Forum Discussion
Hi nemesdaniela ,
It seems from the log it's the server who terminates the handshake not the client (SoapUI). More detailed error log would help to recognize.
Does the remote server require client certificate (i.e. using Two-way SSL) or not (One-way SSL)?
What happens if you try to open the WSDL in the web browser? Does it work? Does the browser complain about the server sertificate?
Similarly as you suggest, some time ago I raised a feature request to ignore the remote server certificate issues, see:
Best regards,
Karel
- nemesdaniela3 years agoNew Contributor
Hello KarelHusa,
The logs are misleading, as the devs added more log tracking and used Wireshark to track the exchanged packages: some logs indicated that the client stopped the connection, some that the server automatically closed it. As a result it is very hard to say what actually went wrong. Our thought is that the server somehow stops the handshake as the certificate is self signed and SoapUI does not handle certificate validation bypass.
From what my colleagues said, the server does require a client certificate, it is using Two-way SSL.
If I run the tests in Postman it says that there is an error as the certificate is self signed but I can bypass the certificate validation and I can continue with the next request.
Error: self signed certificateAfter ▶ Enable SSL certificate verification - marked as disabledWarning: Self signed certificateIf I try to open the WSDL in the browser, yes the browser does complain about the certificate but again, I can accept the risk and bypass the certificate validation.
The idea remains, we do not plan on having anything else but self signed certificates in the test environment and the only difference at the moment is:
- Even if we add the self signed certificate in the SoapUI config in 5.6.1 and 5.7.0 -> the SSL verification fails. Without this configuration it fails also.
- With 5.6.0 we do not have any SSL config added into SoapUI and it works without any errors.
If someone has any idea on how to get 5.7.0 working with the certificate bypass option, it would be highly appreciated. Any hack would be good at the moment since SoapUI does not have it implemented and I guess will not implement it taking into account that also other people requested it in the past without any resolution.
Thank you,
Daniela
Related Content
- 3 years ago
Recent Discussions
- 15 years ago