有 Java 编程相关的问题?

你可以在下面搜索框中键入要查询的问题!

elasticsearch为不在Java中工作的elasticsearch Restclient禁用SSL验证

我正在尝试连接到gcp框中托管的弹性搜索。要连接到这个,有一个SSL检查,我需要一个证书

然而,通过这些讨论,我们有可能关闭这种验证

How to disable SSL verification for Elasticsearch RestClient v6.7.0 in Java

https://discuss.elastic.co/t/host-name-does-not-match-the-certificate/186618

我试图删除验证。但它有以下错误

javax.net.ssl.SSLHandshakeException: General SSLEngine problem
    at org.elasticsearch.client.RestClient$SyncResponseListener.get(RestClient.java:947)
    at org.elasticsearch.client.RestClient.performRequest(RestClient.java:229)
    at org.elasticsearch.client.RestHighLevelClient.internalPerformRequest(RestHighLevelClient.java:1762)
    at org.elasticsearch.client.RestHighLevelClient.performRequest(RestHighLevelClient.java:1732)
    at org.elasticsearch.client.RestHighLevelClient.performRequestAndParseEntity(RestHighLevelClient.java:1694)
    at org.elasticsearch.client.RestHighLevelClient.search(RestHighLevelClient.java:1090)
    at org.dexter.lab.elasticUtils.ESUtils.getLastIndexedTimeStamp(ESUtils.java:44)
    at org.dexter.lab.druidUtils.DruidDelayChecker.main(DruidDelayChecker.java:357)
Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
    at sun.security.ssl.Handshaker.checkThrown(Handshaker.java:1521)
    at sun.security.ssl.SSLEngineImpl.checkTaskThrown(SSLEngineImpl.java:528)
    at sun.security.ssl.SSLEngineImpl.writeAppRecord(SSLEngineImpl.java:1197)
    at sun.security.ssl.SSLEngineImpl.wrap(SSLEngineImpl.java:1165)
    at javax.net.ssl.SSLEngine.wrap(SSLEngine.java:469)
    at org.apache.http.nio.reactor.ssl.SSLIOSession.doWrap(SSLIOSession.java:265)
    at org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake(SSLIOSession.java:305)
    at org.apache.http.nio.reactor.ssl.SSLIOSession.isAppInputReady(SSLIOSession.java:509)
    at org.apache.http.impl.nio.reactor.AbstractIODispatch.inputReady(AbstractIODispatch.java:120)
    at org.apache.http.impl.nio.reactor.BaseIOReactor.readable(BaseIOReactor.java:162)
    at org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvent(AbstractIOReactor.java:337)
    at org.apache.http.impl.nio.reactor.AbstractIOReactor.processEvents(AbstractIOReactor.java:315)
    at org.apache.http.impl.nio.reactor.AbstractIOReactor.execute(AbstractIOReactor.java:276)
    at org.apache.http.impl.nio.reactor.BaseIOReactor.execute(BaseIOReactor.java:104)
    at org.apache.http.impl.nio.reactor.AbstractMultiworkerIOReactor$Worker.run(AbstractMultiworkerIOReactor.java:588)
    at java.lang.Thread.run(Thread.java:748)
Caused by: javax.net.ssl.SSLHandshakeException: General SSLEngine problem
    at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
    at sun.security.ssl.SSLEngineImpl.fatal(SSLEngineImpl.java:1709)
    at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:318)
    at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:310)
    at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1639)
    at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:223)
    at sun.security.ssl.Handshaker.processLoop(Handshaker.java:1037)
    at sun.security.ssl.Handshaker$1.run(Handshaker.java:970)
    at sun.security.ssl.Handshaker$1.run(Handshaker.java:967)
    at java.security.AccessController.doPrivileged(Native Method)
    at sun.security.ssl.Handshaker$DelegatedTask.run(Handshaker.java:1459)
    at org.apache.http.nio.reactor.ssl.SSLIOSession.doRunTask(SSLIOSession.java:283)
    at org.apache.http.nio.reactor.ssl.SSLIOSession.doHandshake(SSLIOSession.java:353)
    ... 9 more
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
    at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:397)
    at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:302)
    at sun.security.validator.Validator.validate(Validator.java:262)
    at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324)
    at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:281)
    at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:136)
    at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1626)
    ... 17 more
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
    at sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:141)
    at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:126)
    at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:280)
    at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:392)
    ... 23 more

我就是这么做的:

我做了一个重写来验证函数,并返回true。这样它就不会被检查了。这就是代码

restClientBuilder.setHttpClientConfigCallback(new RestClientBuilder.HttpClientConfigCallback() {
                @Override
                public HttpAsyncClientBuilder customizeHttpClient(HttpAsyncClientBuilder httpClientBuilder) {
                    return httpClientBuilder.setSSLHostnameVerifier(new HostnameVerifier() {
                        public boolean verify(String s, SSLSession sslSession) {
                            return true;
                        }
                    });
                }
            });

