- Scala Driver
- Tutorials
- Connect to MongoDB
- TLS/SSL
TLS/SSL
By default the Java driver supports TLS/SSL connections to MongoDB servers using
the underlying support for TLS/SSL provided by the JDK. This can be changed either by utilizing extensibility
of the Java SE API, or via the Netty API.
You can configure the driver to use TLS/SSL either with ConnectionString
or with
MongoClientSettings
.
MongoClient API (since 3.7)
Specify TLS/SSL via ConnectionString
import org.mongodb.scala._
To specify TLS/SSL with ConnectionString
, specify ssl=true
as part of the connection
string, as in:
val mongoClient: MongoClient = MongoClient("mongodb://localhost/?ssl=true")
Specify TLS/SSL via MongoClientSettings
To specify TLS/SSL with with MongoClientSettings
, set the enabled
property to
true
, as in:
val settings = MongoClientSettings.builder()
.applyToSslSettings((builder: SslSettings.Builder) => builder.enabled(true))
.build()
val client = MongoClient(settings)
Specify Java SE SSLContext
via MongoClientSettings
import javax.net.ssl.SSLContext
To specify the javax.net.ssl.SSLContext
with
MongoClientSettings
, set the sslContext
property, as in:
val sslContext: SSLContext = ???
val settings = MongoClientSettings.builder()
.applyToSslSettings((builder: SslSettings.Builder) => {
builder.enabled(true)
builder.context(sslContext)
})
.build()
val client = MongoClient(settings)
Specify Netty SslContext
via NettyStreamFactoryFactory
If you use the driver with Netty for network IO, you have an option to plug an alternative TLS/SSL protocol implementation provided by Netty.
import io.netty.handler.ssl.SslContextBuilder;
import io.netty.handler.ssl.SslProvider;
To instruct the driver to use io.netty.handler.ssl.SslContext
,
use the method
NettyStreamFactoryFactory.Builder.sslContext
.
See the documentation of this method for details on which
io.netty.handler.ssl.SslProvider
s are supported by the driver
and implications of using them.
val sslContext = SslContextBuilder.forClient()
.sslProvider(SslProvider.OPENSSL)
.build();
val settings = MongoClientSettings.builder()
.applyToSslSettings((builder: SslSettings.Builder) => builder.enabled(true))
.streamFactoryFactory(NettyStreamFactoryFactory.builder()
.sslContext(sslContext)
.build())
.build()
val client = MongoClient(settings)
Disable Hostname Verification
By default, the driver ensures that the hostname included in the
server’s SSL certificate(s) matches the hostname(s) provided when
constructing a MongoClient()
.
If your application needs to disable hostname verification, you must explicitly indicate
this in MongoClientSettings
val settings = MongoClientSettings.builder()
.applyToSslSettings((builder: SslSettings.Builder) => {
builder.enabled(true)
builder.invalidHostNameAllowed(true)
})
.build()
Common TLS/SSL Configuration Tasks
This section is based on the documentation for Oracle JDK, so some parts may be inapplicable to your JDK or to the custom TLS/SSL implementation you use.
Configure Trust Store and Key Store
One may either configure trust stores and key stores specific to the client via
javax.net.ssl.SSLContext.init(KeyManager[] km, TrustManager[] tm, SecureRandom random)
,
or set the JVM default ones.
Set the Default Trust Store
A typical application will need to set several JVM system properties to ensure that the client is able to validate the TLS/SSL certificate presented by the server:
javax.net.ssl.trustStore
: The path to a trust store containing the certificate of the signing authority (see<path to trust store>
below)javax.net.ssl.trustStorePassword
: The password to access this trust store (see<trust store password>
below)
The trust store is typically created with the
keytool
command line program provided as part of the JDK. For example:
keytool -importcert -trustcacerts -file <path to certificate authority file>
-keystore <path to trust store> -storepass <trust store password>
Set the Default Key Store
A typical application will also need to set several JVM system properties to ensure that the client presents an TLS/SSL client certificate to the MongoDB server:
javax.net.ssl.keyStore
The path to a key store containing the client’s TLS/SSL certificates (see<path to key store>
below)javax.net.ssl.keyStorePassword
The password to access this key store (see<trust store password>
below)
The key store is typically created with the
keytool
or the openssl
command line program. For example, if you have a file with the client certificate and its private key
(may be in the PEM format)
and want to create a key store in the PKCS #12 format,
you can do the following:
openssl pkcs12 -export -in <path to client certificate & private key file>
-out <path to key store> -passout pass:<trust store password>
For more information on configuring a Java application for TLS/SSL, please
refer to the JSSE Reference Guide
.
Forcing TLS 1.2
Some applications may want to force only the TLS 1.2 protocol. To do this, set the jdk.tls.client.protocols
system property to “TLSv1.2”.
Java runtime environments prior to Java 8 started to enable the TLS 1.2 protocol only in later updates, as shown in the previous section. For the driver to force the use of the TLS 1.2 protocol with a Java runtime environment prior to Java 8, ensure that the update has TLS 1.2 enabled.
OCSP
Note
The Java driver cannot enable OCSP by default on a per MongoClient basis.
Client-driven OCSP
An application will need to set JVM system and security properties to ensure that client-driven OCSP is enabled:
com.sun.net.ssl.checkRevocation
: When set totrue
, this system property enables revocation checking.ocsp.enable
: When set totrue
, this security property enables client-driven OCSP.
To configure an application to use client-driven OCSP, the application must already be set up to connect to a server using TLS. Setting these system properties is required to enable client-driven OCSP.
Note
The support for TLS provided by the JDK utilizes “hard fail” behavior in the case of an unavailable OCSP responder in contrast to the mongo shell and drivers that utilize “soft fail” behavior.
OCSP Stapling
important
The following exception may occur when using OCSP stapling with Java runtime environments that use the TLS 1.3 protocol (Java 11 and higher use TLS 1.3 by default):
javax.net.ssl.SSLHandshakeException: extension (5) should not be presented in certificate_request
The exception is due to a known issue with TLS 1.3 in Java 11 and higher. To avoid this exception when using a Java runtime environments using the TLS 1.3 protocol, you can force the application to use the TLS 1.2 protocol. To do this, set the jdk.tls.client.protocols
system property to “TLSv1.2”.
An application will need to set several JVM system properties to set up OCSP stapling:
jdk.tls.client.enableStatusRequestExtension
: When set totrue
(its default value), this enables OCSP stapling.com.sun.net.ssl.checkRevocation
: When set totrue
, this enables revocation checking. If this property is not set totrue
, then the connection will be allowed to proceed regardless of the presence or status of the revocation information.
To configure an application to use OCSP stapling, the application must already be set up to connect to a server using TLS, and the server must be set up to staple an OCSP response to the certificate it returns as part of the the TLS handshake.
For more information on configuring a Java application to use OCSP, please
refer to the Client-Driven OCSP and OCSP Stapling
.