Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

jdk11: security/infra/java/security/cert/CertPathValidator/certification/ComodoCA.java : unexpected status of EE certificate #12176

Closed
andrew-m-leonard opened this issue Mar 10, 2021 · 8 comments

Comments

@andrew-m-leonard
Copy link
Contributor

https://ci.adoptopenjdk.net/job/Test_openjdk11_j9_extended.openjdk_ppc64_aix/14/consoleFull
Passes with Hotspot, fails with OpenJ9:

17:53:04  openjdk version "11.0.11" 2021-04-20
17:53:04  OpenJDK Runtime Environment AdoptOpenJDK (build 11.0.11+5)
17:53:04  Eclipse OpenJ9 VM AdoptOpenJDK (build openj9-0.26.0-m1, JRE 11 AIX ppc64-64-Bit Compressed References 20210309_940 (JIT enabled, AOT enabled)
17:53:04  OpenJ9   - b227feba2
17:53:04  OMR      - 4665e2f72
17:53:04  JCL      - 73ab98c885 based on jdk-11.0.11+5)
01:47:02  =====================================================
01:47:02  CONFIGURATION
01:47:02  =====================================================
01:47:02  http.proxyHost :null
01:47:02  http.proxyPort :null
01:47:02  https.proxyHost :null
01:47:02  https.proxyPort :null
01:47:02  https.socksProxyHost :null
01:47:02  https.socksProxyPort :null
01:47:02  jdk.certpath.disabledAlgorithms :MD2, MD5, SHA1 jdkCA & usage TLSServer, RSA keySize < 1024, DSA keySize < 1024, EC keySize < 224, include jdk.disabled.namedCurves
01:47:02  Revocation options :[NO_FALLBACK]
01:47:02  OCSP responder set :null
01:47:02  Trusted root set: false
01:47:02  Expected EE Status:GOOD
01:47:02  =====================================================
01:47:02  Received exception: java.security.cert.CertPathValidatorException: Certificate has been revoked, reason: UNSPECIFIED, revocation date: Tue Mar 02 02:51:39 PST 2021, authority: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, extension OIDs: []
01:47:02  Expected Certificate status: GOOD
01:47:02  Certificate status after validation: REVOKED
01:47:02  STDERR:
01:47:02  certpath: PKIXCertPathValidator.engineValidate()...
01:47:02  certpath: X509CertSelector.match(SN: 3e8
01:47:02    Issuer: CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK
01:47:02    Subject: CN=Hongkong Post Root CA 1, O=Hongkong Post, C=HK)
01:47:02  certpath: X509CertSelector.match: subject DNs don't match
01:47:02  certpath: X509CertSelector.match(SN: 4caaf9cadb636fe01ff74ed85b03869d
01:47:02    Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02    Subject: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB)
01:47:02  certpath: X509CertSelector.match returning: true
01:47:02  certpath: YES - try this trustedCert
01:47:02  certpath: anchor.getTrustedCert().getSubjectX500Principal() = CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02  certpath: Constraints: MD2
01:47:02  certpath: Constraints: MD5
01:47:02  certpath: Constraints: SHA1 jdkCA & usage TLSServer
01:47:02  certpath: Constraints set to jdkCA.
01:47:02  certpath: Constraints usage length is 1
01:47:02  certpath: Constraints: RSA keySize < 1024
01:47:02  certpath: Constraints set to keySize: keySize < 1024
01:47:02  certpath: Constraints: DSA keySize < 1024
01:47:02  certpath: Constraints set to keySize: keySize < 1024
01:47:02  certpath: Constraints: EC keySize < 224
01:47:02  certpath: Constraints set to keySize: keySize < 224
01:47:02  certpath: Constraints: secp112r1
01:47:02  certpath: Constraints: secp112r2
01:47:02  certpath: Constraints: secp128r1
01:47:02  certpath: Constraints: secp128r2
01:47:02  certpath: Constraints: secp160k1
01:47:02  certpath: Constraints: secp160r1
01:47:02  certpath: Constraints: secp160r2
01:47:02  certpath: Constraints: secp192k1
01:47:02  certpath: Constraints: secp192r1
01:47:02  certpath: Constraints: secp224k1
01:47:02  certpath: Constraints: secp224r1
01:47:02  certpath: Constraints: secp256k1
01:47:02  certpath: Constraints: sect113r1
01:47:02  certpath: Constraints: sect113r2
01:47:02  certpath: Constraints: sect131r1
01:47:02  certpath: Constraints: sect131r2
01:47:02  certpath: Constraints: sect163k1
01:47:02  certpath: Constraints: sect163r1
01:47:02  certpath: Constraints: sect163r2
01:47:02  certpath: Constraints: sect193r1
01:47:02  certpath: Constraints: sect193r2
01:47:02  certpath: Constraints: sect233k1
01:47:02  certpath: Constraints: sect233r1
01:47:02  certpath: Constraints: sect239k1
01:47:02  certpath: Constraints: sect283k1
01:47:02  certpath: Constraints: sect283r1
01:47:02  certpath: Constraints: sect409k1
01:47:02  certpath: Constraints: sect409r1
01:47:02  certpath: Constraints: sect571k1
