[
https://issues.apache.org/jira/browse/NIFI-3788?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Andy LoPresto updated NIFI-3788:
--------------------------------
Summary: Support wildcard certificates in Amazon S3 Processors (was:
Support wildcard certificates in SSLStandardContextService)
> Support wildcard certificates in Amazon S3 Processors
> -----------------------------------------------------
>
> Key: NIFI-3788
> URL: https://issues.apache.org/jira/browse/NIFI-3788
> Project: Apache NiFi
> Issue Type: Improvement
> Components: Core Framework
> Affects Versions: 1.1.1
> Reporter: Andy LoPresto
> Assignee: Andy LoPresto
> Labels: certificate, pki, security, tls
> Fix For: 1.2.0
>
>
> Some users have reported issues when attempting to connect to an external
> service which is secured for TLS via a wildcard certificate (i.e. hostname is
> {{https://example.domain.com}} and the certificate DN contains
> {{CN=\*.domain.com}} when *using the Amazon Web Services (AWS S3)
> processors*. -This requires changes in the {{SSLStandardContextService}} to
> correctly parse the CN and evaluate wildcard entries if present- This
> required changes in the {{DefaultHostnameVerifier}} instance being passed to
> the {{SdkTLSSocketFactory}} and {{AmazonHTTPClientConfig}} in
> {{AbstractAWSProcessor}}.
> In addition, as specified by [RFC 2818|https://tools.ietf.org/html/rfc2818],
> certificate evaluation (specifically hostname validation) should prioritize
> Subject Alternative Names over DN parsing. Chrome 58+ has begun to implement
> this prioritization, which can cause issues with certificate validation even
> if the CN matches the hostname but SANs are present but do not include the
> hostname.
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)