| Summary: | Remove PKIX Validation performed on Server certificate | ||
|---|---|---|---|
| Product: | [RT] Jetty | Reporter: | Chad La Joie <clajoie> |
| Component: | server | Assignee: | Michael Gorovoy <mgorovoy> |
| Status: | RESOLVED WONTFIX | QA Contact: | |
| Severity: | normal | ||
| Priority: | P3 | CC: | gregw, gunnar, jetty-inbox, mgorovoy |
| Version: | unspecified | ||
| Target Milestone: | 7.2.x | ||
| Hardware: | PC | ||
| OS: | Mac OS X - Carbon (unsup.) | ||
| Whiteboard: | |||
|
Description
Chad La Joie
Validation of the server's SSL certificate is mandated in high security environments that require validating the certificate before connector is started to ensure that it's certification path contains only trusted intermediate Certificate Authorities, that it is already valid, has not expired, and hasn't been revoked. We will address the issue that the server's SSL certificate validation is coupled with client certificate validation in bug 345656. It's fine to keep it, but just to be clear, that check in no way effects security. It is entirely meaningless except, perhaps, for debug purposes. Chad, it does affect security a little bit... if only in a human factors way. If you are able to start a server with known invalid certificates, then users are often dumb enough to just accept the warnings and add a security exception to their browsers. cheers |