[ 
https://issues.apache.org/jira/browse/HTTPCLIENT-2302?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Michael Osipov updated HTTPCLIENT-2302:
---------------------------------------
    Description: 
The examples 
[ClientCustomSSL|https://github.com/apache/httpcomponents-client/blob/rel/v5.2.1/httpclient5/src/test/java/org/apache/hc/client5/http/examples/ClientCustomSSL.java]
 and 
[AsyncClientCustomSSL|https://github.com/apache/httpcomponents-client/blob/rel/v5.2.1/httpclient5/src/test/java/org/apache/hc/client5/http/examples/AsyncClientCustomSSL.java]
 both have a Javadoc comment which says:
{quote}This example demonstrates how to create secure connections with a custom 
SSL context.
{quote}
However, this is misleading or even incorrect because the code below does the 
following:
{code:java}
.loadTrustMaterial((chain, authType) -> {
    final X509Certificate cert = chain[0];
    return "CN=httpbin.org".equalsIgnoreCase(cert.getSubjectDN().getName());
})
{code}
This accepts the certificate as long as the subject matches, without properly 
validating it at all, allowing man-in-the-middle attacks.

This can for example be seen with the various [https://badssl.com/] subdomains. 
For example changing in the example the URL to 
[https://self-signed.badssl.com/] and changing the expected subject to 
{{"CN=*.badssl.com, O=BadSSL, L=San Francisco, ST=California, C=US"}} still 
successfully creates the connection, even though the certificate is self-signed 
and could have been issued by a malicious actor performing a MITM attack.

Ideally this section with the custom {{TrustStrategy}} should be removed 
because it is not even necessary for this example to work.
Or if you want to keep this, then there should be a big "WARNING: ..." comment 
in this line. Otherwise users might erroneously think a custom 
{{TrustStrategy}} is needed for TLS to work, or they might just keep this 
example code because their code "works", without understanding the consequences 
of this.

  was:
{+}{+}The examples 
[ClientCustomSSL|https://github.com/apache/httpcomponents-client/blob/rel/v5.2.1/httpclient5/src/test/java/org/apache/hc/client5/http/examples/ClientCustomSSL.java]
 and 
[AsyncClientCustomSSL|https://github.com/apache/httpcomponents-client/blob/rel/v5.2.1/httpclient5/src/test/java/org/apache/hc/client5/http/examples/AsyncClientCustomSSL.java]
 both have a Javadoc comment which says:
{quote}This example demonstrates how to create secure connections with a custom 
SSL context.
{quote}
However, this is misleading or even incorrect because the code below does the 
following:
{code:java}
.loadTrustMaterial((chain, authType) -> {
    final X509Certificate cert = chain[0];
    return "CN=httpbin.org".equalsIgnoreCase(cert.getSubjectDN().getName());
})
{code}
This accepts the certificate as long as the subject matches, without properly 
validating it at all, allowing man-in-the-middle attacks.

This can for example be seen with the various [https://badssl.com/] subdomains. 
For example changing in the example the URL to 
[https://self-signed.badssl.com/] and changing the expected subject to 
{{"CN=*.badssl.com, O=BadSSL, L=San Francisco, ST=California, C=US"}} still 
successfully creates the connection, even though the certificate is self-signed 
and could have been issued by a malicious actor performing a MITM attack.

Ideally this section with the custom {{TrustStrategy}} should be removed 
because it is not even necessary for this example to work.
Or if you want to keep this, then there should be a big "WARNING: ..." comment 
in this line. Otherwise users might erroneously think a custom 
{{TrustStrategy}} is needed for TLS to work, or they might just keep this 
example code because their code "works", without understanding the consequences 
of this.


> Examples ClientCustomSSL and AsyncClientCustomSSL are misleading and insecure
> -----------------------------------------------------------------------------
>
>                 Key: HTTPCLIENT-2302
>                 URL: https://issues.apache.org/jira/browse/HTTPCLIENT-2302
>             Project: HttpComponents HttpClient
>          Issue Type: Bug
>            Reporter: Marcono1234
>            Priority: Major
>
> The examples 
> [ClientCustomSSL|https://github.com/apache/httpcomponents-client/blob/rel/v5.2.1/httpclient5/src/test/java/org/apache/hc/client5/http/examples/ClientCustomSSL.java]
>  and 
> [AsyncClientCustomSSL|https://github.com/apache/httpcomponents-client/blob/rel/v5.2.1/httpclient5/src/test/java/org/apache/hc/client5/http/examples/AsyncClientCustomSSL.java]
>  both have a Javadoc comment which says:
> {quote}This example demonstrates how to create secure connections with a 
> custom SSL context.
> {quote}
> However, this is misleading or even incorrect because the code below does the 
> following:
> {code:java}
> .loadTrustMaterial((chain, authType) -> {
>     final X509Certificate cert = chain[0];
>     return "CN=httpbin.org".equalsIgnoreCase(cert.getSubjectDN().getName());
> })
> {code}
> This accepts the certificate as long as the subject matches, without properly 
> validating it at all, allowing man-in-the-middle attacks.
> This can for example be seen with the various [https://badssl.com/] 
> subdomains. For example changing in the example the URL to 
> [https://self-signed.badssl.com/] and changing the expected subject to 
> {{"CN=*.badssl.com, O=BadSSL, L=San Francisco, ST=California, C=US"}} still 
> successfully creates the connection, even though the certificate is 
> self-signed and could have been issued by a malicious actor performing a MITM 
> attack.
> Ideally this section with the custom {{TrustStrategy}} should be removed 
> because it is not even necessary for this example to work.
> Or if you want to keep this, then there should be a big "WARNING: ..." 
> comment in this line. Otherwise users might erroneously think a custom 
> {{TrustStrategy}} is needed for TLS to work, or they might just keep this 
> example code because their code "works", without understanding the 
> consequences of this.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@hc.apache.org
For additional commands, e-mail: dev-h...@hc.apache.org

Reply via email to