Java 6 似乎支持最高 v1.0 的 TLS,有没有办法在 Java 6 中使用 TLS 1.2?
也许 Java 6 的补丁或特定更新会支持它?
在使用 Oracle JDK 1.6 几个小时后,我无需更改任何代码即可使其工作。魔术是由 Bouncy Castle 完成的,以处理 SSL 并默认允许 JDK 1.6 与 TLSv1.2 一起运行。理论上,它也可以应用于较旧的 Java 版本,并最终进行调整。
${JAVA_HOME}/jre/lib/ext文件夹中${JAVA_HOME}/jre/lib/security/java.security注释掉提供程序部分并添加一些额外的行    # Original security providers (just comment it)
    # security.provider.1=sun.security.provider.Sun
    # security.provider.2=sun.security.rsa.SunRsaSign
    # security.provider.3=com.sun.net.ssl.internal.ssl.Provider
    # security.provider.4=com.sun.crypto.provider.SunJCE
    # security.provider.5=sun.security.jgss.SunProvider
    # security.provider.6=com.sun.security.sasl.Provider
    # security.provider.7=org.jcp.xml.dsig.internal.dom.XMLDSigRI
    # security.provider.8=sun.security.smartcardio.SunPCSC
    # Add the Bouncy Castle security providers with higher priority
    security.provider.1=org.bouncycastle.jce.provider.BouncyCastleProvider
    security.provider.2=org.bouncycastle.jsse.provider.BouncyCastleJsseProvider
    
    # Original security providers with different priorities
    security.provider.3=sun.security.provider.Sun
    security.provider.4=sun.security.rsa.SunRsaSign
    security.provider.5=com.sun.net.ssl.internal.ssl.Provider
    security.provider.6=com.sun.crypto.provider.SunJCE 
    security.provider.7=sun.security.jgss.SunProvider
    security.provider.8=com.sun.security.sasl.Provider
    security.provider.9=org.jcp.xml.dsig.internal.dom.XMLDSigRI
    security.provider.10=sun.security.smartcardio.SunPCSC
    # Here we are changing the default SSLSocketFactory implementation
    ssl.SocketFactory.provider=org.bouncycastle.jsse.provider.SSLSocketFactoryImpl
为了确保它正常工作,让我们制作一个简单的 Java 程序来使用 https 从一个 URL 下载文件。
import java.io.*;
import java.net.*;
public class DownloadWithHttps {
    public static void main(String[] args) {
        try {
            URL url = new URL(args[0]);
            System.out.println("File to Download: " + url);
            String filename = url.getFile();
            File f = new File(filename);
            System.out.println("Output File: " + f.getName());
            BufferedInputStream in = new BufferedInputStream(url.openStream());
            FileOutputStream fileOutputStream = new FileOutputStream(f.getName());
            int bytesRead;
            byte dataBuffer[] = new byte[1024];
            while ((bytesRead = in.read(dataBuffer, 0, 1024)) != -1) {
                fileOutputStream.write(dataBuffer, 0, bytesRead);
            }
            fileOutputStream.close();
        } catch (Exception ex) {
            ex.printStackTrace();
        }
    }
}
现在,只需编译 DownloadWithHttps.java 程序并使用您的 Java 1.6 执行它
${JAVA_HOME}/bin/javac DownloadWithHttps.java
${JAVA_HOME}/bin/java DownloadWithHttps https://repo1.maven.org/maven2/org/apache/commons/commons-lang3/3.10/commons-lang3-3.10.jar
Windows 用户重要提示:此解决方案已在 Linux 操作系统中测试,如果您使用的是 Windows,请替换${JAVA_HOME}为%JAVA_HOME%.
