Wozu einen eigenen MemorizingTrustManager? #27

Open
opened 2025-06-01 19:34:15 +02:00 by tristan · 2 comments
Owner

Warum wird 55e1901f1e/src/main/java/eu/siacs/conversations/services/MemorizingTrustManager.java benötigt?

java.security.cert.CertificateException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:661)
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)
at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:510)
at com.android.org.conscrypt.TrustManagerImpl.checkServerTrusted(TrustManagerImpl.java:339)
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:113)
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:87)
at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:118)
at eu.siacs.conversations.services.MemorizingTrustManager.checkCertTrusted(MemorizingTrustManager.java:420)
at eu.siacs.conversations.services.MemorizingTrustManager.-$$Nest$mcheckCertTrusted(Unknown Source:0)
at eu.siacs.conversations.services.MemorizingTrustManager$NonInteractiveMemorizingTrustManager.checkServerTrusted(MemorizingTrustManager.java:609)
at org.conscrypt.Platform.checkServerTrusted(Platform.java:437)
at org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1643)
at org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)
at org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:567)
at org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1099)
at org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1083)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:880)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:751)
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:716)
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:833)
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.access$100(ConscryptEngineSocket.java:706)
at org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:230)
at org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:209)
at org.conscrypt.ConscryptEngineSocket.waitForHandshake(ConscryptEngineSocket.java:547)
at org.conscrypt.ConscryptEngineSocket.getSession(ConscryptEngineSocket.java:304)
at eu.siacs.conversations.xmpp.XmppConnection.upgradeSocketToTls(XmppConnection.java:1540)
at eu.siacs.conversations.xmpp.XmppConnection.switchOverToTls(XmppConnection.java:1486)
at eu.siacs.conversations.xmpp.XmppConnection.processStream(XmppConnection.java:696)
at eu.siacs.conversations.xmpp.XmppConnection.connect(XmppConnection.java:566)
at eu.siacs.conversations.xmpp.XmppConnection.run(XmppConnection.java:680)
at java.lang.Thread.run(Thread.java:1012)
Caused by: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found.
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:661) 
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620) 
at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620) 
at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:510) 
at com.android.org.conscrypt.TrustManagerImpl.checkServerTrusted(TrustManagerImpl.java:339) 
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:113) 
at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:87) 
at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:118) 
at eu.siacs.conversations.services.MemorizingTrustManager.checkCertTrusted(MemorizingTrustManager.java:420) 
at eu.siacs.conversations.services.MemorizingTrustManager.-$$Nest$mcheckCertTrusted(Unknown Source:0) 
at eu.siacs.conversations.services.MemorizingTrustManager$NonInteractiveMemorizingTrustManager.checkServerTrusted(MemorizingTrustManager.java:609) 
at org.conscrypt.Platform.checkServerTrusted(Platform.java:437) 
at org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1643) 
at org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method) 
at org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:567) 
at org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1099) 
at org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1083) 
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:880) 
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:751) 
at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:716) 
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:833) 
at org.conscrypt.ConscryptEngineSocket$SSLInputStream.access$100(ConscryptEngineSocket.java:706) 
at org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:230) 
at org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:209) 
at org.conscrypt.ConscryptEngineSocket.waitForHandshake(ConscryptEngineSocket.java:547) 
at org.conscrypt.ConscryptEngineSocket.getSession(ConscryptEngineSocket.java:304) 
at eu.siacs.conversations.xmpp.XmppConnection.upgradeSocketToTls(XmppConnection.java:1540) 
at eu.siacs.conversations.xmpp.XmppConnection.switchOverToTls(XmppConnection.java:1486) 
at eu.siacs.conversations.xmpp.XmppConnection.processStream(XmppConnection.java:696) 
at eu.siacs.conversations.xmpp.XmppConnection.connect(XmppConnection.java:566) 
at eu.siacs.conversations.xmpp.XmppConnection.run(XmppConnection.java:680) 
at java.lang.Thread.run(Thread.java:1012) 

