On 30/04/17 12:02, Mark Thomas wrote:
> On 29/04/17 15:13, George Stanchev wrote:
>> TC 8.5.14 and noticed in the logs the following warning:
>>
>> "The truststoreProvider [AnyCert] does not support the
>> certificateVerificationDepth configuration option"
>>
>> In our case, we're using Shib's AnyCert trust manager to accept any
>> client cert on a particular connector as described here [1]. I
>> noticed that now one can inject the trust manager directly via
>> "trustManagerClassName" so I am planning to go that route to
>> eliminate the warning from the logs. But I looked at
>> JSSEUtils.java#getTrustManagers() and it looks like the warning is
>> emitted for any algorithm other than "PKIX". My question is, what if
>> an algorithm implementation doesn't care about
>> "certificateVerificationDepth"? By setting different algorithm the
>> user should realize that they are deviating from PKIX and therefore
>> configuration parameters that apply to PKIX (such as
>> "trustMaxCertLength" would not be passed down to the trust manager.
>> Doesn't it make sense to be logged at INFO level?
> 
> I think not.
> 
> What would be better is if the warning was only logged if the attribute
> was explicitly set.

This has been fixed in 8.5.x for 8.5.15 onwards and 9.0.x for 9.0.0.M21
onwards.

Mark


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to