公共 Oracle Java 6 版本不支持 TLSv1.2。Java 6(EOL 后)的付费版本可能会。(更新- 从更新 111 开始,TLSv1.1 可用于 Java 1.6;来源)
联系 Oracle 销售。
其他替代方案是:
使用替代的 JCE 实现,例如 Bouncy Castle。有关如何执行此操作的详细信息,请参阅此答案。它更改了默认SSLSocketFactory实现,因此您的应用程序将透明地使用 BC。(其他答案显示了如何SSLSocketFactory显式使用 BC 实现,但该方法将需要修改打开套接字的应用程序或库代码。)
使用 IBM Java 6 ...如果适用于您的平台。根据“IBM SDK,Java 技术版修复以缓解 POODLE 安全漏洞 (CVE-2014-3566)”:
“TLSv1.1 和 TLSv1.2 仅适用于 Java 6 服务刷新 10、Java 6.0.1 服务刷新 1 (J9 VM2.6) 和更高版本。”
但是,我建议升级到 Java 11(现在)。Java 6 于 2013 年 2 月停产,继续使用它存在潜在风险。免费的 Oracle Java 8 是许多用例的 EOL。(告诉或提醒老板/客户。他们需要知道。)
这里有一个 TLSConnection 工厂:
package test.connection;
import java.io.ByteArrayInputStream;
import java.io.ByteArrayOutputStream;
import java.io.DataOutputStream;
import java.io.IOException;
import java.io.InputStream;
import java.io.OutputStream;
import java.net.InetAddress;
import java.net.InetSocketAddress;
import java.net.Socket;
import java.net.UnknownHostException;
import java.security.Principal;
import java.security.SecureRandom;
import java.security.Security;
import java.security.cert.CertificateException;
import java.security.cert.CertificateFactory;
import java.util.Hashtable;
import java.util.LinkedList;
import java.util.List;
import javax.net.ssl.HandshakeCompletedEvent;
import javax.net.ssl.HandshakeCompletedListener;
import javax.net.ssl.SSLPeerUnverifiedException;
import javax.net.ssl.SSLSession;
import javax.net.ssl.SSLSessionContext;
import javax.net.ssl.SSLSocket;
import javax.net.ssl.SSLSocketFactory;
import javax.security.cert.X509Certificate;
import org.bouncycastle.crypto.tls.Certificate;
import org.bouncycastle.crypto.tls.CertificateRequest;
import org.bouncycastle.crypto.tls.DefaultTlsClient;
import org.bouncycastle.crypto.tls.ExtensionType;
import org.bouncycastle.crypto.tls.TlsAuthentication;
import org.bouncycastle.crypto.tls.TlsClientProtocol;
import org.bouncycastle.crypto.tls.TlsCredentials;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
/**
 * This Class enables TLS V1.2  connection based on BouncyCastle Providers.
 * Just to use: 
 * URL myurl = new URL( "http:// ...URL tha only Works in TLS 1.2);
   HttpsURLConnection  con = (HttpsURLConnection )myurl.openConnection();
   con.setSSLSocketFactory(new TSLSocketConnectionFactory());  
 * @author AZIMUTS
 *
 */
public class TSLSocketConnectionFactory extends SSLSocketFactory {  
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
//Adding Custom BouncyCastleProvider
/////////////////////////////////////////////////////////////////////////////////////////////////////////////// 
   static {
    if (Security.getProvider(BouncyCastleProvider.PROVIDER_NAME) == null)
        Security.addProvider(new BouncyCastleProvider());
    }   
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
//HANDSHAKE LISTENER
/////////////////////////////////////////////////////////////////////////////////////////////////////////////// 
    public class TLSHandshakeListener implements HandshakeCompletedListener {
        @Override
        public void handshakeCompleted(HandshakeCompletedEvent event) { 
        }
    }
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
//SECURE RANDOM
/////////////////////////////////////////////////////////////////////////////////////////////////////////////// 
    private SecureRandom _secureRandom = new SecureRandom();
//////////////////////////////////////////////////////////////////////////////////////////////////////////////
//Adding Custom BouncyCastleProvider
/////////////////////////////////////////////////////////////////////////////////////////////////////////////// 
    @Override
    public Socket createSocket(Socket socket, final String host, int port, boolean arg3)
            throws IOException {
        if (socket == null) {
            socket = new Socket();
        }
        if (!socket.isConnected()) {
            socket.connect(new InetSocketAddress(host, port));
        }
        final TlsClientProtocol tlsClientProtocol = new TlsClientProtocol(socket.getInputStream(), socket.getOutputStream(), _secureRandom);
        return _createSSLSocket(host, tlsClientProtocol);
      }
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// SOCKET FACTORY  METHODS  
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
    @Override
    public String[] getDefaultCipherSuites() {      
        return null;
    }
    @Override
    public String[] getSupportedCipherSuites(){ 
        return null;
    }
    @Override
    public Socket createSocket(String host, int port) throws IOException,UnknownHostException{  
        return null;
    }
    @Override
    public Socket createSocket(InetAddress host, int port) throws IOException { 
        return null;
    }
    @Override
    public Socket createSocket(String host, int port, InetAddress localHost,
            int localPort) throws IOException, UnknownHostException {   
        return null;
    }
    @Override
    public Socket createSocket(InetAddress address, int port,
            InetAddress localAddress, int localPort) throws IOException{    
        return null;
    }
