<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=us-ascii">
</head>
<body>
<div dir="ltr">
<div></div>
<div>
<div>
<div style="direction: ltr;">Note that many browsers also download certs from the AIA and even "well known" mechanisms. It won't help to access more truststores, that would be a function you need to prove directly. Also the dynamic installation from Windows
Updates or offline from crypt32.dll is not triggered when only browsing the existing stores.</div>
<div><br>
</div>
<div style="direction: ltr;">If you need that kind of integration it's probably better do not use java :)</div>
<div><br>
</div>
<div style="direction: ltr;">Chrome does install those dynamically loaded intermiates to Windows truststores, I think - it would not hurt to get access to it.</div>
</div>
<div><br>
</div>
<div class="ms-outlook-ios-signature">
<div><br>
</div>
<div style="direction: ltr;">-- </div>
<div style="direction: ltr;">http://bernd.eckenfels.net</div>
</div>
</div>
</div>
<hr style="display:inline-block;width:98%" tabindex="-1">
<div id="divRplyFwdMsg" dir="ltr"><font face="Calibri, sans-serif" style="font-size:11pt" color="#000000"><b>Von:</b> security-dev <security-dev-retn@openjdk.java.net> im Auftrag von Daniel Fuchs <daniel.fuchs@oracle.com><br>
<b>Gesendet:</b> Wednesday, July 8, 2020 11:09:26 AM<br>
<b>An:</b> Mark A. Claassen <MClaassen@ocie.net>; OpenJDK <security-dev@openjdk.java.net><br>
<b>Cc:</b> net-dev@openjdk.java.net <net-dev@openjdk.java.net><br>
<b>Betreff:</b> Re: Browser's accepting certificates that Java does not</font>
<div> </div>
</div>
<div class="BodyFragment"><font size="2"><span style="font-size:11pt;">
<div class="PlainText">Hi Mark,<br>
<br>
This is probably a question for the security-dev mailing list, which<br>
I have put in the to: of my reply.<br>
<br>
best regards,<br>
<br>
-- daniel<br>
<br>
On 07/07/2020 20:24, Mark A. Claassen wrote:<br>
> I was curious if there has been any thought to allowing accessing to other certificate stores in Windows besides the "Trusted Root Certification Authorities" and the "Personal" ones. It seems like web servers omitting intermediate certificates in the certificate
chain is pretty common. Browsers seems to fill in the gaps, but Java does not.<br>
> <br>
> We very recently encountered this again when a customer started proxying their SSL requests, creating a new certificate on the fly, resigning ours with their corporate CA. (The browser handled this fine, but our Java app detected a chain length of 2, instead
of 4 like in the browser.) Having them put their intermediate certificates in the "Trusted Root Certification Authorities" solved the issue, but they are unwilling to do this on a corporate-wide basis.<br>
> <br>
> If Java was able to access more keystores through the MSCAPI interface, is seems like it would fill in the gaps as well and remove a pain point we are experiencing where Java does not accept a certificate even though all their browsers will. I think all
intermediate certificates are supposed to be in the chain sent from the server (<a href="https://tools.ietf.org/html/rfc5246">https://tools.ietf.org/html/rfc5246</a>) in the TLS negotiation, but since browser's don't enforce care, people are left thinking
everything is great (until Java tries to connect).<br>
> <br>
> Thanks,<br>
> <br>
> Mark Claassen<br>
> Senior Software Engineer<br>
> <br>
> Donnell Systems, Inc.<br>
> 130 South Main Street<br>
> Leighton Plaza Suite 375<br>
> South Bend, IN 46601<br>
> E-mail: <a href="mailto:mclaassen@ocie.net">mailto:mclaassen@ocie.net</a><br>
> Voice: (574)232-3784<br>
> Fax: (574)232-4014<br>
> <br>
> Disclaimer:<br>
> The opinions provided herein do not necessarily state or reflect<br>
> those of Donnell Systems, Inc.(DSI). DSI makes no warranty for and<br>
> assumes no legal liability or responsibility for the posting.<br>
> <br>
<br>
</div>
</span></font></div>
</body>
</html>