Warum wird https://git.fucktheforce.de/thedevstack/PiratX/src/commit/55e1901f1e8fdafd29951e9e035b96cc4bbfe482/src/main/java/eu/siacs/conversations/services/MemorizingTrustManager.java benötigt? java.security.cert.CertificateException: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found. at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:661) at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620) at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620) at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:510) at com.android.org.conscrypt.TrustManagerImpl.checkServerTrusted(TrustManagerImpl.java:339) at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:113) at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:87) at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:118) at eu.siacs.conversations.services.MemorizingTrustManager.checkCertTrusted(MemorizingTrustManager.java:420) at eu.siacs.conversations.services.MemorizingTrustManager.-$$Nest$mcheckCertTrusted(Unknown Source:0) at eu.siacs.conversations.services.MemorizingTrustManager$NonInteractiveMemorizingTrustManager.checkServerTrusted(MemorizingTrustManager.java:609) at org.conscrypt.Platform.checkServerTrusted(Platform.java:437) at org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1643) at org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method) at org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:567) at org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1099) at org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1083) at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:880) at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:751) at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:716) at org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:833) at org.conscrypt.ConscryptEngineSocket$SSLInputStream.access$100(ConscryptEngineSocket.java:706) at org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:230) at org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:209) at org.conscrypt.ConscryptEngineSocket.waitForHandshake(ConscryptEngineSocket.java:547) at org.conscrypt.ConscryptEngineSocket.getSession(ConscryptEngineSocket.java:304) at eu.siacs.conversations.xmpp.XmppConnection.upgradeSocketToTls(XmppConnection.java:1540) at eu.siacs.conversations.xmpp.XmppConnection.switchOverToTls(XmppConnection.java:1486) at eu.siacs.conversations.xmpp.XmppConnection.processStream(XmppConnection.java:696) at eu.siacs.conversations.xmpp.XmppConnection.connect(XmppConnection.java:566) at eu.siacs.conversations.xmpp.XmppConnection.run(XmppConnection.java:680) at java.lang.Thread.run(Thread.java:1012) Caused by: java.security.cert.CertPathValidatorException: Trust anchor for certification path not found. at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:661)  at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)  at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:620)  at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:510)  at com.android.org.conscrypt.TrustManagerImpl.checkServerTrusted(TrustManagerImpl.java:339)  at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:113)  at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:87)  at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:118)  at eu.siacs.conversations.services.MemorizingTrustManager.checkCertTrusted(MemorizingTrustManager.java:420)  at eu.siacs.conversations.services.MemorizingTrustManager.-$$Nest$mcheckCertTrusted(Unknown Source:0)  at eu.siacs.conversations.services.MemorizingTrustManager$NonInteractiveMemorizingTrustManager.checkServerTrusted(MemorizingTrustManager.java:609)  at org.conscrypt.Platform.checkServerTrusted(Platform.java:437)  at org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1643)  at org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)  at org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:567)  at org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1099)  at org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1083)  at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:880)  at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:751)  at org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:716)  at org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:833)  at org.conscrypt.ConscryptEngineSocket$SSLInputStream.access$100(ConscryptEngineSocket.java:706)  at org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:230)  at org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:209)  at org.conscrypt.ConscryptEngineSocket.waitForHandshake(ConscryptEngineSocket.java:547)  at org.conscrypt.ConscryptEngineSocket.getSession(ConscryptEngineSocket.java:304)  at eu.siacs.conversations.xmpp.XmppConnection.upgradeSocketToTls(XmppConnection.java:1540)  at eu.siacs.conversations.xmpp.XmppConnection.switchOverToTls(XmppConnection.java:1486)  at eu.siacs.conversations.xmpp.XmppConnection.processStream(XmppConnection.java:696)  at eu.siacs.conversations.xmpp.XmppConnection.connect(XmppConnection.java:566)  at eu.siacs.conversations.xmpp.XmppConnection.run(XmppConnection.java:680)  at java.lang.Thread.run(Thread.java:1012) 
Owner

Erklären kann ich es noch nicht, aber wenn die Änderungen dort via cherry-pick (codeberg.org/monocles/monocles_chat@749db4e793) übernommen werden, scheint es irgendwie wichtig zu sein.

Erklären kann ich es noch nicht, aber wenn die Änderungen dort via cherry-pick (https://codeberg.org/monocles/monocles_chat/commit/749db4e793184c318fdd0446e0c670661181c87e) übernommen werden, scheint es irgendwie wichtig zu sein.
Author
Owner

Der wirft auch Exceptions beim Aufruf von https://google.de - seltsam

Der wirft auch Exceptions beim Aufruf von https://google.de - seltsam
Sign in to join this conversation.
No labels
update fork
No milestone
No project
No assignees
2 participants
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
thedevstack/PiratX#27
No description provided.