我有一个简单的web运行在一个raspberry pi上,它位于同一个pi上的nginx服务器后面。我使用自签名的客户端证书来验证来自android应用程序的调用。这在过去完全正常,但是最近在重建了一些硬件之后,我又回到了这个项目,当我尝试在运行Android8.1的Pixel 2上使用它时,它给出了以下例外:
javax.net.ssl.SSLHandshakeException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
at com.android.org.conscrypt.ConscryptFileDescriptorSocket.startHandshake(ConscryptFileDescriptorSocket.java:219)
at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.java:268)
...我根据:http://nategood.com/client-side-certificate-authentication-in-ngi生成了证书和密钥
用curl进行测试很好。
我为应用程序创建了keystore,用于:
openssl pkcs12 -export -clcerts -in client.crt -inkey client.key -out client.p12我按照下面的文章在Android中设置客户端证书并连接到服务器:http://chariotsolutions.com/blog/post/https-with-client-certificates-on/
但是我用OkHttp在Kotlin中重写了它:
private const val SERVER = "https://my.server"
/**
* trustManagers is used to authorize the server's self-signed cert
*/
private val trustManagers by lazy {
val cert = CertificateFactory.getInstance("X.509")
.generateCertificate(appCtx.assets.open("ca.crt")) as X509Certificate
val trustStore = KeyStore.getInstance(KeyStore.getDefaultType()).apply {
load(null, null)
setCertificateEntry(cert.subjectX500Principal.name, cert)
}
TrustManagerFactory.getInstance(TrustManagerFactory.getDefaultAlgorithm()).apply {
init(trustStore)
}.trustManagers
}
/**
* keyManagers is used to load the client-authentication cert
*/
private val keyManagers by lazy {
// assuming this can only be called after Application is created
val keyStore = KeyStore.getInstance("PKCS12").apply {
load(appCtx.assets.open("client.p12"), "".toCharArray())
}
KeyManagerFactory.getInstance("X509").apply {
init(keyStore, "".toCharArray())
}.keyManagers
}
/**
* sslContext for opening TLS connection to server
*/
private val sslContext by lazy {
SSLContext.getInstance("TLS").apply {
init(keyManagers, trustManagers, null)
}
}
/**
* pass an HTTPS request to server
*/
suspend fun request(url: String): ByteArray? {
return try {
val request = Request.Builder()
.url(url)
.build()
val client = OkHttpClient.Builder()
.sslSocketFactory(sslContext.socketFactory, trustManagers[0] as X509TrustManager)
.build()
client.newCall(request).await().body().byteStream().readBytes()
} catch (e: Exception) {
err(e) { "failed to send request" }
null
}
}这曾经起作用,但现在不行了。我花了一天半时间寻找答案,我尝试了以下几点:
<?xml version="1.0" encoding="utf-8"?> <network-security-config> <base-config> <trust-anchors> <!-- Additionally trust user added CAs --> <certificates src="user" /> <certificates src="@raw/ca"/> </trust-anchors> </base-config> </network-security-config>
我已经阅读了关于创建自定义信任管理器的所有示例,它们几乎都是相同的,甚至是https://developer.android.com/training/articles/security-ssl.html#UnknownCa
每一次尝试都会产生同样的异常,难道我遗漏了什么吗?
发布于 2021-04-13 19:32:39
这就是我如何让它在我的项目中工作,在GoDaddy上使用一个自签名证书:
<?xml version="1.0" encoding="utf-8"?>
<network-security-config>
<debug-overrides>
<trust-anchors>
<certificates src="user"/>
<certificates src="@raw/gdcert"/>
</trust-anchors>
</debug-overrides>
</network-security-config>
android:networkSecurityConfig="@xml/network_security_config"
SSLContext sc = SSLContext.getInstance("SSL");
sc.init(null, trustAllCerts, new java.security.SecureRandom());
SSLSocketFactory ssf = sc.getSocketFactory();
SSLSocket sslsocket = (SSLSocket) ssf.createSocket("yourwebsitename.com", 443);
然后是您试图运行的连接到服务器的任何代码。
TrustManager[] trustAllCerts = new TrustManager[] {new X509TrustManager() {
@Override
public void checkClientTrusted(X509Certificate[] chain, String authType) throws CertificateException {
}
@Override
public void checkServerTrusted(X509Certificate[] chain, String authType) throws CertificateException {
}
@Override
public X509Certificate[] getAcceptedIssuers() {
return null;
}
}};
保存您的项目并运行它。
https://stackoverflow.com/questions/48979679
复制相似问题