01:47:02  certpath: Constraints: sect571r1
01:47:02  certpath: Constraints: X9.62 c2tnb191v1
01:47:02  certpath: Constraints: X9.62 c2tnb191v2
01:47:02  certpath: Constraints: X9.62 c2tnb191v3
01:47:02  certpath: Constraints: X9.62 c2tnb239v1
01:47:02  certpath: Constraints: X9.62 c2tnb239v2
01:47:02  certpath: Constraints: X9.62 c2tnb239v3
01:47:02  certpath: Constraints: X9.62 c2tnb359v1
01:47:02  certpath: Constraints: X9.62 c2tnb431r1
01:47:02  certpath: Constraints: X9.62 prime192v2
01:47:02  certpath: Constraints: X9.62 prime192v3
01:47:02  certpath: Constraints: X9.62 prime239v1
01:47:02  certpath: Constraints: X9.62 prime239v2
01:47:02  certpath: Constraints: X9.62 prime239v3
01:47:02  certpath: Constraints: brainpoolP256r1
01:47:02  certpath: Constraints: brainpoolP320r1
01:47:02  certpath: Constraints: brainpoolP384r1
01:47:02  certpath: Constraints: brainpoolP512r1
01:47:02  certpath: AlgorithmChecker.contains: SHA384withRSA
01:47:02  certpath: --------------------------------------------------------------
01:47:02  certpath: Executing PKIX certification path validation algorithm.
01:47:02  certpath: Checking cert1 - Subject: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02  certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19}
01:47:02  certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker]
01:47:02  certpath: -checker1 validation succeeded
01:47:02  certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker]
01:47:02  certpath: Constraints.permits(): Cert:       [
01:47:02  [
01:47:02    Version: V3
01:47:02    Subject: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02    Signature Algorithm: SHA384withRSA, OID = 1.2.840.113549.1.1.12
01:47:02  
01:47:02    Key:  Sun RSA public key, 2048 bits
01:47:02    params: null
01:47:02    modulus: 18852343883976351177867209285375546899241199909056589260037763491541024287465416145152998663203131427976323178761005937575801782043437284432553301596955269720177700487530895867235139204029383419229415928025248677617223677276013727041477299253280342882950077393150865069014842382548000139105278661212298036383093899650524647783255378015347163229230119291591198923828804710000401144348493390132524893049049442021793791876844662894473716619309338133357929843669355088224946389994110884836643181091926364691135681642952410107742301254034779421629613126356726840806978638325975031897080564853329376999252821642300937074719
01:47:02    public exponent: 65537
01:47:02    Validity: [From: Sat Feb 11 16:00:00 PST 2012,
01:47:02                 To: Thu Feb 11 15:59:59 PST 2027]
01:47:02    Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02    SerialNumber: [    06a74380 d4ebfed4 35b5a3f7 e16abdd8]
01:47:02  
01:47:02  Certificate Extensions: 7
01:47:02  [1]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
01:47:02  AuthorityInfoAccess [
01:47:02    [
01:47:02     accessMethod: caIssuers
01:47:02     accessLocation: URIName: http://crt.comodoca.com/COMODORSAAddTrustCA.crt
01:47:02  , 
01:47:02     accessMethod: ocsp
01:47:02     accessLocation: URIName: http://ocsp.comodoca.com
01:47:02  ]
01:47:02  ]
01:47:02  
01:47:02  [2]: ObjectId: 2.5.29.35 Criticality=false
01:47:02  AuthorityKeyIdentifier [
01:47:02  KeyIdentifier [
01:47:02  0000: BB AF 7E 02 3D FA A6 F1   3C 84 8E AD EE 38 98 EC  ....=...<....8..
01:47:02  0010: D9 32 32 D4                                        .22.
01:47:02  ]
01:47:02  ]
01:47:02  
01:47:02  [3]: ObjectId: 2.5.29.19 Criticality=true
01:47:02  BasicConstraints:[
01:47:02    CA:true
01:47:02    PathLen:0
01:47:02  ]
01:47:02  
01:47:02  [4]: ObjectId: 2.5.29.31 Criticality=false
01:47:02  CRLDistributionPoints [
01:47:02    [DistributionPoint:
01:47:02       [URIName: http://crl.comodoca.com/COMODORSACertificationAuthority.crl]
01:47:02  ]]
01:47:02  
01:47:02  [5]: ObjectId: 2.5.29.32 Criticality=false
01:47:02  CertificatePolicies [
01:47:02    [CertificatePolicyId: [2.5.29.32.0]
01:47:02  [PolicyQualifierInfo: [
01:47:02    qualifierID: 1.3.6.1.5.5.7.2.1
01:47:02    qualifier: 0000: 16 1D 68 74 74 70 73 3A   2F 2F 73 65 63 75 72 65  ..https://secure
01:47:02  0010: 2E 63 6F 6D 6F 64 6F 2E   63 6F 6D 2F 43 50 53     .comodo.com/CPS
01:47:02  
01:47:02  ]]  ]
01:47:02  ]
01:47:02  
01:47:02  [6]: ObjectId: 2.5.29.15 Criticality=true
01:47:02  KeyUsage [
01:47:02    Key_CertSign
01:47:02    Crl_Sign
01:47:02  ]
01:47:02  
01:47:02  [7]: ObjectId: 2.5.29.14 Criticality=false
01:47:02  SubjectKeyIdentifier [
01:47:02  KeyIdentifier [
