 6-43 Configuration for a socket provider that uses a custom password provider to provide credentials

<socket-provider>
    <ssl>
        <identity-manager>
            <key>server.key</key>
            <cert>server.cert</cert>
            <password-provider>
                <name>MyPasswordProvider</name>
            </password-provider>
        </identity-manager>
        <trust-manager>
            <key-store>
                <url>file:trust.jks</url>
            </key-store>
        </trust-manager>
    </ssl>
</socket-provider>

Parameterized Password Providers

A PasswordProvider implementation can be parameterized using constructor arguments or using a static factory method with arguments.

In Example 6-44, the simple PasswordProvider has a constructor with a single int parameter. The value of the parameter determines the password returned. A real password provider would obtain the password from somewhere more secure than a hardcoded char array.

The password provider can be defined in the <password-providers> section of the operational configuration file.

Example 6-44 Parameterized password provider implementation for retrieving a password

package com.oracle.coherence.examples;

import com.tangosol.net.PasswordProvider;

public class GetPassword implements PasswordProvider {

    private final int param;

    public GetPassword(int param) {
        this.param = param;
    }

    @Override
    public char[] get()
        {
        if (param == 0) {
            return new char[]{'s', 'e', 'c', 'r', 'e', 't'};
        }
        return new char[]{'p', 'a', 's', 's', 'w', 'o', 'r', 'd'};
    }
}

In Example 6-45, the password provider in Example 6-44 is configured with a name of MyPasswordProvider. The <init-params> element is used to specify the constructor parameters. In this case, a single int parameter named password-id with a value of 0 (zero).

The named password provider can now be referenced from a socket provider.

Example 6-45 Configuration for specifying constructor parameters

<?xml version='1.0'?>
<coherence xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
   xmlns="http://xmlns.oracle.com/coherence/coherence-operational-config"
   xsi:schemaLocation="http://xmlns.oracle.com/coherence/coherence-operational-config
   coherence-operational-config.xsd">
   <cluster-config>
      <password-providers>
          <password-provider id="MyPasswordProvider">
              <class-name>com.example.security.GetPassword</class-name>
              <init-params>
                  <init-param>
                      <param-name>password-id</param-type>
                      <param-value>0</param-value>
                  </init-param>
              </init-params>
          </password-provider>
      <password-providers>
   </cluster-config>
</coherence>

In Example 6-46, the socket provider uses MyPasswordProvider to provide the credentials for an encrypted private key file. In this case, the password provider is configured with a parameter of 0 (zero), so an int value of 0 will be passed to the constructor.

Example 6-46 Configuration for using a parameterized password provider to retrieve a password

<socket-provider>
    <ssl>
        <identity-manager>
            <key>server.key</key>
            <cert>server.cert</cert>
            <password-provider>
                <name>MyPasswordProvider</name>
            </password-provider>
        </identity-manager>
        <trust-manager>
            <key-store>
                <url>file:trust.jks</url>
            </key-store>
        </trust-manager>
    </ssl>
</socket-provider>

In Example 6-47, MyPasswordProvider is used again but this time the password-id parameter is overridden to be a 1, so an int value of 1 will be passed to the password provider constructor.

Example 6-47 Configuration for using a parameterized password provider to retrieve a password with an inline parameter override

<socket-provider>
    <ssl>
        <identity-manager>
            <key>server.key</key>
            <cert>server.cert</cert>
            <password-provider>
                <name>MyPasswordProvider</name>
                <init-params>
                    <init-param>
                        <param-name>password-id</param-name>
                        <param-value>1</param-value>
                    </init-param>
                </init-params>
            </password-provider>
        </identity-manager>
        <trust-manager>
            <key-store>
                <url>file:trust.jks</url>
            </key-store>
        </trust-manager>
    </ssl>
</socket-provider>

Controlling Cipher Suite and Protocol Version Usage

An SSL socket provider can be configured to control the use of potentially weak ciphers or specific protocol versions. To control cipher suite and protocol version usage, edit the SSL socket provider definition and include the <cipher-suites> element and the <protocol-versions> elements, respectively, and enter a list of cipher suites and protocol versions using the name element. Include the usage attribute to specify whether the cipher suites and protocol versions are allowed (value of white-list) or disallowed (value of black-list). The default value for the usage attribute if no value is specified is white-list.

