[ 
https://issues.apache.org/jira/browse/ARTEMIS-5163?focusedWorklogId=986748&page=com.atlassian.jira.plugin.system.issuetabpanels:worklog-tabpanel#worklog-986748
 ]

ASF GitHub Bot logged work on ARTEMIS-5163:
-------------------------------------------

                Author: ASF GitHub Bot
            Created on: 10/Oct/25 15:19
            Start Date: 10/Oct/25 15:19
    Worklog Time Spent: 10m 
      Work Description: gemmellr commented on code in PR #5956:
URL: https://github.com/apache/activemq-artemis/pull/5956#discussion_r2420795555


##########
artemis-core-client/src/main/java/org/apache/activemq/artemis/spi/core/protocol/RemotingConnection.java:
##########
@@ -219,6 +220,16 @@ default void disconnect(DisconnectReason reason, String 
targetNodeID, TransportC
     */
    Subject getSubject();
 
+   /**
+    * sets the associated certificates for this connection
+    */
+   void setCertificates(X509Certificate[] certificates);

Review Comment:
   I see Justin was suggesting NettyServerConnection, I actually misread that, 
I was more thinking the NettyConnection impl class per my comment about the 
related instanceof already being in place (in CertificateUtil). Even though 
that class is also used in the client it would at least keep the setter off the 
interfaces where it shouldnt be, and avoid need for dummy impl in other 
classes. The related code is only called for that class, so it could perhaps 
even be moved there with just a getter then needed.
   
   You definitely cant add an `artemis-server` dependency to 
`artemis-core-client`, since the former already depends on the latter so it 
would form a loop and Maven simply wouldnt allow it.
   
   





Issue Time Tracking
-------------------

    Worklog Id:     (was: 986748)
    Time Spent: 3h 40m  (was: 3.5h)

> Artemis fails to send mqtt will message using mutual TLS
> --------------------------------------------------------
>
>                 Key: ARTEMIS-5163
>                 URL: https://issues.apache.org/jira/browse/ARTEMIS-5163
>             Project: ActiveMQ Artemis
>          Issue Type: Bug
>          Components: MQTT
>    Affects Versions: 2.31.2, 2.33.0, 2.38.0, 2.39.0, 2.42.0
>            Reporter: Olaf Gustav
>            Priority: Major
>              Labels: pull-request-available
>          Time Spent: 3h 40m
>  Remaining Estimate: 0h
>
> As discussed in the user mailing list, the MQTT broker fails to sent the 
> provided will message when using mutual TLS.
> +set-up for testing:+
>  * ActiveMQ Artemis 2.33 as MQTT broker
>  * Artemis runs on jdk-21
>  * clients are authenticated using mutual TLS
>  * certificate DN is used to map to a user and eventually to the configured 
> roles
> +issue:+
> During testing we discovered, that the provided will message is not sent as 
> expected. We got the following error messages:
> {code:none}
> WARN  [org.apache.activemq.artemis.core.server] AMQ222216: Security problem 
> while authenticating: AMQ229031: Unable to validate user from / 
> 127.0.0.1:51770. Username: null; SSL certificate subject DN: unavailable
> ERROR [org.apache.activemq.artemis.core.protocol.mqtt] AMQ834007: 
> Authorization failure sending will message: AMQ229031: Unable to validate 
> user from / 127.0.0.1:51770. Username: null; SSL certificate subject DN: 
> unavailable
> {code}
> I did some research in the code base. The class 
> *org.apache.activemq.artemis.core.remoting.CertificateUtil* retrieves the 
> certificate subject DN based on the actual client certificate provided by an 
> existing connection. When trying to send a mqtt will message, there is no 
> connection to the client anymore. Consequently, the broker fails to get the 
> DN. Since the subject DN serves as the key in the authentication cache 
> ({*}org.apache.activemq.artemis.core.security.impl. SecurityStoreImpl{*}), 
> the will message fails to be checked against access permissions.
> As a workaround, I used the RemotingConnection.clientID as authentication 
> cache key instead of the DN. That works as long as the parameter 
> *security-invalidation-interval* is properly defined, that means 
> {{{}security-invalidation-interval >> sessionExpiryInterval{}}}.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
For further information, visit: https://activemq.apache.org/contact


Reply via email to