Impossibility to validate certificate path and revocation #1506
-
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
Glad to hear the book has been helpful. Okay, so this is not invalid (perhaps a little incomplete, but not invalid). The CertPath API is designed around the idea that if revocation is enabled everyone down the chain will be able to revoke a certificate appearing in it, so the exception you are seeing is because higher up the chain the cert path API is unable to find a CRL. There's two options in this case. If you can provide an empty CRL for the trust anchor and the CA. I'm guessing the assumption was originally that this would never happen - I've seen people say that before... I've even said it myself... I'd recommend the empty CRL just in case this turns out not to be the case. The second option is to disable the automatic CRL checking and use purpose built PKIXCertPathChecker using the PKIXParameters.addCertPathChecker() method to add it in to the CertPathValidation. You can then use the checker you've specified for handling your specific revocation case (the need to only check the end entity). |
Beta Was this translation helpful? Give feedback.
Glad to hear the book has been helpful.
Okay, so this is not invalid (perhaps a little incomplete, but not invalid). The CertPath API is designed around the idea that if revocation is enabled everyone down the chain will be able to revoke a certificate appearing in it, so the exception you are seeing is because higher up the chain the cert path API is unable to find a CRL.
There's two options in this case.
If you can provide an empty CRL for the trust anchor and the CA. I'm guessing the assumption was originally that this would never happen - I've seen people say that before... I've even said it myself... I'd recommend the empty CRL just in case this turns out not to be the case.
The seco…