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
//SOCKET CREATION
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
    private SSLSocket _createSSLSocket(final String host , final TlsClientProtocol tlsClientProtocol) {
     return new SSLSocket() {            
        private java.security.cert.Certificate[] peertCerts;
         @Override
          public InputStream getInputStream() throws IOException {
              return tlsClientProtocol.getInputStream();
          }
          @Override
          public OutputStream getOutputStream() throws IOException {
              return tlsClientProtocol.getOutputStream();
          }
          @Override
          public synchronized void close() throws IOException {         
             tlsClientProtocol.close();
          }
           @Override
           public void addHandshakeCompletedListener(HandshakeCompletedListener arg0) {         
           }
            @Override
            public boolean getEnableSessionCreation() {         
                return false;
            }
            @Override
            public String[] getEnabledCipherSuites() {          
                return null;
            }
            @Override
            public String[] getEnabledProtocols() {
                // TODO Auto-generated method stub
                return null;
            }
            @Override
            public boolean getNeedClientAuth(){         
                return false;
            }
            @Override
            public SSLSession getSession() {
                   return new SSLSession() {
                    @Override
                    public int getApplicationBufferSize() {                 
                        return 0;
                    }
                    @Override
                    public String getCipherSuite() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public long getCreationTime() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public byte[] getId() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public long getLastAccessedTime() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public java.security.cert.Certificate[] getLocalCertificates() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public Principal getLocalPrincipal() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public int getPacketBufferSize() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public X509Certificate[] getPeerCertificateChain()
                            throws SSLPeerUnverifiedException {
                        // TODO Auto-generated method stub
                        return null;
                    }
                    @Override
                    public java.security.cert.Certificate[] getPeerCertificates()throws SSLPeerUnverifiedException {
                         return peertCerts;
                    }
                    @Override
                    public String getPeerHost() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public int getPeerPort() {                      
                        return 0;
                    }
                    @Override
                    public Principal getPeerPrincipal() throws SSLPeerUnverifiedException {
                      return null;
                         //throw new UnsupportedOperationException();
                    }
                    @Override
                    public String getProtocol() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public SSLSessionContext getSessionContext() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public Object getValue(String arg0) {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public String[] getValueNames() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public void invalidate() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public boolean isValid() {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public void putValue(String arg0, Object arg1) {
                         throw new UnsupportedOperationException();
                    }
                    @Override
                    public void removeValue(String arg0) {
                         throw new UnsupportedOperationException();
                    }
                   };
            }
            @Override
            public String[] getSupportedProtocols() {       
                return null;
            }
            @Override
            public boolean getUseClientMode() {             
                return false;
            }
            @Override
            public boolean getWantClientAuth() {
                return false;
            }
            @Override
            public void removeHandshakeCompletedListener(HandshakeCompletedListener arg0) {             
            }
            @Override
            public void setEnableSessionCreation(boolean arg0) {
            }
            @Override
            public void setEnabledCipherSuites(String[] arg0) {         
            }
            @Override
            public void setEnabledProtocols(String[] arg0) {
            }
