我们重新配置了一个服务器,以更改其虚拟主机的主机名。
我们的服务器配置来自:
<VirtualHost *:443>
ServerName test.olddomain.com
SSLEngine on
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
SSLCertificateFile "D:/Security/wildcard/OLDDOMAIN.COM.crt"
SSLCertificateKeyFile "D:/Security/wildcard/OLDDOMAIN.COM.key"
SSLCertificateChainFile "D:/Security/wildcard/CertChain.crt"
...
</VirtualHost>至:
<VirtualHost *:443>
ServerName test.newdomain.com
ServerAlias test.olddomain.com
SSLEngine on
SSLCipherSuite ALL:!ADH:!EXPORT56:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv2:+EXP:+eNULL
SSLCertificateFile "D:/Security/wildcard/NEWDOMAIN.COM.crt"
SSLCertificateKeyFile "D:/Security/wildcard/NEWDOMAIN.COM.key"
SSLCertificateChainFile "D:/Security/wildcard/CertChain.crt"
...
</VirtualHost>使用任何网页浏览器,我们都可以很好地访问该网站,我们没有任何证书问题。然而,当我尝试从Java 6访问一个URL时,我得到了这个错误:
java.security.cert.CertificateException: No subject alternative DNS name matching test.newdomain.com found我尝试使用-Djavax.net.debug=SSL选项运行java,奇怪的是,java获得了旧域的证书:
*** Certificate chain
chain [X] = [
[
Version: VX
Subject: CN=*.olddomain.com, O=COMPANY, L=Place, ST=ST, C=US
Signature Algorithm: SHAXwithRSA, OID = X.X.XXX.XXXXXX.X.X.X
Key: Sun RSA public key, XXXX bits
modulus: XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXX
public exponent: XXXXX
Validity: [From: Tue Jan XX XX:XX:XX EST XXXX,
To: Fri Feb XX XX:XX:XX EST XXXX]
Issuer: CN=DigiCert High Assurance CA-X, OU=www.digicert.com, O=DigiCert Inc, C=US
SerialNumber: [ XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX]但是,如果我将java6替换为java7。它正确地读取正确的证书,并且我能够访问URL。
我在这里错过了什么?我确实看到从java6到java7之间的握手略有不同,但我认为这并不能解释获得不同证书的原因。
Java6握手:
*** ClientHello, TLSv1
***
pool-1-thread-1, WRITE: TLSv1 Handshake, length = 95
pool-1-thread-1, WRITE: SSLv2 client hello message, length = 131
pool-1-thread-1, READ: TLSv1 Handshake, length = 81
*** ServerHello, TLSv1
Cipher Suite: SSL_RSA_WITH_RC4_128_MD5
Compression Method: 0
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Created: [Session-4, SSL_RSA_WITH_RC4_128_MD5]
** SSL_RSA_WITH_RC4_128_MD5
pool-1-thread-1, READ: TLSv1 Handshake, length = 4313java7握手:
*** ClientHello, TLSv1
Extension elliptic_curves, curve names: {secp256r1, sect163k1, sect163r2, secp192r1, secp224r1,sect233k1, sect23
sect409k1, sect409r1, secp521r1, sect571k1, sect571r1, secp160k1, secp160r1, secp160r2, sect163r1, secp192k1, se9k1, secp256k1}
Extension ec_point_formats, formats: [uncompressed]
Extension server_name, server_name: [host_name: test.newdomain.com]
***
pool-5-thread-2, WRITE: TLSv1 Handshake, length = 181
pool-5-thread-2, READ: TLSv1 Handshake, length = 85
*** ServerHello, TLSv1
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA
Compression Method: 0
Extension server_name, server_name:
Extension renegotiation_info, renegotiated_connection: <empty>
***
%% Initialized: [Session-1, TLS_RSA_WITH_AES_128_CBC_SHA]
** TLS_RSA_WITH_AES_128_CBC_SHA
pool-5-thread-2, READ: TLSv1 Handshake, length = 4312有人能解释为什么java6的行为可能与java7和web浏览器不同,以及如何解决这个问题?
如果这会产生影响,这就是我用来测试连接性的代码。没什么稀奇的:
InputStream in = null;
try {
URL url = new URL("https://test.newdomain.com/myapp");
URLConnection conn = url.openConnection();
in = conn.getInputStream();
System.out.println("OpenStream didn't fail!");
} catch (IOException ex) {
System.out.println(ex.getClass().getName()+ex.getMessage());
System.out.println("Connection failed");
} finally {
try {
if (in != null)
in.close();
} catch (IOException ex) {
}
}谢谢!
发布于 2014-10-07 20:42:45
根据date_thompson_085提供的输入回答我自己的问题。
问题是请求总是使用IP地址发送,主机名包含在http报头中。但是,对于SSL,主机名信息是加密的。因此,当SSL握手发生时,它还不知道主机名。因此,它不知道请求应该转到哪个虚拟主机并返回第一个证书(或默认证书),在本例中,olddomain.com是错误的证书。
浏览器和java7不受影响的原因是它们将服务器名称指示(SNI)作为SSL信息的一部分发送。这样,apache就知道在启动SSL握手之前使用什么虚拟主机,并返回正确的证书。Java 6不支持SNI。
https://stackoverflow.com/questions/26144132
复制相似问题