01:47:02  0000: 39 DA FF CA 28 14 8A A8   74 13 08 B9 E4 0E A9 D2  9...(...t.......
01:47:02  0010: FA 7E 9D 69                                        ...i
01:47:02  ]
01:47:02  ]
01:47:02  
01:47:02  ]
01:47:02    Algorithm: [SHA384withRSA]
01:47:02    Signature:
01:47:02  0000: 44 42 9D 41 51 2B 48 88   5D 97 9B 79 5E 11 01 4A  DB.AQ+H.]..y^..J
01:47:02  0010: 52 19 7B 41 2C C7 89 3C   D0 72 DC 85 FA 58 AF D5  R..A,..<.r...X..
01:47:02  0020: 25 E4 13 F8 58 65 67 9F   0D FF 57 8B A9 85 5E CA  %...Xeg...W...^.
01:47:02  0030: A6 4B B0 A7 B2 2D E0 8C   22 CD FB FF 79 A4 8C 2B  .K...-.."...y..+
01:47:02  0040: 8D FE 02 3D 24 DE A9 5D   5F E4 0F 47 D0 DB 66 25  ...=$..]_..G..f%
01:47:02  0050: 3E 87 47 0C AE 22 C5 50   22 84 D7 ED 4A 59 1A F6  >.G..".P"...JY..
01:47:02  0060: 93 A5 93 B0 E0 1B 81 F2   56 C4 C8 10 53 E4 D4 76  ........V...S..v
01:47:02  0070: B1 D1 5B 69 4B 77 B2 E0   4F C4 84 E7 D4 A0 50 EE  ..[iKw..O.....P.
01:47:02  0080: 3C FA 44 FC D0 57 B9 E1   28 53 FD 53 CD DC B9 1F  <.D..W..(S.S....
01:47:02  0090: 7A 40 BD 30 3F D8 6C D2   F3 E7 07 9F 1F 22 B5 EA  z@.0?.l......"..
01:47:02  00A0: 22 71 CB 2A F0 56 7C FE   AC A8 D1 06 0F 14 14 52  "q.*.V.........R
01:47:02  00B0: 4C FE 64 2B 0C 69 2A B8   0D 50 6E 3E 04 07 BF 7A  L.d+.i*..Pn>...z
01:47:02  00C0: 20 8B F8 EE 65 09 E1 C7   49 08 32 3D 0D 28 7E 49   ...e...I.2=.(.I
01:47:02  00D0: 1D B7 4A EF 02 E7 0D 80   17 C8 5C E0 61 62 CB EC  ..J.......\.ab..
01:47:02  00E0: B3 60 79 25 DA 1A 65 73   9C 38 10 A0 26 3A B0 C8  .`y%..es.8..&:..
01:47:02  00F0: 16 7D 93 31 22 EE 74 0B   88 C0 5C 89 41 00 28 A9  ...1".t...\.A.(.
01:47:02  0100: 47 31 DF 7D 49 45 9A F5   E6 A7 45 1A D2 8E 13 10  G1..IE....E.....
01:47:02  0110: DF 83 AF 9B 0D AD 7E 7E   9D 35 50 34 04 CE E9 20  .........5P4... 
01:47:02  0120: D6 9E DB 9D D4 A8 DA 64   B4 D1 2F 59 2E 5E A2 36  .......d../Y.^.6
01:47:02  0130: 61 D4 24 A0 82 33 33 8A   A1 D1 6C EF 61 68 A3 E5  a.$..33...l.ah..
01:47:02  0140: D2 56 AD C5 FD 5E 62 EB   15 A8 74 12 4C 2F 31 8C  .V...^b...t.L/1.
01:47:02  0150: E9 C1 DF 10 4B 01 EA F6   54 1B CD 7F 3B BD 5C 9F  ....K...T...;.\.
01:47:02  0160: C1 DB CF 01 CA F2 BA 60   12 21 31 ED A9 64 B8 B2  .......`.!1..d..
01:47:02  0170: 49 58 17 6D 5A D7 CD 8C   6D BE 9E 7F E2 02 58 A7  IX.mZ...m.....X.
01:47:02  0180: DB C3 2D 58 F6 74 06 6A   9A F6 61 F9 F6 00 B6 69  ..-X.t.j..a....i
01:47:02  0190: D8 3A 8B 31 59 DD 91 E6   7C 27 23 87 DD 03 0F 8F  .:.1Y....'#.....
01:47:02  01A0: 2A 8C 1E 83 01 4E 01 61   0C 52 73 6D FC 08 A2 B9  *....N.a.Rsm....
01:47:02  01B0: 2A 66 E4 76 4D 31 A0 56   9B D9 53 8D A2 B6 8F 02  *f.vM1.V..S.....
01:47:02  01C0: C8 E6 3A A6 04 D1 48 FB   C3 4A 02 76 FD 2F D2 BC  ..:...H..J.v./..
01:47:02  01D0: 13 B6 E8 6D 34 24 FA 9D   29 8A C7 A1 2B 14 F1 96  ...m4$..)...+...
01:47:02  01E0: 00 73 B9 13 E9 C0 B9 3A   47 56 02 71 80 27 A4 BC  .s.....:GV.q.'..
01:47:02  01F0: 25 B6 E9 BD E4 E9 98 74   16 F1 37 84 81 07 B4 82  %......t..7.....
01:47:02  
01:47:02  ]
01:47:02  SigAlgo:    SHA384withRSA
01:47:02  AlgParams:  None
01:47:02  NamedCurves: 
01:47:02  Variant:    generic
01:47:02  certpath: KeySizeConstraints.permits(): RSA
01:47:02  certpath: -checker2 validation succeeded
01:47:02  certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker]
01:47:02  certpath: KeyChecker.verifyCAKeyUsage() ---checking CA key usage...
01:47:02  certpath: KeyChecker.verifyCAKeyUsage() CA key usage verified.
01:47:02  certpath: -checker3 validation succeeded
01:47:02  certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker]
01:47:02  certpath: ---checking basic constraints...
01:47:02  certpath: i = 1, maxPathLength = 2
01:47:02  certpath: after processing, maxPathLength = 0
01:47:02  certpath: basic constraints verified.
01:47:02  certpath: ---checking name constraints...
01:47:02  certpath: prevNC = null, newNC = null
01:47:02  certpath: mergedNC = null
01:47:02  certpath: name constraints verified.
01:47:02  certpath: -checker4 validation succeeded
01:47:02  certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker]
01:47:02  certpath: PolicyChecker.checkPolicy() ---checking certificate policies...
01:47:02  certpath: PolicyChecker.checkPolicy() certIndex = 1
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 3
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 3
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 3
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy  ROOT
01:47:02  
01:47:02  certpath: PolicyChecker.processPolicies() policiesCritical = false
