CryptoPage edited by Franz ForsthoferChanges (8)
Full ContentCryptoAvailable as of Camel 2.3 The Crypto Data Format integrates the Java Cryptographic Extension into Camel, allowing simple and flexible encryption and decryption of messages using Camel's familiar marshall and unmarshal formatting mechanism. It assumes marshalling to mean encryption to cyphertext and unmarshalling to mean decryption back to the original plaintext. This data format implements only symmetric (shared-key) encryption and decyption. Options
Basic UsageAt its most basic all that is required to encrypt/decrypt an exchange is a shared secret key. If one or more instances of the Crypto data format are configured with this key the format can be used to encrypt the payload in one route (or part of one) and decrypted in another. For example, using the Java DSL as follows: In Spring the dataformat is configured first and then used in routes <camelContext id="camel" xmlns="http://camel.apache.org/schema/spring"> <dataFormats> <crypto id="basic" algorithm="DES" keyRef="desKey" /> </dataFormats> ... <route> <from uri="direct:basic-encryption" /> <marshal ref="basic" /> <to uri="mock:encrypted" /> <unmarshal ref="basic" /> <to uri="mock:unencrypted" /> </route> </camelContext>
Hashed Message Authentication Codes (HMAC)To avoid attacks against the encrypted data while it is in transit the CryptoDataFormat can also calculate a Message Authentication Code for the encrypted exchange contents based on a configurable MAC algorithm. The calculated HMAC is appended to the stream after encryption. It is separated from the stream in the decryption phase. The MAC is recalculated and verified against the transmitted version to insure nothing was tampered with in transit.For more information on Message Authentication Codes see http://en.wikipedia.org/wiki/HMAC or with spring. By default the HMAC is calculated using the HmacSHA1 mac algorithm though this can be easily changed by supplying a different algorithm name. See here for how to check what algorithms are available through the configured security providers or with spring. Supplying Keys DynamicallyWhen using a Recipient list or similar EIP the recipient of an exchange can vary dynamically. Using the same key across all recipients may neither be feasible or desirable. It would be useful to be able to specify keys dynamically on a per exchange basis. The exchange could then be dynamically enriched with the key of its target recipient before being processed by the data format. To facilitate this the DataFormat allow for keys to be supplied dynamically via the message headers below
or with spring. PGPDataFormat Options
PGPDataFormat Message HeadersYou can override the PGPDataFormat options by applying below headers into message dynamically.
Encrypting with PGPDataFormatThe following sample uses the popular PGP format for encrypting/decrypting files using the Bouncy Castle Java libraries: The following sample performs signing + encryption, and then signature verification + decryption. It uses the same keyring for both signing and encryption, but you can obviously use different keys: Or using Spring: To work with the previous example you need the following
Managing your keyringTo manage the keyring, I use the command line tools, I find this to be the simplest approach in managing the keys. There are also Java libraries available from http://www.bouncycastle.org/java.html if you would prefer to do it that way.
PGP Decrypting/Verifying of Messages Encrypted/Signed by Different Private/Public KeysSince Camel 2.12.2. A PGP Data Formater can decrypt/verify messages which have been encrypted by different public keys or signed by different private keys. Just, provide the corresponding private keys in the secret keyring, the corresponding public keys in the public keyring, and the passphrases in the passphrase accessor. Map<String, String> userId2Passphrase = new HashMap<String, String>(2); // add passphrases of several private keys whose corresponding public keys have been used to encrypt the messages userId2Passphrase.put("key1","passphrase1"); userId2Passphrase.put("key2","passphrase2"); PGPPassphraseAccessor passphraseAccessor = new PGPPassphraseAccessorDefault(userId2Passphrase); PGPDataFormat pgpVerifyAndDecrypt = new PGPDataFormat(); pgpVerifyAndDecrypt.setPassphraseAccessor(passphraseAccessor); // the method getSecKeyRing() provides the secret keyring as byte array containing the private keys pgpVerifyAndDecrypt.setEncryptionKeyRing(getSecKeyRing()); // alternatively you can use setKeyFileName(keyfileName) // the method getPublicKeyRing() provides the public keyring as byte array containing the public keys pgpVerifyAndDecrypt.setSignatureKeyRing((getPublicKeyRing()); // alternatively you can use setSignatureKeyFileName(signatgureKeyfileName) // it is not necessary to specify the User Id from("direct:start") ... .unmarshal(pgpVerifyAndDecrypt) // can decrypt/verify messages encrypted/signed by different private/public keys ...
DependenciesTo use the Crypto dataformat in your camel routes you need to add the following dependency to your pom. <dependency> <groupId>org.apache.camel</groupId> <artifactId>camel-crypto</artifactId> <version>x.x.x</version> <!-- use the same version as your Camel core version --> </dependency> See Also
Stop watching space
|
Change email notification preferences
View Online
|
View Changes
|
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto Franz Forsthofer (Confluence)
- [CONF] Apache Camel > Crypto willem jiang (Confluence)