            @Override
            public void setNeedClientAuth(boolean arg0) {           
            }
            @Override
            public void setUseClientMode(boolean arg0) {            
            }
            @Override
            public void setWantClientAuth(boolean arg0) {               
            }
            @Override
            public String[] getSupportedCipherSuites() {            
                return null;
            }
            @Override
            public void startHandshake() throws IOException {
                  tlsClientProtocol.connect(new DefaultTlsClient() {                       
                         @Override
                          public Hashtable<Integer, byte[]> getClientExtensions() throws IOException {
                                Hashtable<Integer, byte[]> clientExtensions = super.getClientExtensions();
                                if (clientExtensions == null) {
                                    clientExtensions = new Hashtable<Integer, byte[]>();
                                }
                                //Add host_name
                                byte[] host_name = host.getBytes();
                                final ByteArrayOutputStream baos = new ByteArrayOutputStream();
                                final DataOutputStream dos = new DataOutputStream(baos);
                                dos.writeShort(host_name.length + 3); // entry size
                                dos.writeByte(0); // name type = hostname
                                dos.writeShort(host_name.length);
                                dos.write(host_name);
                                dos.close();
                                clientExtensions.put(ExtensionType.server_name, baos.toByteArray());
                                return clientExtensions;
                        }
                        @Override
                        public TlsAuthentication getAuthentication()
                                throws IOException {
                            return new TlsAuthentication() {
                                @Override
                                public void notifyServerCertificate(Certificate serverCertificate) throws IOException {
                                  try {
                                        CertificateFactory cf = CertificateFactory.getInstance("X.509");
                                        List<java.security.cert.Certificate> certs = new LinkedList<java.security.cert.Certificate>();
                                        for ( org.bouncycastle.asn1.x509.Certificate c : serverCertificate.getCertificateList()) {                                          
                                            certs.add(cf.generateCertificate(new ByteArrayInputStream(c.getEncoded())));
                                        }
                                        peertCerts = certs.toArray(new java.security.cert.Certificate[0]);
                                    } catch (CertificateException e) {                                   
                                       System.out.println( "Failed to cache server certs"+ e);
                                       throw new IOException(e);
                                    }
                                }
                                @Override
                                public TlsCredentials getClientCredentials(CertificateRequest arg0)
                                        throws IOException {                                    
                                    return null;
                                }
                            };
                        }
                   });
            }
     };//Socket
    }
}
请记住,要证明这一点,最好的方法是针对仅公开 TLS 1.2 的网站进行测试。如果 Web 公开 TLS 1.0,则取决于 Java 实现的 TLS 1.1 将使用 tls 1.0、tls 1.1 进行连接。针对仅公开 TLS 1.2 的站点对其进行测试。一个示例可以是 NIST 安全站点https://www.nist.gov
Java 6,现在支持 TLS 1.2,查看下方
http://www.oracle.com/technetwork/java/javase/overview-156328.html#R160_121
您必须基于 Bouncy Castle 创建自己的 SSLSocketFactory。使用完后,传递给通用的HttpsConnextion 来使用这个自定义的SocketFactory。
1. 首先:创建一个 TLSConnectionFactory
这里有一个提示:
1.1 扩展 SSLConnectionFactory
1.2 覆盖此方法:
@Override 
public Socket createSocket(Socket socket, final String host, int port, boolean arg3)
这个方法会调用下一个内部方法,
1.3 实现一个内部方法_createSSLSocket(host, tlsClientProtocol);
在这里,您必须使用 TlsClientProtocol 创建一个 Socket。诀窍是覆盖 ...startHandshake() 方法调用 TlsClientProtocol
 private SSLSocket _createSSLSocket(final String host , final TlsClientProtocol tlsClientProtocol) {
     return new SSLSocket() {    
       .... Override and implement SSLSocket methods,  particulary: 
            startHandshake() {
             }    
     }
     
重要:如何使用 TLS 客户端协议的完整示例在此处得到了很好的解释:使用 BouncyCastle 进行简单的 HTTPS 查询
2. 第二:在常见的 HTTPSConnection 上使用这个定制的 SSLConnextionFactory。
这个很重要 !在您可以在网络中看到的其他示例中,您会看到硬编码的 HTTP 命令....所以使用自定义 SSLConnectionFactory 您不需要更多...
  URL myurl = new URL( "http:// ...URL tha only Works in TLS 1.2);
  HttpsURLConnection  con = (HttpsURLConnection )myurl.openConnection();
