[RFC][icedtea-web] PR742: Fix checking multiple levels of JAR certs for trust
Danesh Dadachanji
ddadacha at redhat.com
Fri Aug 12 09:14:28 PDT 2011
On 11/08/11 12:23 PM, Deepak Bhole wrote:
> * Danesh Dadachanji<ddadacha at redhat.com> [2011-08-11 12:20]:
>>
>>
>>
>> On 10/08/11 06:01 PM, Deepak Bhole wrote:
>>> * Danesh Dadachanji<ddadacha at redhat.com> [2011-08-10 17:20]:
>>>> Hello,
>>>>
>>>> Here's an update for this bug. It took so long because of the (at
>>>> the time) mysterious PR771. This will now check all the certificates
>>>> along the certPath for trust in the store. It also displays a new
>>>> icon[1] and automatically selects the "Always Trust" checkbox when
>>>> an applet is verified. Along the way I found a miscalculation in the
>>>> window size of the dialog. It was too small to display the entire
>>>> icon so I increased the height.
>>>>
>>>> I've tested it on all of the certificate holding JNLPs on the test
>>>> wiki page.
>>>>
>>>> The original reporter's applet is signed by an older version of a
>>>> Thawte CA which I was unable to find online. The newer version is
>>>> technically considered a different certificate (public keys are
>>>> different) so this patch still won't verify their applet.
>>>>
>>>
>>> Hi Danesh,
>>>
>>> Patch looks good. Couple of minor things:
>>>
>>
>> Hi Deepak,
>>
>> Thanks for the review!
>>
>> I pulled the icon stuff out and into another patch because it isn't
>> related to PR742. I will email a patch in a few moments. The subject
>> will be: Update UI for SecurityDialog
>>
>
> Hi Danesh,
>
> Looks good! The changelog lines seem to start with a space instead of a
> tab. I assume this is just an error from pasting though. Please
> make sure they start with tabs as the other others.
>
> After that, ok for HEAD.
Yep, it was a copy paste error.
Pushed to HEAD, thanks for the review!
Danesh
>
> Cheers,
> Deepak
>
>>> When a cert has been verified and we show a prompt with the new question
>>> icon, the title still says "Warning - Security" ... we should probably
>>> update this to something that doesn't look as alarming ... maybe
>>> "Security approval needed" or something?
>>>
>>> Also, one code related fix below:
>>>
>>>> - rootInCacerts = CertificateUtils.inKeyStores(root, caKeyStores);
>>>> + // Check entire cert path for a trusted CA
>>>> + List<? extends Certificate> certList = certPath.getCertificates();
>>>> + for (int i = 0; i != certList.size(); i++) {
>>>> + if ((rootInCacerts = CertificateUtils.inKeyStores(
>>>> + (X509Certificate) certList.get(i), caKeyStores))) {
>>>> + break;
>>>> + }
>>>> + }
>>>
>>> It would be cleaner to use the Java foreach syntax with
>>> certPath.getCertificates() directly... e.g.:
>>>
>>> for (Certificate c: certPath.getCertificates()) {
>>> ...
>>> }
>>
>> I changed it to this =)
>>
>> ChangeLog
>> +2011-08-11 Danesh Dadachanji<ddadacha at redhat.com>
>> +
>> + PR742: IcedTea-Web checks certs only upto 1 level deep before declaring
>> + them untrusted.
>> + * NEWS: Updated.
>> + * netx/net/sourceforge/jnlp/tools/JarSigner.java:
>> + (checkTrustedCerts): All certs along certPath are now checked for trust.
>> +
>>
>>>
>>> Cheers,
>>> Deepak
>>
>
>> diff -r 27f08d58854f NEWS
>> --- a/NEWS Tue Aug 09 17:34:35 2011 -0400
>> +++ b/NEWS Thu Aug 11 12:16:08 2011 -0400
>> @@ -19,6 +19,7 @@ New in release 1.2 (2011-XX-XX):
>> Common
>> - PR768: Signed applets/Web Start apps don't work with OpenJDK7 and up
>> - PR771: IcedTea-Web certificate verification code does not use the right API
>> + - PR742: IcedTea-Web checks certs only upto 1 level deep before declaring them untrusted.
>>
>> New in release 1.1 (2011-XX-XX):
>> * Security updates
>> diff -r 27f08d58854f netx/net/sourceforge/jnlp/tools/JarSigner.java
>> --- a/netx/net/sourceforge/jnlp/tools/JarSigner.java Tue Aug 09 17:34:35 2011 -0400
>> +++ b/netx/net/sourceforge/jnlp/tools/JarSigner.java Thu Aug 11 12:16:08 2011 -0400
>> @@ -373,7 +373,13 @@ public class JarSigner implements CertVe
>> alreadyTrustPublisher = CertificateUtils.inKeyStores(publisher, certKeyStores);
>> X509Certificate root = (X509Certificate) getRoot();
>> KeyStore[] caKeyStores = KeyStores.getCAKeyStores();
>> - rootInCacerts = CertificateUtils.inKeyStores(root, caKeyStores);
>> + // Check entire cert path for a trusted CA
>> + for (Certificate c : certPath.getCertificates()) {
>> + if ((rootInCacerts = CertificateUtils.inKeyStores(
>> + (X509Certificate) c, caKeyStores))) {
>> + break;
>> + }
>> + }
>> } catch (Exception e) {
>> // TODO: Warn user about not being able to
>> // look through their cacerts/trusted.certs
>
More information about the distro-pkg-dev
mailing list