001/* 002 * Licensed to the Apache Software Foundation (ASF) under one 003 * or more contributor license agreements. See the NOTICE file 004 * distributed with this work for additional information 005 * regarding copyright ownership. The ASF licenses this file 006 * to you under the Apache License, Version 2.0 (the 007 * "License"); you may not use this file except in compliance 008 * with the License. You may obtain a copy of the License at 009 * 010 * http://www.apache.org/licenses/LICENSE-2.0 011 * 012 * Unless required by applicable law or agreed to in writing, software 013 * distributed under the License is distributed on an "AS IS" BASIS, 014 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 015 * See the License for the specific language governing permissions and 016 * limitations under the License. 017 */ 018package org.apache.hadoop.hbase; 019 020import java.io.IOException; 021import java.net.Socket; 022import java.util.ArrayList; 023import javax.net.ssl.SSLSocket; 024import javax.rmi.ssl.SslRMIClientSocketFactory; 025import org.apache.yetus.audience.InterfaceAudience; 026 027/** 028 * Avoid SSL V3.0 "Poodle" Vulnerability - CVE-2014-3566 029 */ 030@SuppressWarnings("serial") 031@InterfaceAudience.Private 032public class SslRMIClientSocketFactorySecure extends SslRMIClientSocketFactory { 033 @Override 034 public Socket createSocket(String host, int port) throws IOException { 035 SSLSocket socket = (SSLSocket) super.createSocket(host, port); 036 ArrayList<String> secureProtocols = new ArrayList<>(); 037 for (String p : socket.getEnabledProtocols()) { 038 if (!p.contains("SSLv3")) { 039 secureProtocols.add(p); 040 } 041 } 042 socket.setEnabledProtocols(secureProtocols.toArray(new String[secureProtocols.size()])); 043 return socket; 044 } 045}