gpt4 book ai didi

java - 为什么 Java 6 接收的 SSL 证书链与 Java 7 不同?

转载 作者:太空宇宙 更新时间:2023-11-03 13:17:35 24 4
gpt4 key购买 nike

我们重新配置了其中一台服务器,以更改其中一台虚拟主机的主机名。

我们的服务器配置来自:

<VirtualHost *:443>
ServerName test.olddomain.com

SSLEngine on
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL

SSLCertificateFile "D:/Security/wildcard/OLDDOMAIN.COM.crt"
SSLCertificateKeyFile "D:/Security/wildcard/OLDDOMAIN.COM.key"
SSLCertificateChainFile "D:/Security/wildcard/CertChain.crt"

...
</VirtualHost>

到:

<VirtualHost *:443>
ServerName test.newdomain.com
ServerAlias test.olddomain.com

SSLEngine on
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL

SSLCertificateFile "D:/Security/wildcard/NEWDOMAIN.COM.crt"
SSLCertificateKeyFile "D:/Security/wildcard/NEWDOMAIN.COM.key"
SSLCertificateChainFile "D:/Security/wildcard/CertChain.crt"

...
</VirtualHost>

使用任何网络浏览器,我们都可以很好地访问该站点,我们没有任何证书问题。但是,当我尝试从 Java 6 访问 URL 时出现此错误:

java.security.cert.CertificateException: No subject alternative DNS name matching test.newdomain.com found

我尝试使用 -Djavax.net.debug=SSL 选项运行 java,奇怪的是 java 正在获取旧域的证书:

*** Certificate chain
chain [X] = [
[
Version: VX
Subject: CN=*.olddomain.com, O=COMPANY, L=Place, ST=ST, C=US
Signature Algorithm: SHAXwithRSA, OID = X.X.XXX.XXXXXX.X.X.X

Key: Sun RSA public key, XXXX bits
modulus: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXX
public exponent: XXXXX
Validity: [From: Tue Jan XX XX:XX:XX EST XXXX,
To: Fri Feb XX XX:XX:XX EST XXXX]
Issuer: CN=DigiCert High Assurance CA-X, OU=www.digicert.com, O=DigiCert Inc, C=US
SerialNumber: [ XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX]

但是,如果我用 java7 替换 java6。它正确读取了正确的证书,并且我能够访问该 URL。

我在这里错过了什么?我确实看到从 java6 到 java7 的握手略有不同,但我认为这不能解释获得不同的证书。

Java6 握手:

*** ClientHello, TLSv1
***
pool-1-thread-1, WRITE: TLSv1 Handshake, length = 95
pool-1-thread-1, WRITE: SSLv2 client hello message, length = 131
pool-1-thread-1, READ: TLSv1 Handshake, length = 81
*** ServerHello, TLSv1
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Created: [Session-4, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
pool-1-thread-1, READ: TLSv1 Handshake, length = 4313

java7握手:

*** ClientHello, TLSv1
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1,sect233k1, sect23
sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, se9k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
Extension server_name, server_name: [host_name: test.newdomain.com]
***
pool-5-thread-2, WRITE: TLSv1 Handshake, length = 181
pool-5-thread-2, READ: TLSv1 Handshake, length = 85
*** ServerHello, TLSv1
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension server_name, server_name:
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Initialized: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA]
** TLS_RSA_WITH_AES_128_CBC_SHA
pool-5-thread-2, READ: TLSv1 Handshake, length = 4312

谁能解释为什么 java6 的行为可能与 java7 和网络浏览器不同,以及如何解决这个问题?

以防万一,这是我用来测试连通性的代码。没什么特别的:

    InputStream in = null;
try {
URL url = new URL("https://test.newdomain.com/myapp");
URLConnection conn = url.openConnection();
in = conn.getInputStream();
System.out.println("OpenStream didn't fail!");
} catch (IOException ex) {
System.out.println(ex.getClass().getName()+ex.getMessage());
System.out.println("Connection failed");
} finally {
try {
if (in != null)
in.close();
} catch (IOException ex) {
}
}

谢谢!

最佳答案

根据 date_thompson_085 提供的输入回答我自己的问题。

问题是请求总是使用 IP 地址发送,主机名包含在 http header 中。但是,使用 SSL,该主机名信息是加密的。所以当 SSL 握手发生时,它还不知道主机名。因此,它不知道请求应该转到哪个虚拟主机并返回第一个(或默认)证书,在我们的例子中是 olddomain.com,这是错误的。

浏览器和 java7 不受影响的原因是它们将服务器名称指示 (SNI) 作为 SSL 信息的一部分发送。这样,apache 在开始 SSL 握手并返回正确的证书之前就知道要使用哪个虚拟主机。 Java 6 不支持 SNI。

关于java - 为什么 Java 6 接收的 SSL 证书链与 Java 7 不同?,我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/26144132/

24 4 0
Copyright 2021 - 2024 cfsdn All Rights Reserved 蜀ICP备2022000587号
广告合作:1813099741@qq.com 6ren.com