TLS/SSL

By default the Java driver supports TLS/SSL connections to MongoDB servers using the underlying support for TLS/SSL provided by the JDK. This can be changed either by utilizing extensibility of the Java SE API, or via the Netty API. You can configure the driver to use TLS/SSL either with ConnectionString or with MongoClientSettings.

MongoClient API (since 3.7)

Specify TLS/SSL via ConnectionString

import org.mongodb.scala._

To specify TLS/SSL with ConnectionString, specify ssl=true as part of the connection string, as in:

val mongoClient: MongoClient = MongoClient("mongodb://localhost/?ssl=true")

Specify TLS/SSL via MongoClientSettings

To specify TLS/SSL with with MongoClientSettings, set the enabled property to true, as in:

val settings = MongoClientSettings.builder()
    .applyToSslSettings((builder: SslSettings.Builder) => builder.enabled(true))
    .build()
val client = MongoClient(settings)

Specify Java SE SSLContext via MongoClientSettings

import javax.net.ssl.SSLContext

To specify the javax.net.ssl.SSLContext with MongoClientSettings, set the sslContext property, as in:

val sslContext: SSLContext = ???
val settings = MongoClientSettings.builder()
    .applyToSslSettings((builder: SslSettings.Builder) => {
        builder.enabled(true)
        builder.context(sslContext)
    })
    .build()
val client = MongoClient(settings)

Specify Netty SslContext via NettyStreamFactoryFactory

If you use the driver with Netty for network IO, you have an option to plug an alternative TLS/SSL protocol implementation provided by Netty.

import io.netty.handler.ssl.SslContextBuilder;
import io.netty.handler.ssl.SslProvider;

To instruct the driver to use io.netty.handler.ssl.SslContext, use the method NettyStreamFactoryFactory.Builder.sslContext. See the documentation of this method for details on which io.netty.handler.ssl.SslProviders are supported by the driver and implications of using them.

val sslContext = SslContextBuilder.forClient()
    .sslProvider(SslProvider.OPENSSL)
    .build();
val settings = MongoClientSettings.builder()
    .applyToSslSettings((builder: SslSettings.Builder) => builder.enabled(true))
    .streamFactoryFactory(NettyStreamFactoryFactory.builder()
        .sslContext(sslContext)
        .build())
    .build()
val client = MongoClient(settings)

Disable Hostname Verification

By default, the driver ensures that the hostname included in the server’s SSL certificate(s) matches the hostname(s) provided when constructing a MongoClient().

If your application needs to disable hostname verification, you must explicitly indicate this in MongoClientSettings

val settings = MongoClientSettings.builder()
    .applyToSslSettings((builder: SslSettings.Builder) => {
        builder.enabled(true)
        builder.invalidHostNameAllowed(true)
    })
    .build()

Common TLS/SSL Configuration Tasks

This section is based on the documentation for Oracle JDK, so some parts may be inapplicable to your JDK or to the custom TLS/SSL implementation you use.

Configure Trust Store and Key Store

One may either configure trust stores and key stores specific to the client via javax.net.ssl.SSLContext.init(KeyManager[] km, TrustManager[] tm, SecureRandom random), or set the JVM default ones.

Set the Default Trust Store

A typical application will need to set several JVM system properties to ensure that the client is able to validate the TLS/SSL certificate presented by the server:

  • javax.net.ssl.trustStore: The path to a trust store containing the certificate of the signing authority (see <path to trust store> below)

  • javax.net.ssl.trustStorePassword: The password to access this trust store (see <trust store password> below)

The trust store is typically created with the keytool command line program provided as part of the JDK. For example:

keytool -importcert -trustcacerts -file <path to certificate authority file>
            -keystore <path to trust store> -storepass <trust store password>

Set the Default Key Store

A typical application will also need to set several JVM system properties to ensure that the client presents an TLS/SSL client certificate to the MongoDB server:

  • javax.net.ssl.keyStore The path to a key store containing the client’s TLS/SSL certificates (see <path to key store> below)

  • javax.net.ssl.keyStorePassword The password to access this key store (see <trust store password> below)

The key store is typically created with the keytool or the openssl command line program. For example, if you have a file with the client certificate and its private key (may be in the PEM format) and want to create a key store in the PKCS #12 format, you can do the following:

openssl pkcs12 -export -in <path to client certificate & private key file>
            -out <path to key store> -passout pass:<trust store password>

For more information on configuring a Java application for TLS/SSL, please refer to the JSSE Reference Guide.

Forcing TLS 1.2

Some applications may want to force only the TLS 1.2 protocol. To do this, set the jdk.tls.client.protocols system property to “TLSv1.2”.

Java runtime environments prior to Java 8 started to enable the TLS 1.2 protocol only in later updates, as shown in the previous section. For the driver to force the use of the TLS 1.2 protocol with a Java runtime environment prior to Java 8, ensure that the update has TLS 1.2 enabled.

OCSP

Note

The Java driver cannot enable OCSP by default on a per MongoClient basis.

Client-driven OCSP

An application will need to set JVM system and security properties to ensure that client-driven OCSP is enabled:

  • com.sun.net.ssl.checkRevocation: When set to true, this system property enables revocation checking.

  • ocsp.enable: When set to true, this security property enables client-driven OCSP.

To configure an application to use client-driven OCSP, the application must already be set up to connect to a server using TLS. Setting these system properties is required to enable client-driven OCSP.

Note

The support for TLS provided by the JDK utilizes “hard fail” behavior in the case of an unavailable OCSP responder in contrast to the mongo shell and drivers that utilize “soft fail” behavior.

OCSP Stapling

important

The following exception may occur when using OCSP stapling with Java runtime environments that use the TLS 1.3 protocol (Java 11 and higher use TLS 1.3 by default):

javax.net.ssl.SSLHandshakeException: extension (5) should not be presented in certificate_request

The exception is due to a known issue with TLS 1.3 in Java 11 and higher. To avoid this exception when using a Java runtime environments using the TLS 1.3 protocol, you can force the application to use the TLS 1.2 protocol. To do this, set the jdk.tls.client.protocols system property to “TLSv1.2”.

An application will need to set several JVM system properties to set up OCSP stapling:

  • jdk.tls.client.enableStatusRequestExtension: When set to true (its default value), this enables OCSP stapling.

  • com.sun.net.ssl.checkRevocation: When set to true, this enables revocation checking. If this property is not set to true, then the connection will be allowed to proceed regardless of the presence or status of the revocation information.

To configure an application to use OCSP stapling, the application must already be set up to connect to a server using TLS, and the server must be set up to staple an OCSP response to the certificate it returns as part of the the TLS handshake.

For more information on configuring a Java application to use OCSP, please refer to the Client-Driven OCSP and OCSP Stapling.