SocketSslErrorSeverity SocketSslErrorSeverity SocketSslErrorSeverity SocketSslErrorSeverity SocketSslErrorSeverity Enum

Definition

The category of error that occurs on an SSL connection.

public : enum class SocketSslErrorSeverity
enum class winrt::Windows::Networking::Sockets::SocketSslErrorSeverity : int32_t
public enum SocketSslErrorSeverity
Public Enum SocketSslErrorSeverity
var value = Windows.Networking.Sockets.SocketSslErrorSeverity.fatal;
Attributes
Windows 10 requirements
Device family
Windows 10 (introduced v10.0.10240.0)
API contract
Windows.Foundation.UniversalApiContract (introduced v1)

Fields

Fatal Fatal Fatal Fatal Fatal

Fatal errors indicate the SSL server’s certificate cannot be validated. Reasons for encountering this severity level include:

  • The certificate for the SSL server was revoked by the issuing certification authority.
  • The signature for the SSL server's certificate or the content in the certificate is invalid • •
Ignorable Ignorable Ignorable Ignorable Ignorable

Ignorable errors indicate that the SSL server’s certificate cannot be properly validated.

Disregarding Ignorable errors may result in the loss of privacy or integrity of the content passed over the SSL session. Reasons for encountering this severity level include:

  • The certificate for the SSL server is expired.
  • The certificate for the SSL server does match the SSL server’s domain name.
  • The certificate for the SSL server was not issued by a trusted certification authority
None None None None None

No error occurs on the SSL connection.

Remarks

The SocketSslErrorSeverity enumeration indicates the category of error that occurs when an SSL connection to a server is established.

SSL server errors should only be ignored in advanced scenarios. Disregarding server certificate errors classified as either Ignorable or Fatal may result in the loss of privacy or integrity of the content passed over the SSL session.

Some organizations may use self-signed certificates for private use rather than registered the certificates with a trusted certificate authority. An SSL connection to these sites might be a case where an Ignorable error might be tolerated if the server's SSL certificate can be verified by other means.

To validate self-signed certificates effectively, an app must validate the public key of the certificate (using a certificate thumbprint or hash of the public key, for example). See the Windows.Security.Cryptography.Certificates namespace for classes that support calculating certificate thumbprints and other validation operations.

If the public key cannot be validated, displaying other certificate details to users by default is not advisable. This may cause users to assume the information is valid when it may in fact be provided by an attacker.