01:47:02  certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true
01:47:02  certpath: PolicyChecker.processPolicies() processing policy: 2.5.29.32.0
01:47:02  certpath: PolicyChecker.processParents(): matchAny = true
01:47:02  certpath: PolicyChecker.processParents() found parent:
01:47:02  anyPolicy  ROOT
01:47:02  
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy  ROOT
01:47:02    anyPolicy  CRIT: false  EP: anyPolicy  (1)
01:47:02  
01:47:02  certpath: PolicyChecker.checkPolicy() certificate policies verified
01:47:02  certpath: -checker5 validation succeeded
01:47:02  certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker]
01:47:02  certpath: ---checking validity:Tue Mar 09 17:47:01 PST 2021...
01:47:02  certpath: validity verified.
01:47:02  certpath: ---checking subject/issuer name chaining...
01:47:02  certpath: subject/issuer name chaining verified.
01:47:02  certpath: ---checking signature...
01:47:02  certpath: signature verified.
01:47:02  certpath: BasicChecker.updateState issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB; subject: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB; serial#: 8843850678629180984542216369971314136
01:47:02  certpath: -checker6 validation succeeded
01:47:02  certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker]
01:47:02  certpath: RevocationChecker.check: checking cert
01:47:02    SN:     06a74380 d4ebfed4 35b5a3f7 e16abdd8
01:47:02    Subject: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02    Issuer: CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02  certpath: connecting to OCSP service at: http://ocsp.comodoca.com
01:47:02  certpath: OCSP response status: SUCCESSFUL
01:47:02  certpath: OCSP response type: basic
01:47:02  certpath: Responder ID: byKey: BBAF7E023DFAA6F13C848EADEE3898ECD93232D4
01:47:02  certpath: OCSP response produced at: Tue Mar 09 00:04:39 PST 2021
01:47:02  certpath: OCSP number of SingleResponses: 1
01:47:02  certpath: thisUpdate: Tue Mar 09 00:04:39 PST 2021
01:47:02  certpath: nextUpdate: Tue Mar 16 01:04:39 PDT 2021
01:47:02  certpath: Status of certificate (with serial number 8843850678629180984542216369971314136) is: GOOD
01:47:02  certpath: OCSP response is signed by the target's Issuing CA
01:47:02  certpath: Constraints.permits(): Cert:       None
01:47:02  AlgParams:  None
01:47:02  NamedCurves: 
01:47:02  Variant:    generic
01:47:02  certpath: Verified signature of OCSP Response
01:47:02  certpath: OCSP response validity interval is from Tue Mar 09 00:04:39 PST 2021 until Tue Mar 16 01:04:39 PDT 2021
01:47:02  certpath: Checking validity of OCSP response on Tue Mar 09 17:47:01 PST 2021 with allowed interval between Tue Mar 09 17:32:01 PST 2021 and Tue Mar 09 18:02:01 PST 2021
01:47:02  certpath: -checker7 validation succeeded
01:47:02  certpath: 
01:47:02  cert1 validation succeeded.
01:47:02  
01:47:02  certpath: Checking cert2 - Subject: CN=comodorsacertificationauthority-ev.comodoca.com, OU=COMODO EV SGC SSL, O=Sectigo Limited, STREET="3rd Floor, 26 Office Village", STREET=Exchange Quay, STREET=Trafford Road, L=Salford, OID.2.5.4.17=M5 3EQ, C=GB, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, SERIALNUMBER=04058690
01:47:02  certpath: Set of critical extensions: {2.5.29.15, 2.5.29.19}
01:47:02  certpath: -Using checker1 ... [sun.security.provider.certpath.UntrustedChecker]
01:47:02  certpath: -checker1 validation succeeded
01:47:02  certpath: -Using checker2 ... [sun.security.provider.certpath.AlgorithmChecker]
01:47:02  certpath: Constraints.permits(): Cert:       [
01:47:02  [
01:47:02    Version: V3
01:47:02    Subject: CN=comodorsacertificationauthority-ev.comodoca.com, OU=COMODO EV SGC SSL, O=Sectigo Limited, STREET="3rd Floor, 26 Office Village", STREET=Exchange Quay, STREET=Trafford Road, L=Salford, OID.2.5.4.17=M5 3EQ, C=GB, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, SERIALNUMBER=04058690
01:47:02    Signature Algorithm: SHA256withRSA, OID = 1.2.840.113549.1.1.11
01:47:02  
01:47:02    Key:  Sun RSA public key, 2048 bits
01:47:02    params: null
01:47:02    modulus: 26383546808659189353247444703374744937177672109998575987013521927224496318316409484081469137903157521673813099184876589009240924477959897303230621474193078564808398917149553840263181442638463284671584708867409843815004880861108347026164087596329848878022476619600966982340443450786877604060821287936821618673322156343887273332620374383395938651577268536499384778055198324420773128592998536681098844682276365198366435119233692488311600195238062984310774811426910869918179863250175737032566495160421719858048678321204228382832065143556846145819355156270774614605411957777586730908456072988769539077490240151696663733197
