Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Path validation fix #10

Merged
1 commit merged into from
Mar 15, 2011
Merged

Path validation fix #10

1 commit merged into from
Mar 15, 2011

Conversation

jsiwek
Copy link
Contributor

@jsiwek jsiwek commented Feb 23, 2011

Please consider pulling this change. It fixes a problem where, during certificate path validation, the signature of a certificate is not verified against a trusted certificate. Note that it's still not checked whether the trusted certificate is a self-signed CA cert. (it breaks the path validation test suite), so I made a note of that in the comments.

Otherwise, this change passes the tests for me (except for SSLConfiguratorTest and TomcatTest/ClientTest, which were breaking for me even before the changes), and it looks like it's working with the GSI-SSHTerm java client when connecting to real TeraGrid SSH servers as well as my own test one.

I have a more isolated test case that I've uploaded here:

https://github.com/jsiwek/JGlobusPathValidationTest

That could probably be turned into a test case in ProxyPathValidatorTest.

- In the case that a CA trust root was not already a part of the CertPath
  given to TrustedCertPathFinder.findTrustedPath(), the signature of
  last certificate in the chain is now verified against the discovered
  trust root certificate.

- When checking that the next certificate in the chain has a subject DN
  that matches the last's certificate's DN, normalize the DNs to a
  common, Globus format.
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant