Java 1.6_u45 + BouncyCaSTLe + TLS1.2 抛出握手失败(40)(notifySecureRenegotiation)

标签 java bouncycastle tls1.2 java-6

我的情况几乎接近Another post here

我在 JDK1.6_u45 上尝试使用 BouncyCaSTLe 连接到 TLS1.2 上的 https 端点。 我已将端点公钥证书添加到 jre/lib/security 下的 cacerts

但是我得到的错误遵循不同的堆栈跟踪,如下所示:

Exception in thread "Main Thread" org.bouncycastle.crypto.tls.TlsFatalAlert: handshake_failure(40)
at org.bouncycastle.crypto.tls.AbstractTlsPeer.notifySecureRenegotiation(Unknown Source)
at org.bouncycastle.crypto.tls.TlsClientProtocol.receiveServerHelloMessage(Unknown Source)
at org.bouncycastle.crypto.tls.TlsClientProtocol.handleHandshakeMessage(Unknown Source)
at org.bouncycastle.crypto.tls.TlsProtocol.processHandshakeQueue(Unknown Source)
at org.bouncycastle.crypto.tls.TlsProtocol.processRecord(Unknown Source)
at org.bouncycastle.crypto.tls.RecordStream.readRecord(Unknown Source)
at org.bouncycastle.crypto.tls.TlsProtocol.safeReadRecord(Unknown Source)
at org.bouncycastle.crypto.tls.TlsProtocol.blockForHandshake(Unknown Source)
at org.bouncycastle.crypto.tls.TlsClientProtocol.connect(Unknown Source)
at TLSSocketConnectionFactory$1.startHandshake(TLSSocketConnectionFactory.java:498)
at sun.net.www.protocol.https.HttpsClient.afterConnect(HttpsClient.java:434)
at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(AbstractDelegateHttpsURLConnection.java:167)
at sun.net.www.protocol.https.HttpsURLConnectionImpl.connect(HttpsURLConnectionImpl.java:134)
at CopyOfTest.getResponseJsonString(CopyOfTest.java:40)
at CopyOfTest.main(CopyOfTest.java:15)

BouncyCaSTLe TLSSocketConnectionFactory 与此链接中提供的相同,所以我不再在这里发布它。 (链接:another post here

我的测试类如下:

import java.io.BufferedReader;
import java.io.IOException;
import java.io.InputStreamReader;
import java.net.URL;

import javax.net.ssl.HttpsURLConnection;

import com.google.gson.Gson;

public class CopyOfTest {
    public static void main(String[] args) throws IOException, Exception {
        //below url is a not an actual endpoint. 
        URL url = new URL(
                "https://abc.def.ghi/Customer/v1/nonexistantlink/?postalCode=80120&clientId=ABC");
        String returnData = getResponseJsonString(url);
        System.out.println("returnData: " + returnData);
        ArrayNameDescDTO msg = new Gson().fromJson(returnData,
                ArrayNameDescDTO.class);
        System.out.println(msg.toString());


    }

    private static String getResponseJsonString(URL url) throws IOException {

//      Security.addProvider(new BouncyCastleJsseProvider());
//       SSLContext sslcontext = SSLContext.getInstance("TLS",new BouncyCastleJsseProvider())

        HttpsURLConnection conn = (HttpsURLConnection) url.openConnection();
        conn.setSSLSocketFactory(new TLSSocketConnectionFactory());

        conn.setRequestMethod("GET");
        byte[] message = ("username" + ":" + "andItsPassword").getBytes("UTF-8");
        String encoded = javax.xml.bind.DatatypeConverter.printBase64Binary(message);
        System.out.println("encoded: Basic " + encoded);
        conn.setRequestProperty("Authorization", "Basic " + encoded);
        conn.setConnectTimeout(10000); // 10 sec

        conn.connect();
        int status = conn.getResponseCode();
        if (conn.getResponseCode() != 200) {
            throw new RuntimeException("Failed : HTTP error code : "
                    + conn.getResponseCode());
        }
        switch (status) {
        case 200:
        case 201:
            BufferedReader br = new BufferedReader(new InputStreamReader(
                    conn.getInputStream()));
            StringBuilder sb = new StringBuilder();
            String line;
            while ((line = br.readLine()) != null) {
                sb.append(line + "\n");
            }
            br.close();
            conn.disconnect();
            return sb.toString();
        }

        conn.disconnect();
        return null;

    }
}

有什么建议或指示吗?

最佳答案

此解决方案由@James Reinstate Monica Polk 提供。我在这里重新发布解决方案,以便其他人可以从中受益。

解决方案是创建一个新的 TLS 客户端,它扩展“org.bouncycaSTLe.crypto.tls.DefaultTlsClient”并覆盖“notifySecureRenegotiation”方法。 如下所示:

import org.bouncycastle.crypto.tls.DefaultTlsClient;

public class NewDefaultTlsClient extends DefaultTlsClient{

    @Override
    public void notifySecureRenegotiation(boolean secureRenegotiation){
        //do nothing here
    }

    @Override
    public org.bouncycastle.crypto.tls.TlsAuthentication getAuthentication()
            throws IOException {
        // TODO Auto-generated method stub
        return null;
    }

}

现在在 TLSSocketConnectionFactory 上,转到 startHandshake() 方法,然后更改

tlsClientProtocol.connect(new DefaultTlsClient(){ ....

tlsClientProtocol.connect(new NewDefaultTlsClient(){ ....

就是这样!进行上述更改后,上述错误不再出现,并且 JDK6 代码能够访问 TLS1.2 端点。

关于Java 1.6_u45 + BouncyCaSTLe + TLS1.2 抛出握手失败(40)(notifySecureRenegotiation),我们在Stack Overflow上找到一个类似的问题: https://stackoverflow.com/questions/60014642/

相关文章:

java - 目标 org.jvnet.jax-ws-commons :jaxws-maven-plugin:2. 3:wsgen 的执行失败

java - 如何在 Java 11 中使用 BouncyCaSTLeProvider

java - 使用 bouncycaSTLe 创建证书

java - 带有 CA 签名证书的 2 路 TLS

java - 如何确定 Wildfly 10 支持的密码套件

java - 如何将单选按钮数据存储在数据库中

java - 在 Selenium 中运行 Java 代码时检测到 borken kqueue

java - 需要帮助解释该程序的结果

java - 如何使用 bouncy caSTLe 在 Java 中创建 SHA512 摘要字符串?

azure - Azure Web 应用程序中某些 URL 的 TLS 1.0