01:47:02    public exponent: 65537
01:47:02    Validity: [From: Sun Sep 29 17:00:00 PDT 2019,
01:47:02                 To: Tue Dec 28 15:59:59 PST 2021]
01:47:02    Issuer: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02    SerialNumber: [    a0c7cabc c25ed935 8ded02cc 1d485545]
01:47:02  
01:47:02  Certificate Extensions: 10
01:47:02  [1]: ObjectId: 1.3.6.1.4.1.11129.2.4.2 Criticality=false
01:47:02  Extension unknown: DER encoded OCTET string =
01:47:02  0000: 04 82 01 6D 04 82 01 69   01 67 00 75 00 EE 4B BD  ...m...i.g.u..K.
01:47:02  0010: B7 75 CE 60 BA E1 42 69   1F AB E1 9E 66 A3 0F 7E  .u.`..Bi....f...
01:47:02  0020: 5F B0 72 D8 83 00 C4 7B   89 7A A8 FD CB 00 00 01  _.r......z......
01:47:02  0030: 6D 83 01 77 9F 00 00 04   03 00 46 30 44 02 20 3A  m..w......F0D. :
01:47:02  0040: 8F D5 E8 A7 3A 23 C7 9D   A1 B5 7C E6 4C 0E B1 1C  ....:#......L...
01:47:02  0050: 44 0C 63 AB 7B C4 97 DE   1F A7 8A 64 9A 47 BB 02  D.c........d.G..
01:47:02  0060: 20 6C 24 EB CF 13 A8 AB   81 C3 8E D7 F9 67 3F B3   l$..........g?.
01:47:02  0070: 51 BA 59 FB 88 F2 63 53   B4 F6 D0 F1 0A E7 FA E6  Q.Y...cS........
01:47:02  0080: 2B 00 76 00 55 81 D4 C2   16 90 36 01 4A EA 0B 9B  +.v.U.....6.J...
01:47:02  0090: 57 3C 53 F0 C0 E4 38 78   70 25 08 17 2F A3 AA 1D  W<S...8xp%../...
01:47:02  00A0: 07 13 D3 0C 00 00 01 6D   83 01 77 49 00 00 04 03  .......m..wI....
01:47:02  00B0: 00 47 30 45 02 21 00 B8   14 23 95 F1 33 53 47 6C  .G0E.!...#..3SGl
01:47:02  00C0: 90 DD AF 5F 61 DA 97 B7   2E 1C CA E2 DA 6E 07 F3  ..._a........n..
01:47:02  00D0: 90 F4 18 02 CA B1 97 02   20 5D AF A9 8D 08 1F C6  ........ ]......
01:47:02  00E0: AD B7 55 C7 4B BB 89 EC   F0 0B B9 AA EE 26 96 BA  ..U.K........&..
01:47:02  00F0: 04 77 AE B5 A5 48 0F 1F   59 00 76 00 BB D9 DF BC  .w...H..Y.v.....
01:47:02  0100: 1F 8A 71 B5 93 94 23 97   AA 92 7B 47 38 57 95 0A  ..q...#....G8W..
01:47:02  0110: AB 52 E8 1A 90 96 64 36   8E 1E D1 85 00 00 01 6D  .R....d6.......m
01:47:02  0120: 83 01 77 5A 00 00 04 03   00 47 30 45 02 20 5D B1  ..wZ.....G0E. ].
01:47:02  0130: B7 D9 D6 A0 31 E2 E1 B9   96 FE 2D 2A 49 3B 5B C8  ....1.....-*I;[.
01:47:02  0140: 06 6C 66 46 73 5D 8B 3E   45 6C 6F 5C 09 BC 02 21  .lfFs].>Elo\...!
01:47:02  0150: 00 AB D5 7F 5F F9 E6 D3   E5 F8 65 0D 43 41 51 15  ...._.....e.CAQ.
01:47:02  0160: 28 AD 3B 4C F1 04 1C 88   18 AE 78 1A AF 1E 4E FE  (.;L......x...N.
01:47:02  0170: D4                                                 .
01:47:02  
01:47:02  
01:47:02  [2]: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
01:47:02  AuthorityInfoAccess [
01:47:02    [
01:47:02     accessMethod: caIssuers
01:47:02     accessLocation: URIName: http://crt.comodoca.com/COMODORSAExtendedValidationSecureServerCA.crt
01:47:02  , 
01:47:02     accessMethod: ocsp
01:47:02     accessLocation: URIName: http://ocsp.comodoca.com
01:47:02  ]
01:47:02  ]
01:47:02  
01:47:02  [3]: ObjectId: 2.5.29.35 Criticality=false
01:47:02  AuthorityKeyIdentifier [
01:47:02  KeyIdentifier [
01:47:02  0000: 39 DA FF CA 28 14 8A A8   74 13 08 B9 E4 0E A9 D2  9...(...t.......
01:47:02  0010: FA 7E 9D 69                                        ...i
01:47:02  ]
01:47:02  ]
01:47:02  
01:47:02  [4]: ObjectId: 2.5.29.19 Criticality=true
01:47:02  BasicConstraints:[
01:47:02    CA:false
01:47:02    PathLen: undefined
01:47:02  ]
01:47:02  
01:47:02  [5]: ObjectId: 2.5.29.31 Criticality=false
01:47:02  CRLDistributionPoints [
01:47:02    [DistributionPoint:
01:47:02       [URIName: http://crl.comodoca.com/COMODORSAExtendedValidationSecureServerCA.crl]
01:47:02  ]]
01:47:02  
01:47:02  [6]: ObjectId: 2.5.29.32 Criticality=false
01:47:02  CertificatePolicies [
01:47:02    [CertificatePolicyId: [1.3.6.1.4.1.6449.1.2.1.5.1]
01:47:02  [PolicyQualifierInfo: [
01:47:02    qualifierID: 1.3.6.1.5.5.7.2.1
01:47:02    qualifier: 0000: 16 1D 68 74 74 70 73 3A   2F 2F 73 65 63 75 72 65  ..https://secure
01:47:02  0010: 2E 63 6F 6D 6F 64 6F 2E   63 6F 6D 2F 43 50 53     .comodo.com/CPS
01:47:02  
01:47:02  ]]  ]
01:47:02    [CertificatePolicyId: [2.23.140.1.1]
01:47:02  []  ]
01:47:02  ]
01:47:02  
01:47:02  [7]: ObjectId: 2.5.29.37 Criticality=false
01:47:02  ExtendedKeyUsages [
01:47:02    serverAuth
01:47:02    clientAuth
01:47:02  ]
01:47:02  
01:47:02  [8]: ObjectId: 2.5.29.15 Criticality=true