For example:

<socket-provider>
   <ssl>
   ...
      <cipher-suites usage="black-list">
         <name>TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256</name>
      </cipher-suites>
      <protocol-versions usage="black-list">
         <name>SSLv3</name>
      </protocol-versions>
   ...
   </ssl>
</socket-provider>

Using Host Name Verification

Learn how to configure host name verification in Oracle Coherence. A host name verifier ensures that the host name in the URL to which the client connects matches the host name in the digital certificate that the server sends back as part of the SSL connection.

A host name verifier is useful when an SSL client (for example, Coherence acting as an SSL client) connects to a cache server on a remote host. It helps to prevent man-in-the-middle attacks.

Coherence includes a default host name verifier, and provides the ability to create and use a custom host name verifier.

This section includes the following topics:

Using the Default Coherence Host Name Verifier

If you are using the default Coherence host name verifier, the host name verification passes if the host name in the certificate matches the host name to which the client tries to connect.

The default host name verifier verifies host name in two phases:
  • Verification with wildcarding.
  • Verification without wildcarding, if verification with wildcarding fails.

By default, the host name verifier is not enabled for backward compatibility. However, it is enabled in the secured production mode by default. To enable or disable the default host name verifier, see the description for the <hostname-verifier> element in ssl.

Verification with Wildcarding

If the the host name in the server certificate of the SSL session supports wildcarding, the CommonName attribute must meet the following criteria:
  • Have at least two dot ('.') characters.
  • Must start with "*."
  • Have only one "*" character.

In addition, the non-wildcarded portion of the CommonName attribute must equal the domain portion of the urlhostname parameter in a case-sensitive string comparison. The domain portion of urlhostname string is the urlhostname substring that remains after the hostname substring is removed. The hostname portion of urlhostname is the substring up to and excluding the first '.' (dot) of the urlhostname parameter string.

For example:

urlhostname: mymachine.oracle.com

CommonName: *.oracle.com

.oracle.com will compare successfully with .oracle.com.

urlhostname: mymachine.uk.oracle.com

CommonName: *.oracle.com

.uk.oracle.com will not compare successfully with .oracle.com

DNSNames obtained from the server certificate's SubjectAlternativeNames extension may be wildcarded.

Verification without Wildcarding

If wildcarded host name verification fails, the default host name verifier performs non-wildcarded verification. It verifies the CommonName attribute of the server certificate's SubjectDN or the DNSNames of the server certificate's SubjectAlternativeNames extension against the host name in the client URL (urlhostname). The certificate attribute must match the urlhostname (not case sensitive) parameter. The SubjectDN CommonName attribute is verified first, and if successful, the SubjectAlternativeNames attributes are not verified.

If the server certificate does not have a SubjectDN, or the SubjectDN does not have a CommonName attribute, then the SubjectAlternativeName attributes of type DNSNames are compared to the urlhostname parameter. The verification passes upon the first successful comparison to a DNSName. For a successful verification, the urlhostname must be equal to the certificate attribute being compared.

If urlhostname is localhost, you can set the coherence.security.ssl.allowLocalhost system property to true to enable 127.0.0.1, or the default IP address of the local machine to pass.

Using a Custom Host Name Verifier

When using a custom host name verifier, the class that implements the custom host name verifier must be specified in the CLASSPATH of Coherence (when acting as an SSL client) or a standalone SSL client.

For more information about using a custom host name verifier, see the description for the <hostname-verifier> element in ssl.

Configuring Client Authentication

You can use the <client-auth> element to specify whether a SSL/TLS socket provider should use one-way or two-way SSL/TLS authentication.

To apply <client-auth>, you must configure a socket provider with both an <identity-manager> and a <trust-manager> element in its XML configuration. If no <trust-manager> is configured, then only one-way authentication can be used. When a <trust-manager> is configured, Coherence will default to using two-way authentication.

<client-auth> is an enumeration with three valid values.

Value Description
none The socket provider does not request an authentication certificate from the client.
wanted The socket provider requests an authentication certificate from the client, but the client is not required to send one.

