[ 
https://issues.apache.org/jira/browse/NIFI-1364?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15117781#comment-15117781
 ] 

ASF GitHub Bot commented on NIFI-1364:
--------------------------------------

Github user mcgilman commented on the pull request:

    https://github.com/apache/nifi/pull/163#issuecomment-175186780
  
    I had a little trouble merging the PR into the current state of master. I 
was able to get the relevant parts of the contribution and can be seen here [1].
    
    Additionally, I added TODO comments to the empty unit tests to be addressed 
when incorporating NIFI-1364 [2]. The presence of the empty test indicates key 
functionality that will be addressed with that ticket.
    
    Also, I tweak the name of the profile that enables the groovy unit tests to 
keep consistent with the other available profiles and added the groovy profile 
to the Travis CI config.
    
    @alopresto When running with the tests enabled, everything appears to run 
successfully however, I'm seeing checksum and other warnings for 
groovy-eclipse-batch. Have you seen these before?
    
    > [WARNING] Checksum validation failed, expected <!DOCTYPE but is 
e691b3c825cdd3ebbdd22017300182e953814469 for 
http://repository.codehaus.org/org/codehaus/groovy/groovy-eclipse-batch/maven-metadata.xml
    > [WARNING] The metadata 
~/.m2/repository/org/codehaus/groovy/groovy-eclipse-batch/maven-metadata-codehaus.org.xml
 is invalid: entity reference name can not contain character =' (position: 
START_TAG seen 
...com/main?ParticipantID=euekiz39ksg8nwp7iqj2fp5wzfwi5q76&FailedURI=... @1:269)
    
    Outside of these warnings everything looks good. Let me know if you seen 
issues with this artifact before. Other's have asked for these capabilities 
before so this is definitely a cool addition. Thanks!
    
    [1] 
https://github.com/mcgilman/nifi/commit/82919c1a0cb7b47d8e66045ed0638a992bc4b7ec
    [2] https://issues.apache.org/jira/browse/NIFI-1364


> Audit OCSP certificate validation
> ---------------------------------
>
>                 Key: NIFI-1364
>                 URL: https://issues.apache.org/jira/browse/NIFI-1364
>             Project: Apache NiFi
>          Issue Type: Task
>          Components: Core Framework
>    Affects Versions: 0.4.1
>            Reporter: Andy LoPresto
>            Assignee: Andy LoPresto
>              Labels: certificate, ocsp, security
>             Fix For: 0.6.0
>
>
> While upgrading the version of BouncyCastle libraries used, I had to re-write 
> the OCSP certificate validation code because BC split the PKIX code into a 
> separate module and renamed many classes & methods. During this re-write, I 
> made the code compile using the new logic, but I am unsure that OCSP 
> validation needs to occur outside of the SSL/TLS negotiation, or that the 
> current mechanism is correct. 
> Questions:
> * Can we use Java's built-in OCSP validation? [1][2]
> * Is the current mechanism correct, where a local cache is used with custom 
> internal classes representing OCSP requests and statuses, and it queries a 
> pre-specified OCSP responder as opposed to the per-certificate OCSP responder 
> listed in each certificate's Authority Information Access OCSP URI [3]? I 
> think this design decision stems from a legacy environment which may not 
> apply to current use cases. 
> More information: [4]
> [1] https://blogs.oracle.com/xuelei/entry/enable_ocsp_checking
> [2] 
> https://stackoverflow.com/questions/8506661/check-x509-certificate-revocation-status-in-spring-security-before-authenticatin
> [3] 
> https://blog.ivanristic.com/2014/02/checking-ocsp-revocation-using-openssl.html
> [4] 
> https://raymii.org/s/articles/OpenSSL_Manually_Verify_a_certificate_against_an_OCSP.html



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to