美文网首页
Java访问HTTPS不受信任证书问题解决

Java访问HTTPS不受信任证书问题解决

作者: jijs | 来源:发表于2021-04-28 10:39 被阅读0次

    1.原因

    Java在访问SSL加密的网站时,需要从JDK的KeyStore 里面去查找相对应得可信证书,如果不能从默认或者指定的KeyStore 中找到可信证书,就会报错。
    另外,Java所使用的证书仓库并不是Windows系统自带的证书管理。所以即使系统中包含此证书也不可以使用。

    2. 解决方法

    只要将SSL的证书添加到KeyStore中即可。

    1.导入证书

    下载访问的SSL站点的证书
    通过keytool -import -file ***.cer -keystore cacerts -alias server导入(默认密码为 changeit)

    2. 程序生成证书

    编译并执行java InstallCert hostname,下面三个方法皆可以使用

    生成的jssecacerts文件拷贝到jre/lib/security目录
    通过System.setProperty("javax.net.ssl.trustStore", "你的jssecacerts证书路径");
    程序启动命令-Djavax.net.ssl.trustStore=你的jssecacerts证书路径 -Djavax.net.ssl.trustStorePassword=changeit

    /* 
     * Copyright 2006 Sun Microsystems, Inc.  All Rights Reserved. 
     * 
     * Redistribution and use in source and binary forms, with or without 
     * modification, are permitted provided that the following conditions 
     * are met: 
     * 
     *   - Redistributions of source code must retain the above copyright 
     *     notice, this list of conditions and the following disclaimer. 
     * 
     *   - Redistributions in binary form must reproduce the above copyright 
     *     notice, this list of conditions and the following disclaimer in the 
     *     documentation and/or other materials provided with the distribution. 
     * 
     *   - Neither the name of Sun Microsystems nor the names of its 
     *     contributors may be used to endorse or promote products derived 
     *     from this software without specific prior written permission. 
     * 
     * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS 
     * IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, 
     * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 
     * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE COPYRIGHT OWNER OR 
     * CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, 
     * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, 
     * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 
     * PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF 
     * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING 
     * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 
     * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 
     */  
      
    import javax.net.ssl.*;
    import java.io.*;
    import java.security.KeyStore;
    import java.security.MessageDigest;
    import java.security.cert.CertificateException;
    import java.security.cert.X509Certificate;
      
    public class InstallCert {  
      
        public static void main(String[] args) throws Exception {  
            String host;  
            int port;  
            char[] passphrase;  
            if ((args.length == 1) || (args.length == 2)) {  
                String[] c = args[0].split(":");  
                host = c[0];  
                port = (c.length == 1) ? 443 : Integer.parseInt(c[1]);  
                String p = (args.length == 1) ? "changeit" : args[1];  
                passphrase = p.toCharArray();  
            } else {  
                System.out  
                        .println("Usage: java InstallCert <host>[:port] [passphrase]");  
                return;  
            }  
      
            File file = new File("jssecacerts");  
            if (file.isFile() == false) {  
                char SEP = File.separatorChar;  
                File dir = new File(System.getProperty("java.home") + SEP + "lib"  
                        + SEP + "security");  
                file = new File(dir, "jssecacerts");  
                if (file.isFile() == false) {  
                    file = new File(dir, "cacerts");  
                }  
            }  
            System.out.println("Loading KeyStore " + file + "...");  
            InputStream in = new FileInputStream(file);  
            KeyStore ks = KeyStore.getInstance(KeyStore.getDefaultType());  
            ks.load(in, passphrase);  
            in.close();  
      
            SSLContext context = SSLContext.getInstance("TLS");  
            TrustManagerFactory tmf = TrustManagerFactory  
                    .getInstance(TrustManagerFactory.getDefaultAlgorithm());  
            tmf.init(ks);  
            X509TrustManager defaultTrustManager = (X509TrustManager) tmf  
                    .getTrustManagers()[0];  
            SavingTrustManager tm = new SavingTrustManager(defaultTrustManager);  
            context.init(null, new TrustManager[] { tm }, null);  
            SSLSocketFactory factory = context.getSocketFactory();  
      
