Trust Anchor not found for Android SSL Connection

后端 未结 17 819
囚心锁ツ
囚心锁ツ 2020-11-22 05:06

I am trying to connect to an IIS6 box running a godaddy 256bit SSL cert, and I am getting the error :

java.security.cert.CertPathValidatorException: Trust an         


        
相关标签:
17条回答
  • 2020-11-22 05:16

    I have had a similar problem and I have completely ruled out the strategy of trusting all sources.

    I share here my solution applied to an application implemented in Kotlin

    I would first recommend using the following website to obtain information about the certificate and its validity

    If it does not appear as an 'Accepted Issuers' in the Android default trust store, we must get that certificate and incorporate it into the application to create a custom trust store

    The ideal solution in my case was to create a high-level Trust Manager that combines the custom and the Android default trust store

    Here he exposes the high level code used to configure the OkHttpClient that he used with Retrofit.

    override fun onBuildHttpClient(httpClientBuild: OkHttpClient.Builder) {
    
            val trustManagerWrapper = createX509TrustManagerWrapper(
                arrayOf(
                    getCustomX509TrustManager(),
                    getDefaultX509TrustManager()
                )
            )
    
            printX509TrustManagerAcceptedIssuers(trustManagerWrapper)
    
            val sslSocketFactory = createSocketFactory(trustManagerWrapper)
            httpClientBuild.sslSocketFactory(sslSocketFactory, trustManagerWrapper)
    
        }
    

    In this way, I could communicate with the server with a self-signed certificate and with other servers with a certificate issued by a trusted certification entity

    This is it, I hope it can help someone.

    0 讨论(0)
  • 2020-11-22 05:18

    Replying to very old post. But maybe it will help some newbie and if non of the above works out.

    Explanation: I know nobody wants explanation crap; rather the solution. But in one liner, you are trying to access a service from your local machine to a remote machine which does not trust your machine. You request need to gain the trust from remote server.

    Solution: The following solution assumes that you have the following conditions met

    1. Trying to access a remote api from your local machine.
    2. You are building for Android app
    3. Your remote server is under proxy filtration (you use proxy in your browser setting to access the remote api service, typically a staging or dev server)
    4. You are testing on real device

    Steps:

    You need a .keystore extension file to signup your app. If you don't know how to create .keystore file; then follow along with the following section Create .keystore file or otherwise skip to next section Sign Apk File

    Create .keystore file

    Open Android Studio. Click top menu Build > Generate Signed APK. In the next window click the Create new... button. In the new window, please input in data in all fields. Remember the two Password field i recommend should have the same password; don't use different password; and also remember the save path at top most field Key store path:. After you input all the field click OK button.

    Sign Apk File

    Now you need to build a signed app with the .keystore file you just created. Follow these steps

    1. Build > Clean Project, wait till it finish cleaning
    2. Build > Generate Signed APK
    3. Click Choose existing... button
    4. Select the .keystore file we just created in the Create .keystore file section
    5. Enter the same password you created while creating in Create .keystore file section. Use same password for Key store password and Key password fields. Also enter the alias
    6. Click Next button
    7. In the next screen; which might be different based on your settings in build.gradle files, you need to select Build Types and Flavors.
    8. For the Build Types choose release from the dropdown
    9. For Flavors however it will depends on your settings in build.gradle file. Choose staging from this field. I used the following settings in the build.gradle, you can use the same as mine, but make sure you change the applicationId to your package name

      productFlavors {
          staging {
              applicationId "com.yourapplication.package"
              manifestPlaceholders = [icon: "@drawable/ic_launcher"]
              buildConfigField "boolean", "CATALYST_DEBUG", "true"
              buildConfigField "boolean", "ALLOW_INVALID_CERTIFICATE", "true"
          }
          production {
              buildConfigField "boolean", "CATALYST_DEBUG", "false"
              buildConfigField "boolean", "ALLOW_INVALID_CERTIFICATE", "false"
          }
      }
      
    10. Click the bottom two Signature Versions checkboxes and click Finish button.

    Almost There:

    All the hardwork is done, now the movement of truth. Inorder to access the Staging server backed-up by proxy, you need to make some setting in your real testing Android devices.

    Proxy Setting in Android Device:

    1. Click the Setting inside Android phone and then wi-fi
    2. Long press on the connected wifi and select Modify network
    3. Click the Advanced options if you can't see the Proxy Hostname field
    4. In the Proxy Hostname enter the host IP or name you want to connect. A typical staging server will be named as stg.api.mygoodcompany.com
    5. For the port enter the four digit port number for example 9502
    6. Hit the Save button

    One Last Stop:

    Remember we generated the signed apk file in Sign APK File section. Now is the time to install that APK file.

    1. Open a terminal and changed to the signed apk file folder
    2. Connect your Android device to your machine
    3. Remove any previous installed apk file from the Android device
    4. Run adb install name of the apk file
    5. If for some reason the above command return with adb command not found. Enter the full path as C:\Users\shah\AppData\Local\Android\sdk\platform-tools\adb.exe install name of the apk file

    I hope the problem might be solved. If not please leave me a comments.

    Salam!

    0 讨论(0)
  • The Trust anchor error can happen for a lot of reasons. For me it was simply that I was trying to access https://example.com/ instead of https://www.example.com/.

    So you might want to double-check your URLs before starting to build your own Trust Manager (like I did).