01:47:02  KeyUsage [
01:47:02    DigitalSignature
01:47:02    Key_Encipherment
01:47:02  ]
01:47:02  
01:47:02  [9]: ObjectId: 2.5.29.17 Criticality=false
01:47:02  SubjectAlternativeName [
01:47:02    DNSName: comodorsacertificationauthority-ev.comodoca.com
01:47:02  ]
01:47:02  
01:47:02  [10]: ObjectId: 2.5.29.14 Criticality=false
01:47:02  SubjectKeyIdentifier [
01:47:02  KeyIdentifier [
01:47:02  0000: 3E 4B 86 61 22 BC 0E A1   E1 AC F4 10 53 E2 E5 EA  >K.a".......S...
01:47:02  0010: F3 D5 31 FE                                        ..1.
01:47:02  ]
01:47:02  ]
01:47:02  
01:47:02  ]
01:47:02    Algorithm: [SHA256withRSA]
01:47:02    Signature:
01:47:02  0000: 33 F0 3F D5 D8 28 73 93   4F D6 7F B0 DD 25 FD A9  3.?..(s.O....%..
01:47:02  0010: 67 0D ED 04 FB 13 17 6B   9D 94 A5 62 09 F4 3C 5D  g......k...b..<]
01:47:02  0020: 9F C7 88 33 ED CB CD 2A   E7 1B A5 02 4D 03 80 BD  ...3...*....M...
01:47:02  0030: 6B 01 B2 77 26 0A F3 FA   39 28 35 17 B7 72 BB 79  k..w&...9(5..r.y
01:47:02  0040: BD 4E 01 9F CD 64 18 F2   82 C2 6C 8A 45 EF C6 50  .N...d....l.E..P
01:47:02  0050: 61 F2 81 28 A8 13 9F 3A   DA F6 E2 5D 0D 19 45 A7  a..(...:...]..E.
01:47:02  0060: 3F C4 1E BB F5 4F 70 83   04 47 85 7C A9 7F A2 9F  ?....Op..G......
01:47:02  0070: 4A 42 5E 44 9D EB B9 E4   A7 A0 6C 11 CA A1 0C F8  JB^D......l.....
01:47:02  0080: 26 CD D4 82 D6 04 07 B1   9B 81 76 8B 46 D7 83 9F  &.........v.F...
01:47:02  0090: 74 7D 5C 1B 56 D1 2B A1   9A 74 84 8B 1B 58 7C 04  t.\.V.+..t...X..
01:47:02  00A0: 5B A4 55 E9 B8 D8 1D 78   F6 FF 05 30 22 14 40 06  [.U....x...0".@.
01:47:02  00B0: 29 AC 05 6F D9 69 53 64   A0 71 F5 7C EE 2B A2 0A  )..o.iSd.q...+..
01:47:02  00C0: DF E9 25 1D 9D 3B 25 FB   E3 BE DE CF 3C 6E 47 29  ..%..;%.....<nG)
01:47:02  00D0: 23 16 04 C9 CC 69 31 CA   73 24 08 1B 7B 7D D7 2C  #....i1.s$.....,
01:47:02  00E0: 3B 06 73 4D 22 76 65 05   2B 05 B6 A8 DB 1E 10 DC  ;.sM"ve.+.......
01:47:02  00F0: AF BB AB B9 97 5B 8B 4A   DE AD 2B 22 DA A0 EB D3  .....[.J..+"....
01:47:02  
01:47:02  ]
01:47:02  SigAlgo:    SHA256withRSA
01:47:02  AlgParams:  None
01:47:02  NamedCurves: 
01:47:02  Variant:    generic
01:47:02  certpath: KeySizeConstraints.permits(): RSA
01:47:02  certpath: -checker2 validation succeeded
01:47:02  certpath: -Using checker3 ... [sun.security.provider.certpath.KeyChecker]
01:47:02  certpath: -checker3 validation succeeded
01:47:02  certpath: -Using checker4 ... [sun.security.provider.certpath.ConstraintsChecker]
01:47:02  certpath: ---checking basic constraints...
01:47:02  certpath: i = 2, maxPathLength = 0
01:47:02  certpath: after processing, maxPathLength = 0
01:47:02  certpath: basic constraints verified.
01:47:02  certpath: ---checking name constraints...
01:47:02  certpath: prevNC = null, newNC = null
01:47:02  certpath: mergedNC = null
01:47:02  certpath: name constraints verified.
01:47:02  certpath: -checker4 validation succeeded
01:47:02  certpath: -Using checker5 ... [sun.security.provider.certpath.PolicyChecker]
01:47:02  certpath: PolicyChecker.checkPolicy() ---checking certificate policies...
01:47:02  certpath: PolicyChecker.checkPolicy() certIndex = 2
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: explicitPolicy = 2
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyMapping = 2
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: inhibitAnyPolicy = 2
01:47:02  certpath: PolicyChecker.checkPolicy() BEFORE PROCESSING: policyTree = anyPolicy  ROOT
01:47:02    anyPolicy  CRIT: false  EP: anyPolicy  (1)
01:47:02  
01:47:02  certpath: PolicyChecker.processPolicies() policiesCritical = false
01:47:02  certpath: PolicyChecker.processPolicies() rejectPolicyQualifiers = true
01:47:02  certpath: PolicyChecker.processPolicies() processing policy: 1.3.6.1.4.1.6449.1.2.1.5.1
01:47:02  certpath: PolicyChecker.processParents(): matchAny = false
01:47:02  certpath: PolicyChecker.processParents(): matchAny = true
01:47:02  certpath: PolicyChecker.processParents() found parent:
01:47:02    anyPolicy  CRIT: false  EP: anyPolicy  (1)
01:47:02  
01:47:02  certpath: PolicyChecker.processPolicies() processing policy: 2.23.140.1.1
01:47:02  certpath: PolicyChecker.processParents(): matchAny = false
01:47:02  certpath: PolicyChecker.processParents(): matchAny = true
01:47:02  certpath: PolicyChecker.processParents() found parent:
01:47:02    anyPolicy  CRIT: false  EP: anyPolicy  (1)
01:47:02  
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: explicitPolicy = 2
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyMapping = 2
