SSLHandshakeException: *.ValidatorException: PKIX path building failed: *.SunCertPathBuilderExceptio

本文介绍了在使用Java 1.8进行HTTPS连接时遇到的SSLHandshakeException异常及其解决办法。异常主要原因是无法找到服务器的有效证书路径。解决方法包括获取并导入服务器证书到Java的信任存储中。

java版本:1.8


问题:

*

main, handling exception: javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
javax.net.ssl.SSLHandshakeException: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at sun.security.ssl.Alerts.getSSLException(Alerts.java:192)
at sun.security.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1937)
at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:302)
at sun.security.ssl.Handshaker.fatalSE(Handshaker.java:296)
at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1478)
at sun.security.ssl.ClientHandshaker.processMessage(ClientHandshaker.java:212)
at sun.security.ssl.Handshaker.processLoop(Handshaker.java:969)
at sun.security.ssl.Handshaker.process_record(Handshaker.java:904)
at sun.security.ssl.SSLSocketImpl.readRecord(SSLSocketImpl.java:1050)
at sun.security.ssl.SSLSocketImpl.performInitialHandshake(SSLSocketImpl.java:1363)
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1391)
at sun.security.ssl.SSLSocketImpl.startHandshake(SSLSocketImpl.java:1375)
*
Caused by: sun.security.validator.ValidatorException: PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:387)
at sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292)
at sun.security.validator.Validator.validate(Validator.java:260)
at sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:324)
at sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:229)
at sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:124)
at sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1460)
... 21 more
Caused by: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target
at sun.security.provider.certpath.SunCertPathBuilder.build(SunCertPathBuilder.java:145)
at sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:131)
at java.security.cert.CertPathBuilder.build(CertPathBuilder.java:280)
at sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:382)
... 27 more


原因:找不到服务器的证书


解决方法

1. 取得服务器证书

2. 导入证书

keytool -import -keystore "%JAVA_HOME%/jre/lib/security/cacerts" -storepass changeit -keypass changeit -alias 别名 -file证书文件

<think>我们正在处理一个JavaSSL/TLS连接问题,具体异常是`javax.net.ssl.SSLHandshakeException:PKIXpathbuildingfailed`,通常伴随`sun.security.validator.ValidatorException:PKIXpathbuildingfailed`和`unabletofindvalidcertificationpathtorequestedtarget`。这个问题的根本原因是Java信任库(cacerts)中没有目标服务器SSL证书的根证书或中间证书,导致证书验证链断裂。根据引用内容,常见的解决方案如下:###解决方案1:将目标服务器的证书导入Java信任库1.**获取目标服务器的证书**-使用浏览器访问目标URL(如`https://ids.mtxy.edu.cn`),导出证书(通常为.crt或.cer格式)。-或者使用`keytool`命令(Java自带)下载证书:```bashkeytool-printcert-rfc-sslserverids.mtxy.edu.cn>ids_mtxy_edu_cn.cer```2.**将证书导入Java信任库(cacerts)**-找到Java的信任库位置(通常位于`$JAVA_HOME/jre/lib/security/cacerts`)。-使用`keytool`导入证书(默认密码为`changeit`):```bashkeytool-importcert-aliasids_mtxy_edu_cn-keystore"$JAVA_HOME/jre/lib/security/cacerts"-fileids_mtxy_edu_cn.cer```-输入密码`changeit`,并确认信任此证书。3.**重启应用**:确保应用使用更新后的信任库。###解决方案2:绕过SSL证书验证(仅测试环境使用)**注意:此方法会降低安全性,不建议在生产环境中使用。**```java//创建信任所有证书的TrustManagerTrustManager[]trustAllCerts=newTrustManager[]{newX509TrustManager(){publicjava.security.cert.X509Certificate[]getAcceptedIssuers(){returnnull;}publicvoidcheckClientTrusted(java.security.cert.X509Certificate[]certs,StringauthType){}publicvoidcheckServerTrusted(java.security.cert.X509Certificate[]certs,StringauthType){}}};//应用自定义TrustManagerSSLContextsslContext=SSLContext.getInstance("TLS");sslContext.init(null,trustAllCerts,newjava.security.SecureRandom());HttpsURLConnection.setDefaultSSLSocketFactory(sslContext.getSocketFactory());//设置忽略主机名验证HostnameVerifierallHostsValid=(hostname,session)->true;HttpsURLConnection.setDefaultHostnameVerifier(allHostsValid);```###解决方案3:更新Java版本有时旧版Java的信任库中缺少新的根证书,更新到最新Java版本可能解决问题。###解决方案4:使用系统信任库(仅适用于Java9+)在启动应用时添加参数,让Java使用操作系统的证书存储:```bashjava-Djavax.net.ssl.trustStoreType=Windows-Root-jaryour_app.jar#Windowsjava-Djavax.net.ssl.trustStoreType=KeychainStore-jaryour_app.jar#macOS```###推荐做法-**生产环境**:采用方案1导入证书,确保安全性和合规性。-**开发和测试**:可临时使用方案2,但务必在部署前移除绕过逻辑。根据引用[4],在修复后重新发起HTTPS请求即可成功连接。§§相关问题§§1.如何导出网站SSL证书进行导入?2.Java信任库(cacerts)默认密码是什么?如何修改?3.Java8中如何动态添加证书而不用修改全局信任库?4.如何验证SSL证书链是否完整?</think> ### Java SSLHandshakeException PKIX path building failed 解决方案 该异常表明Java无法验证目标服务器的SSL证书链完整性,通常是信任库(truststore)中缺失根证书或中间证书导致。以下是详细解决方案: #### 1. **导入目标服务器证书到Java信任库****最可靠的生产环境方案** ```bash # 获取服务器证书 keytool -printcert -rfc -sslserver ids.mtxy.edu.cn > cert.pem # 导入到Java信任库 (默认密码changeit) keytool -importcert -alias mtxy_cert -keystore $JAVA_HOME/jre/lib/security/cacerts -file cert.pem ``` *操作后需重启应用*[^2][^4] #### 2. **使用自定义信任库(推荐微服务架构)** ```java System.setProperty("javax.net.ssl.trustStore", "/path/to/custom-truststore.jks"); System.setProperty("javax.net.ssl.trustStorePassword", "yourpassword"); ``` *需提前创建包含证书的JKS文件*[^1] #### 3. **证书验证绕过(仅限开发测试)** ```java TrustManager[] trustAllCerts = new TrustManager[] { new X509TrustManager() { public void checkClientTrusted(X509Certificate[] chain, String authType) {} public void checkServerTrusted(X509Certificate[] chain, String authType) {} public X509Certificate[] getAcceptedIssuers() { return null; } } }; SSLContext sc = SSLContext.getInstance("TLS"); sc.init(null, trustAllCerts, new SecureRandom()); HttpsURLConnection.setDefaultSSLSocketFactory(sc.getSocketFactory()); ``` ⚠️ **重大安全风险,禁止生产环境使用** [^3] #### 4. **证书链完整性检查工具 ```bash openssl s_client -connect ids.mtxy.edu.cn:443 -showcerts ``` *检查输出是否包含完整证书链(含根证书和中间CA)* ### 根本原因解析 | 原因 | 发生场景 | 解决优先级 | |------|----------|------------| | JDK信任库缺失根证书 | 自签名证书/私有CA | ★★★★★ | | 中间证书未包含 | 证书链配置错误 | ★★★★☆ | | 证书过期/域名不匹配 | 服务端配置问题 | ★★★☆☆ | | Java版本过旧 | 缺少新CA根证书 | ★★☆☆☆ | ---
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值