            System.out  
                    .println("Opening connection to " + host + ":" + port + "...");  
            SSLSocket socket = (SSLSocket) factory.createSocket(host, port);  
            socket.setSoTimeout(10000);  
            try {  
                System.out.println("Starting SSL handshake...");  
                socket.startHandshake();  
                socket.close();  
                System.out.println();  
                System.out.println("No errors, certificate is already trusted");  
            } catch (SSLException e) {  
                System.out.println();  
                e.printStackTrace(System.out);  
            }  
      
            X509Certificate[] chain = tm.chain;  
            if (chain == null) {  
                System.out.println("Could not obtain server certificate chain");  
                return;  
            }  
      
            BufferedReader reader = new BufferedReader(new InputStreamReader(  
                    System.in));  
      
            System.out.println();  
            System.out.println("Server sent " + chain.length + " certificate(s):");  
            System.out.println();  
            MessageDigest sha1 = MessageDigest.getInstance("SHA1");  
            MessageDigest md5 = MessageDigest.getInstance("MD5");  
            for (int i = 0; i < chain.length; i++) {  
                X509Certificate cert = chain[i];  
                System.out.println(" " + (i + 1) + " Subject "  
                        + cert.getSubjectDN());  
                System.out.println("   Issuer  " + cert.getIssuerDN());  
                sha1.update(cert.getEncoded());  
                System.out.println("   sha1    " + toHexString(sha1.digest()));  
                md5.update(cert.getEncoded());  
                System.out.println("   md5     " + toHexString(md5.digest()));  
                System.out.println();  
            }  
      
            System.out  
                    .println("Enter certificate to add to trusted keystore or 'q' to quit: [1]");  
            String line = reader.readLine().trim();  
            int k;  
            try {  
                k = (line.length() == 0) ? 0 : Integer.parseInt(line) - 1;  
            } catch (NumberFormatException e) {  
                System.out.println("KeyStore not changed");  
                return;  
            }  
      
            X509Certificate cert = chain[k];  
            String alias = host + "-" + (k + 1);  
            ks.setCertificateEntry(alias, cert);  
      
            OutputStream out = new FileOutputStream("jssecacerts");  
            ks.store(out, passphrase);  
            out.close();  
      
            System.out.println();  
            System.out.println(cert);  
            System.out.println();  
            System.out  
                    .println("Added certificate to keystore 'jssecacerts' using alias '"  
                            + alias + "'");  
        }  
      
        private static final char[] HEXDIGITS = "0123456789abcdef".toCharArray();  
      
        private static String toHexString(byte[] bytes) {  
            StringBuilder sb = new StringBuilder(bytes.length * 3);  
            for (int b : bytes) {  
                b &= 0xff;  
                sb.append(HEXDIGITS[b >> 4]);  
                sb.append(HEXDIGITS[b & 15]);  
                sb.append(' ');  
            }  
            return sb.toString();  
        }  
      
        private static class SavingTrustManager implements X509TrustManager {  
      
            private final X509TrustManager tm;  
            private X509Certificate[] chain;  
      
            SavingTrustManager(X509TrustManager tm) {  
                this.tm = tm;  
            }  
      
            public X509Certificate[] getAcceptedIssuers() {  
                throw new UnsupportedOperationException();  
            }  
      
            public void checkClientTrusted(X509Certificate[] chain, String authType)  
                    throws CertificateException {  
                throw new UnsupportedOperationException();  
            }  
      
            public void checkServerTrusted(X509Certificate[] chain, String authType)  
                    throws CertificateException {  
                this.chain = chain;  
                tm.checkServerTrusted(chain, authType);  
            }  
        }  
      
    }  
    
    

    原文链接:https://blog.csdn.net/loushuiyifan/article/details/94629820

    相关文章

      网友评论

          本文标题:Java访问HTTPS不受信任证书问题解决

          本文链接:https://www.haomeiwen.com/subject/axfvrltx.html