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: inhibitAnyPolicy = 2
01:47:02  certpath: PolicyChecker.checkPolicy() AFTER PROCESSING: policyTree = anyPolicy  ROOT
01:47:02    anyPolicy  CRIT: false  EP: anyPolicy  (1)
01:47:02      1.3.6.1.4.1.6449.1.2.1.5.1  CRIT: false  EP: 1.3.6.1.4.1.6449.1.2.1.5.1  (2)
01:47:02      2.23.140.1.1  CRIT: false  EP: 2.23.140.1.1  (2)
01:47:02  
01:47:02  certpath: PolicyChecker.checkPolicy() certificate policies verified
01:47:02  certpath: -checker5 validation succeeded
01:47:02  certpath: -Using checker6 ... [sun.security.provider.certpath.BasicChecker]
01:47:02  certpath: ---checking validity:Tue Mar 09 17:47:01 PST 2021...
01:47:02  certpath: validity verified.
01:47:02  certpath: ---checking subject/issuer name chaining...
01:47:02  certpath: subject/issuer name chaining verified.
01:47:02  certpath: ---checking signature...
01:47:02  certpath: signature verified.
01:47:02  certpath: BasicChecker.updateState issuer: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB; subject: CN=comodorsacertificationauthority-ev.comodoca.com, OU=COMODO EV SGC SSL, O=Sectigo Limited, STREET="3rd Floor, 26 Office Village", STREET=Exchange Quay, STREET=Trafford Road, L=Salford, OID.2.5.4.17=M5 3EQ, C=GB, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, SERIALNUMBER=04058690; serial#: 213713858402224217355623573844556010821
01:47:02  certpath: -checker6 validation succeeded
01:47:02  certpath: -Using checker7 ... [sun.security.provider.certpath.RevocationChecker]
01:47:02  certpath: RevocationChecker.check: checking cert
01:47:02    SN:     a0c7cabc c25ed935 8ded02cc 1d485545
01:47:02    Subject: CN=comodorsacertificationauthority-ev.comodoca.com, OU=COMODO EV SGC SSL, O=Sectigo Limited, STREET="3rd Floor, 26 Office Village", STREET=Exchange Quay, STREET=Trafford Road, L=Salford, OID.2.5.4.17=M5 3EQ, C=GB, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=GB, SERIALNUMBER=04058690
01:47:02    Issuer: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB
01:47:02  certpath: connecting to OCSP service at: http://ocsp.comodoca.com
01:47:02  certpath: OCSP response status: SUCCESSFUL
01:47:02  certpath: OCSP response type: basic
01:47:02  certpath: Responder ID: byKey: 39DAFFCA28148AA8741308B9E40EA9D2FA7E9D69
01:47:02  certpath: OCSP response produced at: Mon Mar 08 17:00:19 PST 2021
01:47:02  certpath: OCSP number of SingleResponses: 1
01:47:02  certpath: Revocation time: Tue Mar 02 02:51:39 PST 2021
01:47:02  certpath: Revocation reason: UNSPECIFIED
01:47:02  certpath: thisUpdate: Mon Mar 08 17:00:19 PST 2021
01:47:02  certpath: nextUpdate: Mon Mar 15 18:00:19 PDT 2021
01:47:02  certpath: Status of certificate (with serial number 213713858402224217355623573844556010821) is: REVOKED
01:47:02  certpath: OCSP response is signed by the target's Issuing CA
01:47:02  certpath: Constraints.permits(): Cert:       None
01:47:02  AlgParams:  None
01:47:02  NamedCurves: 
01:47:02  Variant:    generic
01:47:02  certpath: Verified signature of OCSP Response
01:47:02  certpath: OCSP response validity interval is from Mon Mar 08 17:00:19 PST 2021 until Mon Mar 15 18:00:19 PDT 2021
01:47:02  certpath: Checking validity of OCSP response on Tue Mar 09 17:47:01 PST 2021 with allowed interval between Tue Mar 09 17:32:01 PST 2021 and Tue Mar 09 18:02:01 PST 2021
01:47:02  certpath: X509CertSelector.match(SN: cbe
01:47:02    Issuer: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW
01:47:02    Subject: CN=TWCA Global Root CA, OU=Root CA, O=TAIWAN-CA, C=TW)
01:47:02  certpath: X509CertSelector.match: subject DNs don't match
01:47:02  java.lang.RuntimeException: TEST FAILED: unexpected status of EE certificate
01:47:02  	at ValidatePathWithParams.validate(ValidatePathWithParams.java:193)
01:47:02  	at ComodoRSA.runTest(ComodoCA.java:222)
01:47:02  	at ComodoCA.main(ComodoCA.java:62)
01:47:02  	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
01:47:02  	at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
01:47:02  	at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
01:47:02  	at java.base/java.lang.reflect.Method.invoke(Method.java:566)
01:47:02  	at com.sun.javatest.regtest.agent.MainWrapper$MainThread.run(MainWrapper.java:127)
01:47:02  	at java.base/java.lang.Thread.run(Thread.java:836)
01:47:02  
01:47:02  JavaTest Message: Test threw exception: java.lang.RuntimeException: TEST FAILED: unexpected status of EE certificate
@andrew-m-leonard
Copy link
Contributor Author

