Accept server's self-signed ssl certificate in Java client

后端 未结 12 1482
日久生厌
日久生厌 2020-11-22 00:04

It looks like a standard question, but I couldn\'t find clear directions anywhere.

I have java code trying to connect to a server with probably self-signed (or expir

相关标签:
12条回答
  • 2020-11-22 00:26

    You have basically two options here: add the self-signed certificate to your JVM truststore or configure your client to

    Option 1

    Export the certificate from your browser and import it in your JVM truststore (to establish a chain of trust):

    <JAVA_HOME>\bin\keytool -import -v -trustcacerts
    -alias server-alias -file server.cer
    -keystore cacerts.jks -keypass changeit
    -storepass changeit 
    

    Option 2

    Disable Certificate Validation:

    // Create a trust manager that does not validate certificate chains
    TrustManager[] trustAllCerts = new TrustManager[] { 
        new X509TrustManager() {     
            public java.security.cert.X509Certificate[] getAcceptedIssuers() { 
                return new X509Certificate[0];
            } 
            public void checkClientTrusted( 
                java.security.cert.X509Certificate[] certs, String authType) {
                } 
            public void checkServerTrusted( 
                java.security.cert.X509Certificate[] certs, String authType) {
            }
        } 
    }; 
    
    // Install the all-trusting trust manager
    try {
        SSLContext sc = SSLContext.getInstance("SSL"); 
        sc.init(null, trustAllCerts, new java.security.SecureRandom()); 
        HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
    } catch (GeneralSecurityException e) {
    } 
    // Now you can access an https URL without having the certificate in the truststore
    try { 
        URL url = new URL("https://hostname/index.html"); 
    } catch (MalformedURLException e) {
    } 
    

    Note that I do not recommend the Option #2 at all. Disabling the trust manager defeats some parts of SSL and makes you vulnerable to man in the middle attacks. Prefer Option #1 or, even better, have the server use a "real" certificate signed by a well known CA.

    0 讨论(0)
  • 2020-11-22 00:26

    Trust all SSL certificates:- You can bypass SSL if you want to test on the testing server. But do not use this code for production.

    public static class NukeSSLCerts {
    protected static final String TAG = "NukeSSLCerts";
    
    public static void nuke() {
        try {
            TrustManager[] trustAllCerts = new TrustManager[] { 
                new X509TrustManager() {
                    public X509Certificate[] getAcceptedIssuers() {
                        X509Certificate[] myTrustedAnchors = new X509Certificate[0];  
                        return myTrustedAnchors;
                    }
    
                    @Override
                    public void checkClientTrusted(X509Certificate[] certs, String authType) {}
    
                    @Override
                    public void checkServerTrusted(X509Certificate[] certs, String authType) {}
                }
            };
    
            SSLContext sc = SSLContext.getInstance("SSL");
            sc.init(null, trustAllCerts, new SecureRandom());
            HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory());
            HttpsURLConnection.setDefaultHostnameVerifier(new HostnameVerifier() {
                @Override
                public boolean verify(String arg0, SSLSession arg1) {
                    return true;
                }
            });
        } catch (Exception e) { 
        }
    }
    

    }

    Please call this function in onCreate() function in Activity or in your Application Class.

    NukeSSLCerts.nuke();
    

    This can be used for Volley in Android.

    0 讨论(0)
  • 2020-11-22 00:28

    I chased down this problem to a certificate provider that is not part of the default JVM trusted hosts as of JDK 8u74. The provider is www.identrust.com, but that was not the domain I was trying to connect to. That domain had gotten its certificate from this provider. See Will the cross root cover trust by the default list in the JDK/JRE? -- read down a couple entries. Also see Which browsers and operating systems support Let’s Encrypt.

    So, in order to connect to the domain I was interested in, which had a certificate issued from identrust.com I did the following steps. Basically, I had to get the identrust.com (DST Root CA X3) certificate to be trusted by the JVM. I was able to do that using Apache HttpComponents 4.5 like so:

    1: Obtain the certificate from indettrust at Certificate Chain Download Instructions. Click on the DST Root CA X3 link.

    2: Save the string to a file named "DST Root CA X3.pem". Be sure to add the lines "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" in the file at the beginning and the end.

    3: Create a java keystore file, cacerts.jks with the following command:

    keytool -import -v -trustcacerts -alias IdenTrust -keypass yourpassword -file dst_root_ca_x3.pem -keystore cacerts.jks -storepass yourpassword
    

    4: Copy the resulting cacerts.jks keystore into the resources directory of your java/(maven) application.