我尝试了另一种方法,就像弹性线中提到的那样

restClientBuilder.setHttpClientConfigCallback(new RestClientBuilder.HttpClientConfigCallback() {
                @Override
                public HttpAsyncClientBuilder customizeHttpClient(HttpAsyncClientBuilder httpClientBuilder) {
                    return httpClientBuilder.setSSLHostnameVerifier(NoopHostnameVerifier.INSTANCE);
                }
            });

我已经生成了一个自签名证书,并且它运行正常。我启用了调试日志,以了解为什么需要证书

以下是添加证书后的日志:

***
Found trusted certificate:
[
[
  Version: V3

接下来是关于证书的详细信息

问题是,我无法为生产环境生成自签名证书,而且即使在重写之后,我也会因为不使用证书而出现异常

有什么可能的解决办法吗?非常感谢您的帮助

提前谢谢


共 (1) 个答案

  1. # 1 楼答案

    在您的示例中,您只禁用了主机名验证。服务器(ElasticSearch或ElasticSearch之上的东西)正在向您发送公钥/证书,而您的Restclient会在ssl握手期间尝试验证这一点。你需要做的是告诉你的RestClient,从任何人那里收到证书都是可以的,但是当它收到证书时,它不应该真正验证它。因此,您需要一个定制的trustmanager,它的任务是验证证书,但实际上它根本不验证。您需要的是一个UnsafeX509ExtendedTrustManager,请参阅下面的代码片段和RestClient的用法:

    选项1

    public final class UnsafeX509ExtendedTrustManager extends X509ExtendedTrustManager {
    
        private static final X509ExtendedTrustManager INSTANCE = new UnsafeX509ExtendedTrustManager();
        private static final X509Certificate[] EMPTY_CERTIFICATES = new X509Certificate[0];
    
        private UnsafeX509ExtendedTrustManager() {}
    
        public static X509ExtendedTrustManager getInstance() {
            return INSTANCE;
        }
    
        @Override
        public void checkClientTrusted(X509Certificate[] certificates, String authType) { 
    
        }
    
        @Override
        public void checkClientTrusted(X509Certificate[] certificates, String authType, Socket socket) {
        
        }
    
        @Override
        public void checkClientTrusted(X509Certificate[] certificates, String authType, SSLEngine sslEngine) {
    
        }
    
        @Override
        public void checkServerTrusted(X509Certificate[] certificates, String authType) {
    
        }
    
        @Override
        public void checkServerTrusted(X509Certificate[] certificates, String authType, Socket socket) {
    
        }
    
        @Override
        public void checkServerTrusted(X509Certificate[] certificates, String authType, SSLEngine sslEngine) {
    
        }
    
        @Override
        public X509Certificate[] getAcceptedIssuers() {
            return EMPTY_CERTIFICATES;
        }
    
    }
    

    可以通过以下代码片段将上述trustmanager提供给RestHighLevelClient:

    SSLContext sslContext = SSLContext.getInstance("TLS");
    sslContext.init(null, new TrustManager[]{ UnsafeX509ExtendedTrustManager.INSTANCE }, null);
    
    RestClientBuilder restClientBuilder = RestClient
            .builder(new HttpHost("localhost", 9200, "https"))
            .setHttpClientConfigCallback(httpClientBuilder -> 
                    httpClientBuilder.setSSLContext(sslContext)
                                     .setSSLHostnameVerifier((host, session) -> true));
    

    顺便说一句,我不建议您或其他任何人使用UnsafeX509ExtendedTrustManager。这是不安全的,不应该在生产中使用

    选项2

    如果您不想将自定义代码添加到代码库中,而只想轻松禁用ssl验证,那么您可能希望尝试以下代码段。它是一个可以轻松生成SSLContext或其他ssl材料的库,并且可以选择禁用ssl验证

    <dependency>
        <groupId>io.github.hakky54</groupId>
        <artifactId>sslcontext-kickstart</artifactId>
        <version>7.1.0</version>
    </dependency>
    

    用法

    SSLFactory sslFactory = SSLFactory.builder()
              .withUnsafeTrustMaterial()
              .withUnsafeHostnameVerifier()
              .build();
    
    RestClientBuilder restClientBuilder = RestClient
            .builder(new HttpHost("localhost", 9200, "https"))
            .setHttpClientConfigCallback(httpClientBuilder -> 
                    httpClientBuilder.setSSLContext(sslFactory.getSslContext())
                                     .setSSLHostnameVerifier(sslFactory.getHostnameVerifier());