You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@wink.apache.org by "Hudson (JIRA)" <ji...@apache.org> on 2010/07/23 17:52:52 UTC

[jira] Commented: (WINK-242) Support SSL Hostname Verifier Bypass

    [ https://issues.apache.org/jira/browse/WINK-242?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12891642#action_12891642 ] 

Hudson commented on WINK-242:
-----------------------------

Integrated in Wink-Trunk-JDK1.5 #370 (See [http://hudson.zones.apache.org/hudson/job/Wink-Trunk-JDK1.5/370/])
    WINK-242: support SSL hostname verifier bypass


> Support SSL Hostname Verifier Bypass
> ------------------------------------
>
>                 Key: WINK-242
>                 URL: https://issues.apache.org/jira/browse/WINK-242
>             Project: Wink
>          Issue Type: New Feature
>    Affects Versions: 1.1
>         Environment: Doesn't matter
>            Reporter: Andrew Spyker
>            Assignee: Mike Rheinheimer
>            Priority: Minor
>         Attachments: WINK-242.patch
>
>
> It is incorrect, but common, for web sites to have SSL certs that are signed by localhost with localhost as the CN/hostname, but then are deployed on real websites like w3.internal.example.com.  If you try to connect to one of these with Wink you get:
> Exception : java.io.IOException: HTTPS hostname wrong: should be <localhost>
> You'll see extensive discussion and how to fix at:
> http://forums.sun.com/thread.jspa?threadID=521779
> You'll also see commercial products supporting this behavior as well like:
> http://www-01.ibm.com/support/docview.wss?uid=swg1PK24500

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.