    5: Use the following code to load this file and attach it to the Apache 4.5 HttpClient. This will solve the problem for all domains that have certificates issued from indetrust.com util oracle includes the certificate into the JRE default keystore.

    SSLContext sslcontext = SSLContexts.custom()
            .loadTrustMaterial(new File(CalRestClient.class.getResource("/cacerts.jks").getFile()), "yourpasword".toCharArray(),
                    new TrustSelfSignedStrategy())
            .build();
    // Allow TLSv1 protocol only
    SSLConnectionSocketFactory sslsf = new SSLConnectionSocketFactory(
            sslcontext,
            new String[] { "TLSv1" },
            null,
            SSLConnectionSocketFactory.getDefaultHostnameVerifier());
    CloseableHttpClient httpclient = HttpClients.custom()
            .setSSLSocketFactory(sslsf)
            .build();
    

    When the project builds then the cacerts.jks will be copied into the classpath and loaded from there. I didn't, at this point in time, test against other ssl sites, but if the above code "chains" in this certificate then they will work too, but again, I don't know.

    Reference: Custom SSL context and How do I accept a self-signed certificate with a Java HttpsURLConnection?

    0 讨论(0)
  • 2020-11-22 00:28

    This is not a solution to the complete problem but oracle has good detailed documentation on how to use this keytool. This explains how to

    1. use keytool.
    2. generate certs/self signed certs using keytool.
    3. import generated certs to java clients.

    https://docs.oracle.com/cd/E54932_01/doc.705/e54936/cssg_create_ssl_cert.htm#CSVSG178

    0 讨论(0)
  • 2020-11-22 00:32

    Rather than setting the default socket factory (which IMO is a bad thing) - yhis will just affect the current connection rather than every SSL connection you try to open:

    URLConnection connection = url.openConnection();
        // JMD - this is a better way to do it that doesn't override the default SSL factory.
        if (connection instanceof HttpsURLConnection)
        {
            HttpsURLConnection conHttps = (HttpsURLConnection) connection;
            // Set up a Trust all manager
            TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager()
            {
    
                public java.security.cert.X509Certificate[] getAcceptedIssuers()
                {
                    return null;
                }
    
                public void checkClientTrusted(
                    java.security.cert.X509Certificate[] certs, String authType)
                {
                }
    
                public void checkServerTrusted(
                    java.security.cert.X509Certificate[] certs, String authType)
                {
                }
            } };
    
            // Get a new SSL context
            SSLContext sc = SSLContext.getInstance("TLSv1.2");
            sc.init(null, trustAllCerts, new java.security.SecureRandom());
            // Set our connection to use this SSL context, with the "Trust all" manager in place.
            conHttps.setSSLSocketFactory(sc.getSocketFactory());
            // Also force it to trust all hosts
            HostnameVerifier allHostsValid = new HostnameVerifier() {
                public boolean verify(String hostname, SSLSession session) {
                    return true;
                }
            };
            // and set the hostname verifier.
            conHttps.setHostnameVerifier(allHostsValid);
        }
    InputStream stream = connection.getInputStream();
    
    0 讨论(0)
  • 2020-11-22 00:32

    The accepted answer needs an Option 3

    ALSO Option 2 is TERRIBLE. It should NEVER be used (esp. in production) since it provides a FALSE sense of security. Just use HTTP instead of Option 2.

    OPTION 3

    Use the self-signed certificate to make the Https connection.

    Here is an example:

    import javax.net.ssl.SSLContext;
    import javax.net.ssl.SSLSocket;
    import javax.net.ssl.SSLSocketFactory;
    import javax.net.ssl.TrustManagerFactory;
    import java.io.BufferedReader;
    import java.io.BufferedWriter;
    import java.io.File;
    import java.io.FileInputStream;
    import java.io.IOException;
    import java.io.InputStreamReader;
    import java.io.OutputStreamWriter;
    import java.io.PrintWriter;
    import java.net.URL;
    import java.security.KeyManagementException;
    import java.security.KeyStoreException;
    import java.security.NoSuchAlgorithmException;
    import java.security.cert.Certificate;
    import java.security.cert.CertificateException;
    import java.security.cert.CertificateFactory;
    import java.security.KeyStore;
    
