Bug 568661 - JMS client does not verify that the hostname connected to matches that specified in the servers certificate
Summary: JMS client does not verify that the hostname connected to matches that specif...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise MRG
Classification: Red Hat
Component: qpid-java
Version: 1.2
Hardware: All
OS: Linux
high
medium
Target Milestone: 1.3
: ---
Assignee: Rajith Attapattu
QA Contact: Jiri Kolar
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-02-26 10:00 UTC by Gordon Sim
Modified: 2010-10-14 16:10 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Previously, the JMS client succeeded in connecting to a broker whose certificate had a random string as its common name. With this update, an option (ssl_verify_hostname=['true'/'false']) is introduced that verifies that the CN matches the hostname it believes it has connected to, if it does not, an error is raised.
Clone Of:
Environment:
Last Closed: 2010-10-14 16:10:11 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0773 0 normal SHIPPED_LIVE Moderate: Red Hat Enterprise MRG Messaging and Grid Version 1.3 2010-10-14 15:56:44 UTC

Description Gordon Sim 2010-02-26 10:00:39 UTC
Description of problem:

The JMS client will succeed in connecting to a broker whose certificate has a random string as the common name. It should (at least as an option) verify that the CN matches the hostname it believes it has connected to.

Version-Release number of selected component (if applicable):

1.2

How reproducible:

100%

Steps to Reproduce:
1. start qpidd with SSL enabled using certificate where CN=non.existent.server.com
2. connect over SSL from JMS client
  
Actual results:

Connects without error.

Expected results:

An error should be raised.

Additional info:

Comment 1 Rajith Attapattu 2010-03-24 15:27:57 UTC
This is tracked in upstream via https://issues.apache.org/jira/browse/QPID-2444
This is fixed by rev 925469 in Qpid trunk.
SSLTest in the systests has a test case for this.

In order to enable hostname verification, you need to use ssl_verify_hostname='true' in the broker URL.

Ex "amqp://guest:guest@test/?brokerlist='tcp://<hostname>:5671?ssl='true'&ssl_verify_hostname='true''"

Comment 3 Jiri Kolar 2010-10-04 13:04:56 UTC
fixed in qpid-java-client-0.7.946106-10.el5
mentioned test passes

validated on RHEL5.5/RHEL 4.8  i386 / x86_64

packages:
# rpm -qa | grep -E '(qpid|openais|rhm)' | sort -u
openais-0.80.6-16.el5_5.7
openais-devel-0.80.6-16.el5_5.7
python-qpid-0.7.946106-14.el5
qpid-cpp-client-0.7.946106-17.el5
qpid-cpp-client-devel-0.7.946106-17.el5
qpid-cpp-client-devel-docs-0.7.946106-17.el5
qpid-cpp-client-ssl-0.7.946106-17.el5
qpid-cpp-mrg-debuginfo-0.7.946106-14.el5
qpid-cpp-server-0.7.946106-17.el5
qpid-cpp-server-cluster-0.7.946106-17.el5
qpid-cpp-server-devel-0.7.946106-17.el5
qpid-cpp-server-ssl-0.7.946106-17.el5
qpid-cpp-server-store-0.7.946106-17.el5
qpid-cpp-server-xml-0.7.946106-17.el5
qpid-java-client-0.7.946106-10.el5
qpid-java-common-0.7.946106-10.el5
qpid-tools-0.7.946106-11.el5
rhm-docs-0.7.946106-5.el5
rh-tests-distribution-MRG-Messaging-qpid_common-1.6-53

->VERIFIED

Comment 4 Martin Prpič 2010-10-10 10:28:37 UTC
    Technical note added. If any revisions are required, please edit the "Technical Notes" field
    accordingly. All revisions will be proofread by the Engineering Content Services team.
    
    New Contents:
Previously, the JMS client succeeded in connecting to a broker whose certificate had a random string as its common name. With this update, an option (ssl_verify_hostname=['true'/'false']) is introduced that verifies that the CN matches the hostname it believes it has connected to, if it does not, an error is raised.

Comment 6 errata-xmlrpc 2010-10-14 16:10:11 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2010-0773.html


Note You need to log in before you can comment on or make changes to this bug.