@andrew-m-leonard andrew-m-leonard changed the title jdk11 AIX: security/infra/java/security/cert/CertPathValidator/certification/ComodoCA.java : unexpected status of EE certificate jdk11: security/infra/java/security/cert/CertPathValidator/certification/ComodoCA.java : unexpected status of EE certificate Mar 10, 2021
@andrew-m-leonard
Copy link
Contributor Author

@pshipton
Copy link
Member

pshipton commented Mar 10, 2021

Based on some internal test information (openj9-openjdk-jdk11-zos/issues/596), this seems a recent regression, tracking the first failing build.

@pshipton
Copy link
Member

pshipton commented Mar 10, 2021

I tried the 0.23 and 0.24 release builds and they also fail, this isn't a (recent) regression.
Also tried running with -Djdk.nativeCrypto=false but this doesn't change the behavior.

@pshipton
Copy link
Member

@andrew-m-leonard are you able to take on determining why this fails on OpenJ9?

@sxa
Copy link
Contributor

sxa commented Mar 11, 2021

It's not specific to OpenJ9 as it shows up here too. I presume it's started failing since the 2nd March given that the error seems to be related to a certificate that was revoked on that date.

@andrew-m-leonard
Copy link
Contributor Author

Ah, so just re-tried Hotspot and it now fails as well: https://ci.adoptopenjdk.net/job/Grinder/7590/console
Looks like an expired certificate:

11:26:49  Received exception: java.security.cert.CertPathValidatorException: Certificate has been revoked, reason: UNSPECIFIED, revocation date: Tue Mar 02 04:51:39 CST 2021, authority: CN=COMODO RSA Extended Validation Secure Server CA, O=COMODO CA Limited, L=Salford, ST=Greater Manchester, C=GB, extension OIDs: []

@andrew-m-leonard
Copy link
Contributor Author

Raised an openjdk-build issue to investigate Cert validity: adoptium/temurin-build#2527

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants