Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] Please promptly update the intact taco file with a valid signature #564

Open
zentry-the-glass opened this issue Feb 20, 2024 · 2 comments
Labels
enhancement New feature or request

Comments

@zentry-the-glass
Copy link

zentry-the-glass commented Feb 20, 2024

Dear esteemed brother

The signature of the AWS DocumentDB connector file you uploaded has expired. As a result, I am currently using the command -DDisableVerifyConnectorPluginSignature=true forcefully. I believe, as much as you do, that this is not an ideal solution.

I kindly request you to promptly update the signature on the intact taco file. I implore you to save me from this situation.

@birschick-bq

Is your feature request related to a problem? Please describe.

A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]

Describe the solution you'd like

A clear and concise description of what you want to happen.

Describe alternatives you've considered

A clear and concise description of any alternative solutions or features you've considered.

Additional context

Add any other context or screenshots about the feature request here.

@pvanderknyff
Copy link

pvanderknyff commented May 7, 2024

Hi, I'm from the connectivity team at Tableau. The signature for the DocumentDB taco is indeed invalid. Looking at the jarsigner output, it's not actually because the certs expired, but because it was signed using an algorithm that newer versions of java do not deem secure and thus reject. The taco will need to be re-signed with a stronger encryption, and then checked against jarsigner -verify --certs --verbose --strict.

jarsigner output:

D:\dev\monolith>jarsigner -verify --strict --verbose --certs C:\Users\pvanderknyff\Downloads\documentdbjdbc-1.4.4.taco

     558 Thu Jan 06 23:36:38 PST 2022 META-INF/MANIFEST.MF
     693 Thu Jan 06 23:36:38 PST 2022 META-INF/JAVASPEC.SF
    9005 Thu Jan 06 23:36:38 PST 2022 META-INF/JAVASPEC.RSA
       0 Thu Jan 06 23:24:36 PST 2022 META-INF/

m ? 2809 Thu Jan 06 23:24:36 PST 2022 manifest.xml
m ? 6325 Thu Jan 06 23:24:08 PST 2022 connection-fields.xml
m ? 204 Thu Jan 06 23:24:08 PST 2022 connection-metadata.xml
m ? 1311 Thu Jan 06 23:24:08 PST 2022 connectionResolver.tdr
m ? 164 Thu Jan 06 23:24:08 PST 2022 connectionBuilder.js
m ? 2530 Thu Jan 06 23:24:08 PST 2022 connectionProperties.js
m ? 34538 Thu Jan 06 23:24:08 PST 2022 dialect.tdd

s = signature was verified
m = entry is listed in manifest
k = at least one certificate was found in keystore
? = unsigned entry

  • Signed by "CN=Amazon.com Services LLC, O=Amazon.com Services LLC, L=Seattle, ST=Washington, C=US"
    Digest algorithm: SHA1 (disabled)
    Signature algorithm: SHA1withRSA (disabled), 3072-bit key
    Timestamped by "CN=DigiCert Timestamp 2021, O="DigiCert, Inc.", C=US" on Thu Jan 06 23:36:38 UTC 2022
    Timestamp digest algorithm: SHA-256
    Timestamp signature algorithm: SHA256withRSA, 2048-bit key

WARNING: The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled by the security property:

jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024, DSA keySize < 1024, SHA1 denyAfter 2019-01-01, include jdk.disabled.namedCurves

D:\dev\monolith>java -version
openjdk version "11.0.20" 2023-07-18 LTS
OpenJDK Runtime Environment Zulu11.66+16-SA (build 11.0.20+8-LTS)
OpenJDK 64-Bit Server VM Zulu11.66+16-SA (build 11.0.20+8-LTS, mixed mode)

@narek
Copy link

narek commented May 8, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants