I read the documentation of StandardValidator. The maximum length is defined by 2, which I personally think, is too small.
Nowadays end certificates do not directly issued by a root CA, instead, the certificates are issued by an intermediate certificate, which is issued by the root to handle if the intermediate certificate is compromised. In that way, the certificates chain is more than 2.
Is there any way we can do using the StandardValidator and set the number of certificate in the chain higher without having to implement Validators on our own?
com.enterprisedt.net.ftp.ssl.SSLFTPException: The server's certificate chain is too long
at com.enterprisedt.net.ftp.ssl.SSLFTPStandardValidator.validateServerCertificate(Unknown Source)
at com.enterprisedt.net.ftp.ssl.SSLFTPClient$2.acceptPeerCertificate(Unknown Source)
at com.enterprisedt.net.puretls.n.B(Unknown Source)
at com.enterprisedt.net.puretls.Z.B(Unknown Source)
at com.enterprisedt.net.puretls.n.E(Unknown Source)
at com.enterprisedt.net.puretls.i.G(Unknown Source)
at com.enterprisedt.net.puretls.SSLSocket.internalSocket(Unknown Source)
at com.enterprisedt.net.puretls.SSLSocket.<init>(Unknown Source)
at com.enterprisedt.net.ftp.ssl.SSLFTPClient.connect(Unknown Source)