Corresponds to the want client auth setting in the Java SSL/TLS engine created by Coherence to manage SSL/TLS sockets.

required The socket provider requires that the client send an authentication certificate.

Corresponds to the need client auth setting in the Java SSL/TLS engine created by Coherence to manage SSL/TLS sockets.

Example 6-48 Sample One-Way SSL/TLS Authentication

The <client-auth> element is set to none so Coherence uses one-way SSL/TLS authentication, even though a trust manager has been configured.

In this case, on the SSL/TLS Engine, both want client auth and need client auth would be set to false .

...
<cluster-config>
   <socket-providers>
      <socket-provider id="mySSLConfig">
         <ssl>
            <protocol>TLS</protocol>
            <identity-manager>
               <key-store>
                  <url>file:server.jks</url>
                  <password>password</password>
               </key-store>
               <password>password</password>
            </identity-manager>
            <trust-manager>
               <key-store>
                  <url>file:trust.jks</url>
                  <password>password</password>
               </key-store>
            </trust-manager>
            <client-auth>none</client-auth>
         </ssl>
      </socket-provider>
   </socket-providers>
</cluster-config>

Example 6-49 Sample Optional Client Auth

The <client-auth> element is set to wanted so the client may send a certificate but is not required to.

In this case, on the SSL/TLS Engine, want client auth would be set to true and need client auth would be set to false .

...
<cluster-config>
   <socket-providers>
      <socket-provider id="mySSLConfig">
         <ssl>
            <protocol>TLS</protocol>
            <identity-manager>
               <key-store>
                  <url>file:server.jks</url>
                  <password>password</password>
               </key-store>
               <password>password</password>
            </identity-manager>
            <trust-manager>
               <key-store>
                  <url>file:trust.jks</url>
                  <password>password</password>
               </key-store>
            </trust-manager>
            <client-auth>wanted</client-auth>
         </ssl>
      </socket-provider>
   </socket-providers>
</cluster-config>

Using Private Key and Certificate Files

Coherence also supports using private key and certificate files directly, instead of loading them into a keystore. The examples in Specifying Passwords in Socket Provider Configuration used Java keystore files to store the private key and certificates used to establish trust and identity in Coherence SSL.

Note:

Out of the box, Coherence only supports file formats supported by the JDK. These are private key files in PEM format (that is, a file with a header of -----BEGIN RSA PRIVATE KEY----- or -----BEGIN ENCRYPTED PRIVATE KEY-----) and X509 certificate files (that is, a file with a header of -----BEGIN CERTIFICATE-----).

Configuring an Identity Manager

When configuring an <identity-manager> element of a socket provider, instead of the <keystore> element, the <key> and <cert> elements can be used to supply the private key a certificate file locations. The value for both the <key> and <cert> element is a URL from which to load the key or certificate data.

Example 6-50 shows an <identity-manager> configuration that uses a private key loaded from the /coherence/security/client.pem file and a certificate loaded from the /coherence/security/client.cert file.

Example 6-50 Sample Identity Manager Using a Private Key and a Certificate File

<socket-provider>
  <ssl>
    <identity-manager>
      <key>file:/coherence/security/client.pem</key>
      <cert>file:/coherence/security/client.cert</cert>
    </identity-manager>
  </ssl>
</socket-provider>

When configuring an <identity-manager> element, the <keystore> element, and the <key> and <cert> elements are mutually exclusive; either configure a keystore, or a key and certificate. The Coherence operational configuration XSD validation does not allow both.

Configuring a Trust Manager

When configuring a <trust-manager> element of a socket provider, instead of the <keystore> element, one or more <cert> elements can be used to supply the certificate file locations. The value for the <cert> element is a URL from which to load the certificate data.

Example 6-51 shows a <trust-manager> configuration that uses a certificate loaded from the /coherence/security/server-ca.cert file.

Example 6-51 Sample Trust Manager Using a Certificate File

<socket-provider>
  <ssl>
    <trust-manager>
      <cert>file:/coherence/security/server-ca.cert</cert>
    </trust-manager>
  </ssl>
</socket-provider>

When configuring a <trust-manager> element, the <keystore> element and the <cert> elements are mutually exclusive; either configure a keystore, or one or more certificates. The Coherence operational configuration XSD validation does not allow both.