Exception : javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated

前端 未结 7 2318
时光取名叫无心
时光取名叫无心 2020-12-08 06:06
public HttpClientVM() {

    BasicHttpParams params = new BasicHttpParams();
    ConnManagerParams.setMaxTotalConnections(params, 10);
    HttpProtocolParams.setVers         


        
相关标签:
7条回答
  • 2020-12-08 06:39

    This can also happen if you are attempting to connect over HTTPS and the server is not configured to handle SSL connections correctly.

    I would check your application servers SSL settings and make sure that the certification is configured correctly.

    0 讨论(0)
  • 2020-12-08 06:46

    Expired certificate was the cause of our "javax.net.ssl.SSLPeerUnverifiedException: peer not authenticated".

    keytool -list -v -keystore filetruststore.ts

        Enter keystore password:
        Keystore type: JKS
        Keystore provider: SUN
        Your keystore contains 1 entry
        Alias name: somealias
        Creation date: Jul 26, 2012
        Entry type: PrivateKeyEntry
        Certificate chain length: 1
        Certificate[1]:
        Owner: CN=Unknown, OU=SomeOU, O="Some Company, Inc.", L=SomeCity, ST=GA, C=US
        Issuer: CN=Unknown, OU=SomeOU, O=Some Company, Inc.", L=SomeCity, ST=GA, C=US
        Serial number: 5011a47b
        Valid from: Thu Jul 26 16:11:39 EDT 2012 until: Wed Oct 24 16:11:39 EDT 2012
    
    0 讨论(0)
  • 2020-12-08 06:46

    This exception will come in case your server is based on JDK 7 and your client is on JDK 6 and using SSL certificates. In JDK 7 sslv2hello message handshaking is disabled by default while in JDK 6 sslv2hello message handshaking is enabled. For this reason when your client trying to connect server then a sslv2hello message will be sent towards server and due to sslv2hello message disable you will get this exception. To solve this either you have to move your client to JDK 7 or you have to use 6u91 version of JDK. But to get this version of JDK you have to get the MOS (My Oracle Support) Enterprise support. This patch is not public.

    0 讨论(0)
  • 2020-12-08 06:52

    In my case I was using a JDK 8 client and the server was using insecure old ciphers. The server is Apache and I added this line to the Apache config:

    SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:!MEDIUM:!LOW:!SSLv2:!EXPORT
    

    You should use a tool like this to verify your SSL configuration is currently secure: https://www.ssllabs.com/ssltest/analyze.html

    0 讨论(0)
  • 2020-12-08 06:54

    This error is because your server doesn't have a valid SSL certificate. Hence we need to tell the client to use a different TrustManager. Here is a sample code:

    SSLContext ctx = SSLContext.getInstance("TLS");
    X509TrustManager tm = new X509TrustManager() {
    
        public void checkClientTrusted(X509Certificate[] xcs, String string) throws CertificateException {
        }
    
        public void checkServerTrusted(X509Certificate[] xcs, String string) throws CertificateException {
        }
    
        public X509Certificate[] getAcceptedIssuers() {
            return null;
        }
    };
    ctx.init(null, new TrustManager[]{tm}, null);
    SSLSocketFactory ssf = new SSLSocketFactory(ctx,SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER);
    ClientConnectionManager ccm = base.getConnectionManager();
    SchemeRegistry sr = ccm.getSchemeRegistry();
    sr.register(new Scheme("https", 443, ssf));
    
    client = new DefaultHttpClient(ccm, base.getParams());
    
    0 讨论(0)
  • 2020-12-08 07:04

    You can get this if the client specifies "https" but the server is only running "http". So, the server isn't expecting to make a secure connection.

    0 讨论(0)
提交回复
热议问题