You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@ws.apache.org by "Freeman Fang (Created) (JIRA)" <ji...@apache.org> on 2012/02/15 10:17:59 UTC
[jira] [Created] (WSS-340) support Certificates revocation check
before encrypt on sender side
support Certificates revocation check before encrypt on sender side
-------------------------------------------------------------------
Key: WSS-340
URL: https://issues.apache.org/jira/browse/WSS-340
Project: WSS4J
Issue Type: Improvement
Reporter: Freeman Fang
Assignee: Colm O hEigeartaigh
currently WSS4J can support Certificates revocation check(CRL|WSS-278 and OCSP|WSS-339) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Resolved] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Colm O hEigeartaigh (Resolved) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Colm O hEigeartaigh resolved WSS-340.
-------------------------------------
Resolution: Fixed
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Affects Versions: 1.6.4
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Fix For: 1.6.5
>
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Commented] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Freeman Fang (Commented) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13208294#comment-13208294 ]
Freeman Fang commented on WSS-340:
----------------------------------
Hi Team,
I'm working on it and will append a patch soon.
Freeman
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
>
> currently WSS4J can support Certificates revocation check(CRL|WSS-278 and OCSP|WSS-339) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Commented] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Colm O hEigeartaigh (Commented) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13210307#comment-13210307 ]
Colm O hEigeartaigh commented on WSS-340:
-----------------------------------------
Hi Freeman,
Could you also merge the EncryptionAction logic to CXF for the WS-SecurityPolicy case? EncryptionAction is only used for the non-policy case.
Colm.
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Affects Versions: 1.6.4
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Fix For: 1.6.5
>
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Commented] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Freeman Fang (Commented) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13210080#comment-13210080 ]
Freeman Fang commented on WSS-340:
----------------------------------
Hi Colm,
I append a patch which also include a testcase, please review it.
Best Regards
Freeman
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL|WSS-278 and OCSP|WSS-339) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Closed] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Colm O hEigeartaigh (Closed) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Colm O hEigeartaigh closed WSS-340.
-----------------------------------
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Affects Versions: 1.6.4
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Fix For: 1.6.5
>
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Commented] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Freeman Fang (Commented) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13210445#comment-13210445 ]
Freeman Fang commented on WSS-340:
----------------------------------
Hi Colm,
Sure, thanks for applying the patch.
Freeman
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Affects Versions: 1.6.4
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Fix For: 1.6.5
>
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Commented] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Colm O hEigeartaigh (Commented) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13208521#comment-13208521 ]
Colm O hEigeartaigh commented on WSS-340:
-----------------------------------------
Hi Freeman,
Sounds good, but could you submit a patch based on the current code rather than the patch you submitted for WSS-339?
Thanks,
Colm.
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
>
> currently WSS4J can support Certificates revocation check(CRL|WSS-278 and OCSP|WSS-339) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Updated] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Freeman Fang (Updated) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Freeman Fang updated WSS-340:
-----------------------------
Attachment: WSS-340.patch
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL|WSS-278 and OCSP|WSS-339) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Updated] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Colm O hEigeartaigh (Updated) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Colm O hEigeartaigh updated WSS-340:
------------------------------------
Affects Version/s: 1.6.4
Fix Version/s: 1.6.5
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Affects Versions: 1.6.4
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Fix For: 1.6.5
>
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org
[jira] [Updated] (WSS-340) support Certificates revocation check
before encrypt on sender side
Posted by "Freeman Fang (Updated) (JIRA)" <ji...@apache.org>.
[ https://issues.apache.org/jira/browse/WSS-340?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Freeman Fang updated WSS-340:
-----------------------------
Description: currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there. (was: currently WSS4J can support Certificates revocation check(CRL|WSS-278 and OCSP|WSS-339) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.)
> support Certificates revocation check before encrypt on sender side
> -------------------------------------------------------------------
>
> Key: WSS-340
> URL: https://issues.apache.org/jira/browse/WSS-340
> Project: WSS4J
> Issue Type: Improvement
> Reporter: Freeman Fang
> Assignee: Colm O hEigeartaigh
> Attachments: WSS-340.patch
>
>
> currently WSS4J can support Certificates revocation check(CRL and OCSP) when receiver side validate a signature. Similarly WSS4J should also support Certificates revocation check before encrypt on sender side, as in both case it's possible to use a revoked certificate. We can do it in EncryptionAction where we can load encrypt crypto and use the verifyTrust(certs, enableRevocation, enableOCSP) already there.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@ws.apache.org
For additional commands, e-mail: dev-help@ws.apache.org