【问题标题】:Which key and certificate from keystore and truststore is used when there are many?当有很多时,使用来自密钥库和信任库的哪个密钥和证书?
【发布时间】:2018-11-24 06:36:41
【问题描述】:

我的密钥库中有两个密钥:

D:\javasslstores2>keytool -list -keystore keystore.jks -storepass passwd123

Keystore type: JKS
Keystore provider: SUN

Your keystore contains 2 entries

ssl_key_2, Jun 14, 2018, PrivateKeyEntry,
Certificate fingerprint (SHA1): 36:A4:FB:E6:47:12:59:D6:C3:E1:06:21:4B:21:79:7E:33:86:48:52
ssl_key, Jun 13, 2018, PrivateKeyEntry,
Certificate fingerprint (SHA1): 03:08:2C:CA:A4:84:DD:61:20:05:F7:56:F5:44:4C:A4:35:2B:8C:6C

以及我的信任库中对应的两个证书:

D:\javasslstores2>keytool -list -keystore truststore.jks -storepass passwd123

Keystore type: JKS
Keystore provider: SUN

Your keystore contains 2 entries

ssl_key_2, Jun 14, 2018, trustedCertEntry,
Certificate fingerprint (SHA1): 36:A4:FB:E6:47:12:59:D6:C3:E1:06:21:4B:21:79:7E:33:86:48:52
ssl_key, Jun 14, 2018, trustedCertEntry,
Certificate fingerprint (SHA1): 03:08:2C:CA:A4:84:DD:61:20:05:F7:56:F5:44:4C:A4:35:2B:8C:6C

我已经编写了简单的 java ssl 客户端和服务器:

服务器

public class Server {
    static KeyStore ks;
    static KeyManagerFactory kmf;
    static TrustManagerFactory tmf;
    static SSLContext sc;
    static TrustManager[] trustManagers;

    static {
        try {
            ks = KeyStore.getInstance("JKS");
            ks.load(new FileInputStream("D:\\javasslstores\\keystore.jks"), "passwd123".toCharArray());

            kmf = KeyManagerFactory.getInstance("SunX509");
            kmf.init(ks, "passwd123".toCharArray());

            tmf = TrustManagerFactory.getInstance("SunX509"); 
            tmf.init(ks);

            sc = SSLContext.getInstance("TLS"); 
            sc.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null); 
        } catch (Exception e) {
            System.out.println(e.getMessage());
            System.out.println(e.getStackTrace());
        }
    }

    public static void main(String[] args) throws IOException {
        System.out.println("SSL Server");
        SSLServerSocketFactory ssf = sc.getServerSocketFactory(); 
        SSLServerSocket s = (SSLServerSocket) ssf.createServerSocket(8089);
        System.out.println("Listening on port 8089");
        SSLSocket socket = (SSLSocket) s.accept();


        PrintWriter out = new PrintWriter(socket.getOutputStream(), true);
        try (BufferedReader bufferedReader = new BufferedReader(new InputStreamReader(socket.getInputStream()))) {
            String line;
            System.out.println("Data from client:");
            while((line = bufferedReader.readLine()) != null){
                System.out.println(line);
                out.println(line);
            }
        }
        System.out.println("Closed");
    }
}

客户

public class Client {
    static KeyStore ks;
    static KeyManagerFactory kmf;
    static TrustManagerFactory tmf;
    static SSLContext sc;
    static TrustManager[] trustManagers;

    static 
    {
        try 
        {
            ks = KeyStore.getInstance("JKS");
            ks.load(new FileInputStream("D:\\javasslstores\\keystore.jks"), "passwd123".toCharArray());

            kmf = KeyManagerFactory.getInstance("SunX509");
            kmf.init(ks, "passwd123".toCharArray());

            tmf = TrustManagerFactory.getInstance("SunX509"); 
            tmf.init(ks);

            sc = SSLContext.getInstance("TLS"); 
            sc.init(kmf.getKeyManagers(), tmf.getTrustManagers(), null);
        } catch (Exception e) {
            System.out.println(e.getMessage());
            System.out.println(e.getStackTrace());
        }
    }

    public static void main(String[] args) throws IOException {
        SSLSocketFactory ssf = sc.getSocketFactory();
        SSLSocket socket = (SSLSocket) ssf.createSocket("localhost", 8089);
        socket.startHandshake();

        PrintWriter out = new PrintWriter
                                (new BufferedWriter
                                (new OutputStreamWriter
                                (socket.getOutputStream())));

        System.out.println("SSL Client");

        out.println("GET / HTTP/1.0");
        out.println("From java ssl client");
        out.println("written by me");
        out.flush();

        if (out.checkError())
            System.out.println("SSLSocketClient:  java.io.PrintWriter error");

        BufferedReader in = new BufferedReader(
                                new InputStreamReader(
                                socket.getInputStream()));

        String inputLine;

        while ((inputLine = in.readLine()) != null)
            System.out.println(inputLine);

        in.close();
        out.close();
        socket.close();
    }
}

以上代码运行良好。

疑问:

  1. 有两个名称为ssl_keyssl_key_2 的密钥和证书。他们使用哪一种?
  2. 他们最终如何使用同一对密钥和证书?

【问题讨论】:

  • 该服务器代码不请求客户端身份验证,因此即使您为客户端提供了密钥库,客户端也不应该为自己使用任何密钥(和证书);它应该只使用信任库验证服务器的证书。 PS:这不是一个有效的 HTTP 请求,但是你的服务器也不是 HTTP 服务器。

标签: java ssl


【解决方案1】:

好问题。 SunX509 KeyManager (SunX509KeyManagerImpl) 的实现使用它找到的第一个别名,其中有一个私钥和 RSA 类型的密钥。 您可以在main 方法上调试Server 类调用的SunX509KeyManagerImpl.chooseServerAlias,以验证逻辑。 要更改 SunX509KeyManager 的行为,您可以编写自己的 keyManager 扩展 X509ExtendedKeyManager 并将其传递给 SSLContext.init

【讨论】:

  • 实际上它返回第一个私钥条目(如果有的话),其类型与优先顺序中的相互可接受的密码套件匹配 - 由于这里的客户端是 Java,因此最优选的密码套件将默认为 ECDSA,然后是 RSA,然后是 DSA .该代码实际上检查证书中公钥的类型,而不是私钥,但通常 keytool 会强制它们相同,如果其他程序使它们不同,则握手失败;并且它似乎还检查了证书的父级 EC——我认为在比 RFC 指定的情况下更多——但我不能轻易测试。 ...
  • ... 无论如何,您可以编写自己的 KM,或者有时您可以更轻松地在加载后并将其传递给 KMF 之前调整密钥库的内容。
  • 我在猜测 SunX509KeyManagerImpl 类中的哪一行导致了这种行为。是thisthis 行吗?还是其他几行?
猜你喜欢
  • 2015-12-02
  • 2018-01-24
  • 1970-01-01
  • 1970-01-01
  • 2015-02-07
  • 2017-07-12
  • 2011-08-17
  • 1970-01-01
  • 2020-03-23
相关资源
最近更新 更多