Kevin Pang
Kevin Pang

Reputation: 41442

Does HttpWebRequest automatically take care of certificate validation?

I'm using an HttpWebRequest object to access a web service via an HTTP POST. Part of the requirement is that I:

  1. Verify that the URL in the certificate matches the URL I'm posting to
  2. Verify that the certificate is valid and trusted
  3. Verify that the certificate has not expired

Does HttpWebRequest automatically handle that for me? I'd assume that if any of these conditions came up, I'd get the standard "could not establish trust relationship for the SSL/TLS secure channel" exception.

Upvotes: 5

Views: 7148

Answers (2)

David
David

Reputation: 34563

Yes, HttpWebRequest automatically handles these:

  1. Verify that the URL in the certificate matches the URL you're posting to
  2. Verify that the certificate is valid and trusted
  3. Verify that the certificate has not expired

You have to use code like this if you want to disable this functionality.

Upvotes: 3

rook
rook

Reputation: 67019

Not really. You still have to check if a sslpolicyerror is returned using a callback function. Make sure to test your implementation against url like this https://rootkit.com/ which is using a self-singed cert.

    void InitPhase()
{
    // Override automatic validation of SSL server certificates.
    ServicePointManager.ServerCertificateValidationCallback =
           ValidateServerCertficate;
}
private static bool ValidateServerCertficate(
        object sender,
        X509Certificate cert,
        X509Chain chain,
        SslPolicyErrors sslPolicyErrors)
{
    if (sslPolicyErrors == SslPolicyErrors.None)
    {
        // Good certificate.
        return true;
    }

    log.DebugFormat("SSL certificate error: {0}", sslPolicyErrors);

    bool certMatch = false; // Assume failure
    byte[] certHash = cert.GetCertHash();
    if (certHash.Length == apiCertHash.Length)
    {
        certMatch = true; // Now assume success.
        for (int idx = 0; idx < certHash.Length; idx++)
        {
            if (certHash[idx] != apiCertHash[idx])
            {
                certMatch = false; // No match
                break;
            }
        }
    }

    // Return true => allow unauthenticated server,
    //        false => disallow unauthenticated server.
    return certMatch;
}

Upvotes: 0

Related Questions