The request was made to the /cas-management URI, actually. I opened up https://cas.whatever.com/cas-management, as I wasn't authenticated, I was redirected to https://cas.whatever.com/cas/login?..., I entered my credentials and *then*, after redirected back to the cas-management webapp the exception showed up.

That's the strange thing, if there was an error with the cert of any of both sites, it would have failed the first time they were opened up, right?

El 16/10/15 a las 21:21, Andrew Morgan escribió:
This error message is caused by Java being unable to resolve the remote
SSL certificate.  In this instance, Java is the SSL *client*, trying to
connect to an SSL/TLS resource.

In my experience, this happens when CAS tries to contact a CAS client to
send a SLO (Single LogOut) request.  Was there a URL logged along with
this stack dump?  You may be able to find information in the CAS audit log
too.

        Andy

On Fri, 16 Oct 2015, Nicolás wrote:

Hi,

We're using CAS 4.1.0 and we're having some sporadic issues with our
certs. This is the exception:

    Caused by: sun.security.validator.ValidatorException: PKIX path
    building failed:
    sun.security.provider.certpath.SunCertPathBuilderException: unable
    to find valid certification path to requested target
         at
    sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:385)
         at
    sun.security.validator.PKIXValidator.engineValidate(PKIXValidator.java:292)
         at sun.security.validator.Validator.validate(Validator.java:260)
         at
    
sun.security.ssl.X509TrustManagerImpl.validate(X509TrustManagerImpl.java:326)
         at
    
sun.security.ssl.X509TrustManagerImpl.checkTrusted(X509TrustManagerImpl.java:231)
         at
    
sun.security.ssl.X509TrustManagerImpl.checkServerTrusted(X509TrustManagerImpl.java:126)
         at
    
sun.security.ssl.ClientHandshaker.serverCertificate(ClientHandshaker.java:1451)
         ... 55 more
    Caused by:
    sun.security.provider.certpath.SunCertPathBuilderException: unable
    to find valid certification path to requested target
         at
    
sun.security.provider.certpath.SunCertPathBuilder.engineBuild(SunCertPathBuilder.java:196)
         at
    java.security.cert.CertPathBuilder.build(CertPathBuilder.java:268)
         at
    sun.security.validator.PKIXValidator.doBuild(PKIXValidator.java:380)
         ... 61 more

I've read this [1], but in our case we don't use self-signed certs, but
real Geotrust certs.

Our scenario is the following:

1) We have an Nginx which proxies requests back to Tomcat7 (via
proxy_pass). SSL certs are configured here, for two sites, whose SSL
certs are different.
1.1) Our /cas site has a dedicated certificate (cas.whatever.com). This
works quite well so far.
1.2) Our /cas-management site has a wildcard certificate
(*.whatever.com). This one's throwing the exception, but only on one of
our nodes (we have 2 exactly equal with the very same configuration).
2) We imported both public keys into the system Keystore located in
/etc/ssl/certs/java/cacerts with Keytool (Ubuntu 14.04).
3) Tomcat is using its own Keystore (/etc/tomcat7/keystore.jks)

My questions are:
a) Should this configuration be enough to avoid the exception above? If
yes, why are we getting an exception on point 1.2?
b) Is point 3 relevant?
c) In case this gets painful, is there a non-intrusive way to disable
SSL checking in the CAS-Management webapp?

Thanks.

Nicolás

[1]:
https://wiki.jasig.org/display/casum/ssl+troubleshooting+and+reference+guide

--
You are currently subscribed to cas-user@lists.jasig.org as: mor...@orst.edu
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user



--
You are currently subscribed to cas-user@lists.jasig.org as: 
arch...@mail-archive.com
To unsubscribe, change settings or access archives, see 
http://www.ja-sig.org/wiki/display/JSG/cas-user

Reply via email to