Yes. Thanks.
Test works fine with 1.6.16

Kai


2014-07-02 18:20 GMT+02:00 Colm O hEigeartaigh <cohei...@apache.org>:

> I believe you are seeing this problem:
>
> https://issues.apache.org/jira/browse/WSS-504
>
> Colm.
>
>
> On Wed, Jul 2, 2014 at 4:59 PM, Kai Rommel <krommel2...@googlemail.com>
> wrote:
>
>> Hi,
>> the description of the constants sigSubjectCertConstraints states:
>>     /**
>>      * This configuration tag is a comma separated String of regular
>> expressions which
>>      * will be applied to the subject DN of the certificate used for
>> signature
>>      * validation, after trust verification of the certificate chain
>> associated with the
>>      * certificate. These constraints are not used when the certificate
>> is contained in
>>      * the keystore (direct trust).
>>      */
>>
>> But within the coding of wss4j 1.6.12 the constraints check is always
>> executed.
>>
>> My requirement is to force the upload of the public certificate into the
>> truststore. When this is not done the verification should fail. To avoid
>> that the verification is successful when the public certificate of the root
>> CA is present, I set the value for sigSubjectCertConstraints to
>> "NEVERMATCHES^". But in this case the constraint is checked even when the
>> public certificate was uploaded beforehand.
>>
>> The solution is to set the the constraint to the DN of the public
>> certificate. Nevertheless, with the "NEVERMATCHES^" approach I was able to
>> configure all my cxf-endpoints the same way, and I could handle the
>> verification via the upload of the certificate into the keystore (direct
>> trust).
>>
>> When the description is still valid, isn't there a bug in the coding?
>>
>> Best regards,
>> Kai
>>
>>
>>
>
>
> --
> Colm O hEigeartaigh
>
> Talend Community Coder
> http://coders.talend.com
>

Reply via email to