Some Eclipse Foundation services are deprecated, or will be soon. Please ensure you've read this important communication.
Bug 345655 - Remove PKIX Validation performed on Server certificate
Summary: Remove PKIX Validation performed on Server certificate
Status: RESOLVED WONTFIX
Alias: None
Product: Jetty
Classification: RT
Component: server (show other bugs)
Version: unspecified   Edit
Hardware: PC Mac OS X - Carbon (unsup.)
: P3 normal (vote)
Target Milestone: 7.2.x   Edit
Assignee: Michael Gorovoy CLA
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2011-05-12 16:05 EDT by Chad La Joie CLA
Modified: 2011-05-16 23:33 EDT (History)
4 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Chad La Joie CLA 2011-05-12 16:05:32 EDT
Build Identifier: 7.3.1

The SslContextFactory#createSSLContext method attempts to validate the server's end-entity certificate.  In general servers don't do this because the resulting answer is meaningless.  It's up to the client to decide whether they trust the server's certificate.  In addition, if the server uses a self-signed certificate this check is going to fail.  I recommend removing it all together.

Reproducible: Always
Comment 1 Michael Gorovoy CLA 2011-05-12 20:55:45 EDT
Validation of the server's SSL certificate is mandated in high security environments that require validating the certificate before connector is started to ensure that it's certification path contains only trusted intermediate Certificate Authorities, that it is already valid, has not expired, and hasn't been revoked.

We will address the issue that the server's SSL certificate validation is coupled with client certificate validation in bug 345656.
Comment 2 Chad La Joie CLA 2011-05-12 21:07:35 EDT
It's fine to keep it, but just to be clear, that check in no way effects security. It is entirely meaningless except, perhaps, for debug purposes.
Comment 3 Greg Wilkins CLA 2011-05-16 23:33:17 EDT
Chad,

it does affect security a little bit... if only in a human factors way.   If you are able to start a server with known invalid certificates, then users are often dumb enough to just accept the warnings and add a security exception to their browsers.

cheers