Uploaded image for project: 'JDK'
  1. JDK
  2. JDK-8031825

OCSP client can't find responder cert if it uses a different subject key id algorithm than responderID

    Details

    • Subcomponent:
    • Introduced In Build:
      b119
    • Resolved In Build:
      b126
    • Verification:
      Verified

      Backports

        Description

        The OCSP client code tries to match the responderID (in an OCSP response) against the subject key identifier of the responder cert. This works if the subject key id is using the same algorithm as defined in RFC 2560 (160-bit SHA-1 hash of responder's public key), but RFC 5280 allows implementations to use a different algorithm. For example, RFC 7093 defines new methods using stronger SHA-2 algorithms. We fail to find a responder cert in these situations, and throw the following exception:

        java.security.cert.CertPathValidatorException: Unable to verify OCSP Response's signature

          Issue Links

            Activity

            Hide
            mullan Sean Mullan added a comment -
            8-critical-request justification:

            This bug fix is needed because the impact of this issue is pretty severe with an awkward workaround. The revocation checks for a signed applet would fail, and the signed applet would fail to load, and the only workaround is to disable OCSP in the Control Panel.

            So far we have only found one CA that this bug affects. However, we do not have 100% test coverage for all the CAs that we include.

            Also, this bug can be triggered if the OCSP responder certificate is using stronger SHA-2 algorithms to generate the subject key identifier (see http://www.rfc-editor.org/rfc/rfc7093.txt ). So, there is an increased risk that we may encounter issues with other OCSP responders who are upgrading their certificates to use stronger algorithms.

            The fix is understood, small, and should be low risk. Code Review in progress. See http://cr.openjdk.java.net/~mullan/webrevs/8031825/webrev.00/
            Show
            mullan Sean Mullan added a comment - 8-critical-request justification: This bug fix is needed because the impact of this issue is pretty severe with an awkward workaround. The revocation checks for a signed applet would fail, and the signed applet would fail to load, and the only workaround is to disable OCSP in the Control Panel. So far we have only found one CA that this bug affects. However, we do not have 100% test coverage for all the CAs that we include. Also, this bug can be triggered if the OCSP responder certificate is using stronger SHA-2 algorithms to generate the subject key identifier (see http://www.rfc-editor.org/rfc/rfc7093.txt ). So, there is an increased risk that we may encounter issues with other OCSP responders who are upgrading their certificates to use stronger algorithms. The fix is understood, small, and should be low risk. Code Review in progress. See http://cr.openjdk.java.net/~mullan/webrevs/8031825/webrev.00/
            Hide
            chravel Christophe Ravel (Inactive) added a comment -
            SQE approves this fix for JDK 8
            Show
            chravel Christophe Ravel (Inactive) added a comment - SQE approves this fix for JDK 8
            Hide
            maxelsso Mathias Axelsson (Inactive) added a comment -
            Release team: Approved for fixing.
            Show
            maxelsso Mathias Axelsson (Inactive) added a comment - Release team: Approved for fixing.
            Hide
            hgupdate HG Updates added a comment -
            URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/57c26829deb6
            User: mullan
            Date: 2014-01-23 00:13:11 +0000
            Show
            hgupdate HG Updates added a comment - URL: http://hg.openjdk.java.net/jdk8/tl/jdk/rev/57c26829deb6 User: mullan Date: 2014-01-23 00:13:11 +0000
            Hide
            hgupdate HG Updates added a comment -
            URL: http://hg.openjdk.java.net/jdk8/jdk8/jdk/rev/57c26829deb6
            User: amurillo
            Date: 2014-01-24 02:17:46 +0000
            Show
            hgupdate HG Updates added a comment - URL: http://hg.openjdk.java.net/jdk8/jdk8/jdk/rev/57c26829deb6 User: amurillo Date: 2014-01-24 02:17:46 +0000

              People

              • Assignee:
                mullan Sean Mullan
                Reporter:
                mullan Sean Mullan
              • Votes:
                0 Vote for this issue
                Watchers:
                12 Start watching this issue

                Dates

                • Due:
                  Created:
                  Updated:
                  Resolved: