You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
There's still plenty more that could be done, but I want to keep this on
the simpler/less-invasive side and it'd just delay these changes for no
real benefit.
Copy file name to clipboardexpand all lines: SECURITY.md
+55-86
Original file line number
Diff line number
Diff line change
@@ -1,10 +1,16 @@
1
1
# Security Policy
2
2
3
-
For information on gRPC Security Policy and reporting potentional security issues, please see [gRPC CVE Process](https://github.com/grpc/proposal/blob/master/P4-grpc-cve-process.md).
3
+
For information on gRPC Security Policy and reporting potentional security
gRPC supports a number of different mechanisms for asserting identity between an client and server. This document provides code samples demonstrating how to provide SSL/TLS encryption support and identity assertions in Java, as well as passing OAuth2 tokens to services that support it.
10
+
gRPC supports a number of different mechanisms for asserting identity between an
11
+
client and server. This document provides code samples demonstrating how to
12
+
provide SSL/TLS encryption support and identity assertions in Java, as well as
13
+
passing OAuth2 tokens to services that support it.
Provider][] to ensure your application has an up-to-date OpenSSL library with
29
+
the necessary cipher-suites and a reliable ALPN implementation. This requires
30
+
[updating the security provider at runtime][config-psdsp].
27
31
28
32
Although ALPN mostly works on newer Android releases (especially since 5.0),
29
33
there are bugs and discovered security vulnerabilities that are only fixed by
30
34
upgrading the security provider. Thus, we recommend using the Play Service
31
35
Dynamic Security Provider for all Android versions.
32
36
33
-
*Note: The Dynamic Security Provider must be installed **before** creating a gRPC OkHttp channel. gRPC's OkHttpProtocolNegotiator statically initializes the security protocol(s) available to gRPC, which means that changes to the security provider after the first channel is created will not be picked up by gRPC.*
37
+
*Note: The Dynamic Security Provider must be installed **before** creating a
38
+
gRPC OkHttp channel. gRPC statically initializes the security protocol(s)
39
+
available, which means that changes to the security provider after the first
gRPC historically supported Jetty ALPN for ALPN on Java 8. While functional, it
251
-
suffers from poor performance and breakages when the JRE is upgraded.
252
-
When mis-matched to the JRE version, it can also produce unpredictable errors
253
-
that are hard to diagnose. When using it, it became common practice that any
254
-
time we saw a TLS failure that made no sense we would blame a Jetty ALPN/JRE
255
-
version mismatch and we were overwhelmingly correct. The Jetty ALPN agent makes
256
-
it much easier to use, but we still strongly discourage Jetty ALPN's use.
257
-
258
-
When using Jetty ALPN with Java 8, realize that performance will be 2-10% that
259
-
of the other options due to a slow AES GCM implementation in Java.
260
-
261
-
#### Configuring Jetty ALPN in Web Containers
262
-
263
-
Some web containers, such as [Jetty](https://www.eclipse.org/jetty/documentation/current/jetty-classloading.html) restrict access to server classes for web applications. A gRPC client running within such a container must be properly configured to allow access to the ALPN classes. In Jetty, this is done by including a `WEB-INF/jetty-env.xml` file containing the following:
264
-
265
-
```xml
266
-
<?xml version="1.0" encoding="ISO-8859-1"?>
267
-
<!DOCTYPEConfigure PUBLIC "-//Mort Bay Consulting//DTD Configure//EN" "http://www.eclipse.org/jetty/configure.dtd">
Server server =Grpc.newServerBuilderForPort(8443, creds)
287
266
.addService(serviceImplementation)
288
-
.build();
289
-
server.start();
267
+
.build()
268
+
.start();
290
269
```
291
270
292
271
If the issuing certificate authority is not known to the client then a properly
293
-
configured SslContext or SSLSocketFactory should be provided to the
294
-
NettyChannelBuilder or OkHttpChannelBuilder, respectively.
272
+
configured trust manager should be provided to TlsChannelCredentials and used to
273
+
construct the channel.
295
274
296
275
## Mutual TLS
297
276
298
277
[Mutual authentication][] (or "client-side authentication") configuration is similar to the server by providing truststores, a client certificate and private key to the client channel. The server must also be configured to request a certificate from clients, as well as truststores for which client certificates it should allow.
Negotiated client certificates are available in the SSLSession, which is found in the `TRANSPORT_ATTR_SSL_SESSION` attribute of <ahref="https://github.com/grpc/grpc-java/blob/master/core/src/main/java/io/grpc/Grpc.java">Grpc</a>. A server interceptor can provide details in the current Context.
287
+
Negotiated client certificates are available in the SSLSession, which is found
288
+
in the `Grpc.TRANSPORT_ATTR_SSL_SESSION` attribute of the call. A server
289
+
interceptor can provide details in the current Context.
@@ -358,10 +343,6 @@ If on Fedora 30 or later and you see "libcrypt.so.1: cannot open shared object
358
343
file: No such file or directory". Run `dnf -y install libxcrypt-compat` to
359
344
install the necessary dependency.
360
345
361
-
If you are running inside of an embedded Tomcat runtime (e.g., Spring Boot),
362
-
then some versions of `netty-tcnative-boringssl-static` will have conflicts and
363
-
won't work. You must use gRPC 1.4.0 or later.
364
-
365
346
Most dependency versioning problems can be solved by using
366
347
`io.grpc:grpc-netty-shaded` instead of `io.grpc:grpc-netty`, although this also
367
348
limits your usage of the Netty-specific APIs. `io.grpc:grpc-netty-shaded`
@@ -418,19 +399,12 @@ grpc-netty version | netty-handler version | netty-tcnative-boringssl-static ver
418
399
_(grpc-netty-shaded avoids issues with keeping these versions in sync.)_
419
400
420
401
### OkHttp
421
-
If you are using gRPC on Android devices, you are most likely using `grpc-okhttp` transport.
422
-
423
-
Find the dependency tree (e.g., `mvn dependency:tree`), and look for versions of:
424
-
-`io.grpc:grpc-okhttp`
425
-
-`com.squareup.okhttp:okhttp`
426
-
427
-
If you don't have `grpc-okhttp`, you should add it as a dependency.
428
-
429
-
If you have both `io.grpc:grpc-netty` and `io.grpc:grpc-okhttp`, you may also have issues. Remove `grpc-netty` if you are on Android.
430
-
431
-
If you have `okhttp` version below 2.5.0, then it may not work with gRPC.
402
+
If you are using gRPC on Android devices, you are most likely using
403
+
`grpc-okhttp` transport.
432
404
433
-
It is OK to have both `okhttp` 2.x and 3.x since they have different group name and under different packages.
405
+
Find the dependency tree (e.g., `mvn dependency:tree`), and look for
406
+
`io.grpc:grpc-okhttp`. If you don't have `grpc-okhttp`, you should add it as a
407
+
dependency.
434
408
435
409
# gRPC over plaintext
436
410
@@ -441,17 +415,12 @@ An option is provided to use gRPC over plaintext without TLS. While this is conv
441
415
The following code snippet shows how you can call the Google Cloud PubSub API using gRPC with a service account. The credentials are loaded from a key stored in a well-known location or by detecting that the application is running in an environment that can provide one automatically, e.g. Google Compute Engine. While this example is specific to Google and it's services, similar patterns can be followed for other service providers.
0 commit comments