RFR: 8202651: Test ActalisCA.java and ComodoCA fails
Sean Mullan
sean.mullan at oracle.com
Wed May 22 16:34:56 UTC 2019
On 5/22/19 12:04 PM, Rajan Halade wrote:
> On 5/22/19 8:39 AM, Sean Mullan wrote:
>> On 5/21/19 5:31 PM, Rajan Halade wrote:
>>> Please review this fix to update test certificates used in Actalis
>>> and Comodo CA interop tests. The bug also mentioned QuoVadisCA test
>>> but I am not able to reproduce the failure. For Actalis CA, I
>>> couldn't get revoked test certificate but the test is updated for
>>> valid certificate and will pass now by skipping expired revoked chain.
>>
>> It looks like the test is still expecting a revoked status - is that
>> still working because the IntCA is revoked?:
> It is working because revoked certificate is expired, test is skipped then.
Have you asked Actalis for a new revoked test certificate? If you can't
get one, I would remove the revoked certificates and the test for it
then, since you are not testing that behavior anymore and that is not
apparent from the test right now.
Also do you know why the revocation check for the intermediate CA is not
working?
>>
>> 232 // Validate Revoked
>> 233 pathValidator.validate(new String[]{REVOKED, INT_REVOKED},
>> 234 ValidatePathWithParams.Status.REVOKED,
>> 235 "Fri Jan 29 01:06:42 PST 2016", System.out);
>> 236
>>
>> It should be ok if the revoked certificate is expired though as you
>> can set the validation date to the past (within the interval where the
>> certificate is still valid).
>> Or is it because the Actalis OCSP responder is no longer reporting
>> that the certificate is revoked?
> Earlier test had past validation with OCSP but for some time now OCSP is
> returning UNKNOWN status instead of REVOKED. This could be an issue
> depending on how implementation treats UNKNOWN status. We will have to
> follow up with CA to check on policy - Is this only happening because we
> are using test certificate or is it a policy?
It depends, if it is a TLS certificate then it is usually acceptable to
report the revoked certificate as UNKNOWN after it expires since you
should not be trusting expired TLS certificates. For a code signing
certificate, it is better to retain the REVOKED status for a longer time
period after it expires since it may still be in use (for example, in a
timestamped application).
--Sean
>
> Thanks,
> Rajan
>>
>> --Sean
>>
>>>
>>> Webrev: http://cr.openjdk.java.net/~rhalade/8202651/webrev.00/
>>> Bug: https://bugs.openjdk.java.net/browse/JDK-8202651
>>>
>>> Thanks,
>>> Rajan
>
More information about the security-dev
mailing list