    0 讨论(0)
  • 2020-11-22 05:22

    Contrary to the accepted answer you do not need a custom trust manager, you need to fix your server configuration!

    I hit the same problem while connecting to an Apache server with an incorrectly installed dynadot/alphassl certificate. I'm connecting using HttpsUrlConnection (Java/Android), which was throwing -

    javax.net.ssl.SSLHandshakeException: 
      java.security.cert.CertPathValidatorException: 
        Trust anchor for certification path not found.
    

    The actual problem is a server misconfiguration - test it with http://www.digicert.com/help/ or similar, and it will even tell you the solution:

    "The certificate is not signed by a trusted authority (checking against Mozilla's root store). If you bought the certificate from a trusted authority, you probably just need to install one or more Intermediate certificates. Contact your certificate provider for assistance doing this for your server platform."

    You can also check the certificate with openssl:

    openssl s_client -debug -connect www.thedomaintocheck.com:443

    You'll probably see:

    Verify return code: 21 (unable to verify the first certificate)

    and, earlier in the output:

    depth=0 OU = Domain Control Validated, CN = www.thedomaintocheck.com
    verify error:num=20:unable to get local issuer certificate
    verify return:1
    depth=0 OU = Domain Control Validated, CN = www.thedomaintocheck.com
    verify error:num=27:certificate not trusted
    verify return:1
    depth=0 OU = Domain Control Validated, CN = www.thedomaintocheck.com
    verify error:num=21:unable to verify the first certificate`
    

    The certificate chain will only contain 1 element (your certificate):

    Certificate chain
     0 s:/OU=Domain Control Validated/CN=www.thedomaintocheck.com
      i:/O=AlphaSSL/CN=AlphaSSL CA - G2
    

    ... but should reference the signing authorities in a chain back to one which is trusted by Android (Verisign, GlobalSign, etc):

    Certificate chain
     0 s:/OU=Domain Control Validated/CN=www.thedomaintocheck.com
       i:/O=AlphaSSL/CN=AlphaSSL CA - G2
     1 s:/O=AlphaSSL/CN=AlphaSSL CA - G2
       i:/C=BE/O=GlobalSign nv-sa/OU=Root CA/CN=GlobalSign Root CA
     2 s:/C=BE/O=GlobalSign nv-sa/OU=Root CA/CN=GlobalSign Root CA
       i:/C=BE/O=GlobalSign nv-sa/OU=Root CA/CN=GlobalSign Root CA
    

    Instructions (and the intermediate certificates) for configuring your server are usually provided by the authority that issued your certificate, for example: http://www.alphassl.com/support/install-root-certificate.html

    After installing the intermediate certificates provided by my certificate issuer I now have no errors when connecting using HttpsUrlConnection.

    0 讨论(0)
  • 2020-11-22 05:28

    I know that you don't need to trust all certificates but in my case I had problems with some debugging environments where we had self-signed certificates and I needed a dirty solution.

    All I had to do was to change the initialization of the sslContext

    mySSLContext.init(null, trustAllCerts, null); 
    

    where trustAllCerts was created like this:

    private final TrustManager[] trustAllCerts= new TrustManager[] { new X509TrustManager() {
        public java.security.cert.X509Certificate[] getAcceptedIssuers() {
            return new java.security.cert.X509Certificate[]{};
        }
    
        public void checkClientTrusted(X509Certificate[] chain,
                                       String authType) throws CertificateException {
        }
    
        public void checkServerTrusted(X509Certificate[] chain,
                                       String authType) throws CertificateException {
        }
    } };
    

    Hope that this will come in handy.

    0 讨论(0)
  • 2020-11-22 05:30

    Update based on latest Android documentation (March 2017):

    When you get this type of error:

    javax.net.ssl.SSLHandshakeException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
            at org.apache.harmony.xnet.provider.jsse.OpenSSLSocketImpl.startHandshake(OpenSSLSocketImpl.java:374)
            at libcore.net.http.HttpConnection.setupSecureSocket(HttpConnection.java:209)
            at libcore.net.http.HttpsURLConnectionImpl$HttpsEngine.makeSslConnection(HttpsURLConnectionImpl.java:478)
            at libcore.net.http.HttpsURLConnectionImpl$HttpsEngine.connect(HttpsURLConnectionImpl.java:433)
            at libcore.net.http.HttpEngine.sendSocketRequest(HttpEngine.java:290)
            at libcore.net.http.HttpEngine.sendRequest(HttpEngine.java:240)
            at libcore.net.http.HttpURLConnectionImpl.getResponse(HttpURLConnectionImpl.java:282)
            at libcore.net.http.HttpURLConnectionImpl.getInputStream(HttpURLConnectionImpl.java:177)
            at libcore.net.http.HttpsURLConnectionImpl.getInputStream(HttpsURLConnectionImpl.java:271)
    

    the issue could be one of the following:

    1. The CA that issued the server certificate was unknown
    2. The server certificate wasn't signed by a CA, but was self signed
    3. The server configuration is missing an intermediate CA

    The solution is to teach HttpsURLConnection to trust a specific set of CAs. How? Please check https://developer.android.com/training/articles/security-ssl.html#CommonProblems

    Others who are using AsyncHTTPClient from com.loopj.android:android-async-http library, please check Setup AsyncHttpClient to use HTTPS.

    0 讨论(0)
提交回复
热议问题