On 29/04/17 15:13, George Stanchev wrote:
> TC 8.5.14 and noticed in the logs the following warning:
> 
> "The truststoreProvider [AnyCert] does not support the
> certificateVerificationDepth configuration option"
> 
> In our case, we're using Shib's AnyCert trust manager to accept any
> client cert on a particular connector as described here [1]. I
> noticed that now one can inject the trust manager directly via
> "trustManagerClassName" so I am planning to go that route to
> eliminate the warning from the logs. But I looked at
> JSSEUtils.java#getTrustManagers() and it looks like the warning is
> emitted for any algorithm other than "PKIX". My question is, what if
> an algorithm implementation doesn't care about
> "certificateVerificationDepth"? By setting different algorithm the
> user should realize that they are deviating from PKIX and therefore
> configuration parameters that apply to PKIX (such as
> "trustMaxCertLength" would not be passed down to the trust manager.
> Doesn't it make sense to be logged at INFO level?

I think not.

What would be better is if the warning was only logged if the attribute
was explicitly set.

Mark

> George
> 
> 
> [1]
> https://wiki.shibboleth.net/confluence/display/SHIB/TomcatClientCertAuthN
>

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to