Fixed
Details
Assignee
Guus der KinderenGuus der KinderenReporter
Guus der KinderenGuus der KinderenFix versions
Priority
Minor
Details
Details
Assignee
Guus der Kinderen
Guus der KinderenReporter
Guus der Kinderen
Guus der KinderenFix versions
Priority
Created April 26, 2019 at 3:07 PM
Updated May 9, 2019 at 8:42 PM
Resolved May 9, 2019 at 8:42 PM
Openfire supports "mutual authentication", in which the PKIX certificate of the peer (either clients, or remote XMPP servers) is used as credentials (as opposed to a more traditional username/password).
When mutual authentication occurs, validation of the certificate happens on the TLS layer - in MINA, mostly. Later, the EXTERNAL SASL mechanism is used to authenticate/authorize the user represented by the credentials in the certificate.
In existing code, the validity and correctness of the provided certificate is checked in various places. Although this arguably is prudent (better safe than sorry), it does consume resources, and duplicates execution paths, which makes customization complex
It's desirable to introduce an option that allows an administrator to skip all surplus certificate validation.