  con.setSSLSocketFactory(new TSLSocketConnectionFactory());
    如果您需要访问一组特定的远程服务,您可以使用中间反向代理来为您执行 tls1.2。这将使您免于尝试修补或升级 java1.6。
例如 应用程序 -> 代理:http(5500)[tls-1.2] -> 远程:https(443)
apache httpd 的最简单形式(每个服务一个端口)的配置是:
Listen 127.0.0.1:5000
<VirtualHost *:5500>
    SSLProxyEngine On
    ProxyPass / https://remote-domain/
    ProxyPassReverse / https://remote-domain/
</VirtualHost>
    I also got a similar error when forced to use TLS1.2 for java 6. And I handled it thanks to this library:
Clone Source Code: https://github.com/tobszarny/ssl-provider-jvm16
Add Main Class:
public static void main(String[] args) throws Exception {
    try {
        String apiUrl = "https://domain/api/query?test=123";
        URL myurl = new URL(apiUrl);
        HttpsURLConnection con = (HttpsURLConnection) myurl.openConnection();
        con.setSSLSocketFactory(new TSLSocketConnectionFactory());
        int responseCode = con.getResponseCode();
        System.out.println("GET Response Code :: " + responseCode);
    } catch (Exception ex) {
        ex.printStackTrace();
    }
}
我认为@Azimuts ( https://stackoverflow.com/a/33375677/6503697 ) 的解决方案仅适用于 HTTP 连接。对于 FTPS 连接,您可以将 Bouncy Castle 与 org.apache.commons.net.ftp.FTPSClient 一起使用,而无需重写 FTPS 协议。
我有一个在 JRE 1.6.0_04 上运行的程序,我无法更新 JRE。
该程序必须连接到仅适用于 TLS 1.2(IIS 服务器)的 FTPS 服务器。
我挣扎了好几天,终于明白在我的用例中没有几个版本的充气城堡库:bctls-jdk15on-1.60.jar 和 bcprov-jdk15on-1.60.jar 可以,但 1.64 版本不行。
apache commons-net 的版本是 3.1 。
以下是一小段应该可以工作的代码:
import java.io.ByteArrayOutputStream;
import java.security.SecureRandom;
import java.security.Security;
import javax.net.ssl.SSLContext;
import javax.net.ssl.TrustManager;
import javax.net.ssl.X509TrustManager;
import org.apache.commons.net.ftp.FTP;
import org.apache.commons.net.ftp.FTPReply;
import org.apache.commons.net.ftp.FTPSClient;
import org.bouncycastle.jce.provider.BouncyCastleProvider;
import org.bouncycastle.jsse.provider.BouncyCastleJsseProvider;
import org.junit.Test;
public class FtpsTest {
// Create a trust manager that does not validate certificate chains
TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager() {
    public java.security.cert.X509Certificate[] getAcceptedIssuers() {
        return null;
    }
    public void checkClientTrusted(java.security.cert.X509Certificate[] certs, String authType) {
    }
    public void checkServerTrusted(java.security.cert.X509Certificate[] certs, String authType) {
    }
} };
@Test public void test() throws Exception {
    Security.insertProviderAt(new BouncyCastleProvider(), 1);
    Security.addProvider(new BouncyCastleJsseProvider());
    SSLContext sslContext = SSLContext.getInstance("TLS", new BouncyCastleJsseProvider());
    sslContext.init(null, trustAllCerts, new SecureRandom());
    org.apache.commons.net.ftp.FTPSClient ftpClient = new FTPSClient(sslContext);
    ByteArrayOutputStream out = null;
    try {
        ftpClient.connect("hostaname", 21);
        if (!FTPReply.isPositiveCompletion(ftpClient.getReplyCode())) {
            String msg = "Il server ftp ha rifiutato la connessione.";
            throw new Exception(msg);
        }
        if (!ftpClient.login("username", "pwd")) {
            String msg = "Il server ftp ha rifiutato il login con username:  username  e pwd:  password  .";
            ftpClient.disconnect();
            throw new Exception(msg);
        }
        ftpClient.enterLocalPassiveMode();
        ftpClient.setFileType(FTP.BINARY_FILE_TYPE);
        ftpClient.setDataTimeout(60000);
        ftpClient.execPBSZ(0); // Set protection buffer size
        ftpClient.execPROT("P"); // Set data channel protection to private
        int bufSize = 1024 * 1024; // 1MB
        ftpClient.setBufferSize(bufSize);
        out = new ByteArrayOutputStream(bufSize);
        ftpClient.retrieveFile("remoteFileName", out);
        out.toByteArray();
    }
    finally {
        if (out != null) {
            out.close();
        }
        ftpClient.disconnect();
    }
}
}
另一个 BouncyCastle 示例。只需使用1.68 版的bcprov-jdk15to18andbctls-jdk15to18就可以为我们旧的 1.6 客户端应用程序工作。
public static void main(String[] args) throws Exception {
    //put BC providers in runtime context
    if (Security.getProvider(BouncyCastleProvider.PROVIDER_NAME) == null) {
        Security.insertProviderAt(new BouncyCastleProvider(), 1);
        Security.insertProviderAt(new BouncyCastleJsseProvider(), 2);
    }
    //initialize SSLContext 
    SSLContext sslContext = SSLContext.getInstance("TLS", Security.getProvider(BouncyCastleJsseProvider.PROVIDER_NAME));        
    sslContext.init(null, null, new SecureRandom());
    
    //connect and print data
    URL url = new URL("https://stackoverflow.com");
    HttpsURLConnection connection = (HttpsURLConnection) url.openConnection();
    connection.setSSLSocketFactory(sslContext.getSocketFactory());        
    connection.setRequestMethod("GET");
    InputStream returnStream = connection.getInputStream();        
    for (int ch; (ch = returnStream.read()) != -1; ) {
        System.out.print((char) ch);
    }
    returnStream.close();
    connection.disconnect();
}