001/*
002 * Licensed to the Apache Software Foundation (ASF) under one
003 * or more contributor license agreements.  See the NOTICE file
004 * distributed with this work for additional information
005 * regarding copyright ownership.  The ASF licenses this file
006 * to you under the Apache License, Version 2.0 (the
007 * "License"); you may not use this file except in compliance
008 * with the License.  You may obtain a copy of the License at
009 *
010 *     http://www.apache.org/licenses/LICENSE-2.0
011 *
012 * Unless required by applicable law or agreed to in writing, software
013 * distributed under the License is distributed on an "AS IS" BASIS,
014 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
015 * See the License for the specific language governing permissions and
016 * limitations under the License.
017 */
018package org.apache.hadoop.hbase;
019
020import java.io.IOException;
021import java.net.Socket;
022import java.util.ArrayList;
023import javax.net.ssl.SSLSocket;
024import javax.rmi.ssl.SslRMIClientSocketFactory;
025import org.apache.yetus.audience.InterfaceAudience;
026
027/**
028 * Avoid SSL V3.0 "Poodle" Vulnerability - CVE-2014-3566
029 */
030@SuppressWarnings("serial")
031@InterfaceAudience.Private
032public class SslRMIClientSocketFactorySecure extends SslRMIClientSocketFactory {
033  @Override
034  public Socket createSocket(String host, int port) throws IOException {
035    SSLSocket socket = (SSLSocket) super.createSocket(host, port);
036    ArrayList<String> secureProtocols = new ArrayList<>();
037    for (String p : socket.getEnabledProtocols()) {
038      if (!p.contains("SSLv3")) {
039        secureProtocols.add(p);
040      }
041    }
042    socket.setEnabledProtocols(secureProtocols.toArray(new String[secureProtocols.size()]));
043    return socket;
044  }
045}