You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@wink.apache.org by "David Johnson (JIRA)" <ji...@apache.org> on 2010/12/07 20:04:10 UTC
[jira] Commented: (WINK-242) Support SSL Hostname Verifier Bypass
[ https://issues.apache.org/jira/browse/WINK-242?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12968886#action_12968886 ]
David Johnson commented on WINK-242:
------------------------------------
The fix is not complete. In addition to the bypass in processRequest(), you also have to bypass hostname verification in createResponse(). I will attach a patch to fix this.
> Support SSL Hostname Verifier Bypass
> ------------------------------------
>
> Key: WINK-242
> URL: https://issues.apache.org/jira/browse/WINK-242
> Project: Wink
> Issue Type: New Feature
> Affects Versions: 1.1
> Environment: Doesn't matter
> Reporter: Andrew Spyker
> Assignee: Mike Rheinheimer
> Priority: Minor
> Attachments: WINK-242.patch
>
>
> It is incorrect, but common, for web sites to have SSL certs that are signed by localhost with localhost as the CN/hostname, but then are deployed on real websites like w3.internal.example.com. If you try to connect to one of these with Wink you get:
> Exception : java.io.IOException: HTTPS hostname wrong: should be <localhost>
> You'll see extensive discussion and how to fix at:
> http://forums.sun.com/thread.jspa?threadID=521779
> You'll also see commercial products supporting this behavior as well like:
> http://www-01.ibm.com/support/docview.wss?uid=swg1PK24500
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.