The point of using SSL / TLS is that the client can be sure that it is connecting to the correct service, and not to some fictitious service that is trying to personify the real one. If (presumably) the server certificate should not contain any host identification information, the client, if the server with which he was negotiating, was correct.
In fact, you need verification by DNS address, because if you do not verify SSL, it is useless. (Or at least nowhere was as safe as it could be.)
I assume that in theory, you could try to make your client / server connection with channels protected by other means than SSL / TLS. But you will need serious security knowledge and Java encryption technology.
source share