    /*
     * Use a SSLSocket to send a HTTP GET request and read the response from an HTTPS server.
     * It assumes that the client is not behind a proxy/firewall
     */
    
    public class SSLSocketClientCert
    {
        private static final String[] useProtocols = new String[] {"TLSv1.2"};
        public static void main(String[] args) throws Exception
        {
            URL inputUrl = null;
            String certFile = null;
            if(args.length < 1)
            {
                System.out.println("Usage: " + SSLSocketClient.class.getName() + " <url>");
                System.exit(1);
            }
            if(args.length == 1)
            {
                inputUrl = new URL(args[0]);
            }
            else
            {
                inputUrl = new URL(args[0]);
                certFile = args[1];
            }
            SSLSocket sslSocket = null;
            PrintWriter outWriter = null;
            BufferedReader inReader = null;
            try
            {
                SSLSocketFactory sslSocketFactory = getSSLSocketFactory(certFile);
    
                sslSocket = (SSLSocket) sslSocketFactory.createSocket(inputUrl.getHost(), inputUrl.getPort() == -1 ? inputUrl.getDefaultPort() : inputUrl.getPort());
                String[] enabledProtocols = sslSocket.getEnabledProtocols();
                System.out.println("Enabled Protocols: ");
                for(String enabledProtocol : enabledProtocols) System.out.println("\t" + enabledProtocol);
    
                String[] supportedProtocols = sslSocket.getSupportedProtocols();
                System.out.println("Supported Protocols: ");
                for(String supportedProtocol : supportedProtocols) System.out.println("\t" + supportedProtocol + ", ");
    
                sslSocket.setEnabledProtocols(useProtocols);
    
                /*
                 * Before any data transmission, the SSL socket needs to do an SSL handshake.
                 * We manually initiate the handshake so that we can see/catch any SSLExceptions.
                 * The handshake would automatically  be initiated by writing & flushing data but
                 * then the PrintWriter would catch all IOExceptions (including SSLExceptions),
                 * set an internal error flag, and then return without rethrowing the exception.
                 *
                 * This means any error messages are lost, which causes problems here because
                 * the only way to tell there was an error is to call PrintWriter.checkError().
                 */
                sslSocket.startHandshake();
                outWriter = sendRequest(sslSocket, inputUrl);
                readResponse(sslSocket);
                closeAll(sslSocket, outWriter, inReader);
            }
            catch(Exception e)
            {
                e.printStackTrace();
            }
            finally
            {
                closeAll(sslSocket, outWriter, inReader);
            }
        }
    
        private static PrintWriter sendRequest(SSLSocket sslSocket, URL inputUrl) throws IOException
        {
            PrintWriter outWriter = new PrintWriter(new BufferedWriter(new OutputStreamWriter(sslSocket.getOutputStream())));
            outWriter.println("GET " + inputUrl.getPath() + " HTTP/1.1");
            outWriter.println("Host: " + inputUrl.getHost());
            outWriter.println("Connection: Close");
            outWriter.println();
            outWriter.flush();
            if(outWriter.checkError())        // Check for any PrintWriter errors
                System.out.println("SSLSocketClient: PrintWriter error");
            return outWriter;
        }
    
        private static void readResponse(SSLSocket sslSocket) throws IOException
        {
            BufferedReader inReader = new BufferedReader(new InputStreamReader(sslSocket.getInputStream()));
            String inputLine;
            while((inputLine = inReader.readLine()) != null)
                System.out.println(inputLine);
        }
    
        // Terminate all streams
        private static void closeAll(SSLSocket sslSocket, PrintWriter outWriter, BufferedReader inReader) throws IOException
        {
            if(sslSocket != null) sslSocket.close();
            if(outWriter != null) outWriter.close();
            if(inReader != null) inReader.close();
        }
    
        // Create an SSLSocketFactory based on the certificate if it is available, otherwise use the JVM default certs
        public static SSLSocketFactory getSSLSocketFactory(String certFile)
            throws CertificateException, KeyStoreException, IOException, NoSuchAlgorithmException, KeyManagementException
        {
            if (certFile == null) return (SSLSocketFactory) SSLSocketFactory.getDefault();
            Certificate certificate = CertificateFactory.getInstance("X.509").generateCertificate(new FileInputStream(new File(certFile)));
    
            KeyStore keyStore = KeyStore.getInstance(KeyStore.getDefaultType());
            keyStore.load(null, null);
            keyStore.setCertificateEntry("server", certificate);
    
            TrustManagerFactory trustManagerFactory = TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm());
            trustManagerFactory.init(keyStore);
    
            SSLContext sslContext = SSLContext.getInstance("TLS");
            sslContext.init(null, trustManagerFactory.getTrustManagers(), null);
    
            return sslContext.getSocketFactory();
        }
    }
    
    
    0 讨论(0)
提交回复
热议问题