I reverted to a test using testshib so I could see the logs on the sp side of the house. The sp does try to access the -idp/AA but has SSL problems - the error log from the sp side: 2006-12-12 11:58:19 INFO shibtarget.SessionCache [1110] sessionGet: trying to get new attributes for session (ID=_a2f06aa1d3dedbfd05977d07da54ebc8) 2006-12-12 11:58:19 DEBUG shibtarget.SessionCache [1110] sessionGet: trying to query an AA... 2006-12-12 11:58:19 DEBUG SAML.SAMLSOAPHTTPBinding.CURLPool [1110] sessionGet: getting connection handle to https://web2.ametsoc.org:8443/shibboleth-idp/AA 2006-12-12 11:58:19 DEBUG SAML.SAMLSOAPHTTPBinding.CURLPool [1110] sessionGet: nothing free in pool, returning new connection handle 2006-12-12 11:58:19 INFO SAML.SAMLSOAPHTTPBinding [1110] sessionGet: sending SOAP message to https://web2.ametsoc.org:8443/shibboleth-idp/AA 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: About to connect() to web2.ametsoc.org port 8443 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: Trying 64.55.87.5... 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: connected 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: Connected to web2.ametsoc.org (64.55.87.5) port 8443 2006-12-12 11:58:19 DEBUG shibtarget.ShibHTTPHook [1110] sessionGet: OpenSAML invoked SSL context callback 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: SSLv3, TLS handshake, Client hello (1): 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: SSLv3, TLS handshake, Server hello (2): 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: SSLv3, TLS handshake, CERT (11): 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet:
2006-12-12 11:58:19 DEBUG OpenSSL [1110] sessionGet: invoking default X509 verify callback 2006-12-12 11:58:19 DEBUG Shibboleth.Trust.Basic [1110] sessionGet: comparing certificate to KeyDescriptors 2006-12-12 11:58:19 DEBUG Shibboleth.Trust.Basic [1110] sessionGet: KeyDescriptor resolved into a certificate, comparing it... 2006-12-12 11:58:19 DEBUG Shibboleth.Trust.Basic [1110] sessionGet: certificate did not match 2006-12-12 11:58:19 DEBUG Shibboleth.Trust.Basic [1110] sessionGet: failed to find an exact match for certificate in KeyDescriptors 2006-12-12 11:58:19 DEBUG Shibboleth.Trust.Shibboleth [1110] sessionGet: performing certificate path validation... 2006-12-12 11:58:19 DEBUG Shibboleth.Trust.Shibboleth [1110] sessionGet: failed to validate certificate chain using KeyAuthority extensions 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: SSLv3, TLS alert, Server hello (2): 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: SSL certificate problem, verify that the CA cert is OK. Details: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 2006-12-12 11:58:19 DEBUG SAML.libcurl [1110] sessionGet: Closing connection #0 2006-12-12 11:58:19 ERROR SAML.SAMLSOAPHTTPBinding [1110] sessionGet: failed while contacting SAML responder: SSL certificate problem, verify that the CA cert is OK. Details: error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed 2006-12-12 11:58:19 ERROR shibtarget.SessionCache [1110] sessionGet: caught SAML exception during SAML attribute query: SOAPHTTPBindingProvider::send() failed while contacting SAML responder: SSL certificate problem, verify that the CA cert is OK. Details: Not sure why this is failing when I am working ok with a cassified servlets-examples in tomcat. Can anyone shed some light? Thanks, Pat _____ From: Patrick MacDonald [mailto:[EMAIL PROTECTED] Sent: Tuesday, December 12, 2006 11:44 AM To: [email protected]; [EMAIL PROTECTED] Subject: Shibboleth idp and CAS I am trying to set up a shibboleth idp with the yale CAS client. CAS is working in that I have cassified the tomcat servlets-examples and that all works just fine. Shibboleth, by itself (using Tomcat Forms authentication) is working with another sp. Combining the two seems to be a problem for me. I'm posting this to both the shibboleth and the CAS lists in the hopes someone can shed some light. When I have shibboleth and CAS configured to work together the first redirect to my -idp/SSO takes me to my CAS login. I then login thru CAS which is just fine. I send back a AuthN saml response but then get nothing back from the Sp. I am expecting a POST to my idp/AA asking form attributes (which is the next thing sent in the working shibboleth configuration) Both AuthN saml responses (working vs non-working) seem to be identical (barring the time specific details) My configuration is Win2K server with IIS 5.0 frontending Tomcat 5.5 on ports 80 and 443. Tomcat is managing 8080, 8009 and 8443 itself. My shibboleth-idp/WEB-INF/web.xml contains the following <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE web-app PUBLIC "-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN" "http://java.sun.com/dtd/web-app_2_3.dtd"> <web-app> <context-param> <param-name>IdPConfigFile</param-name> <param-value>file:/e:/opt/shibboleth-idp//etc/idp.xml</param-value> </context-param> <!--added CASFilter --> <filter> <filter-name>CASFilter</filter-name> <filter-class>edu.yale.its.tp.cas.client.filter.CASFilter</filter-class> <!-- URL of login page of CAS Server --> <init-param> <param-name>edu.yale.its.tp.cas.client.filter.loginUrl</param-name> <param-value>https://web2.ametsoc.org/cas/login</param-value> </init-param> <!-- URL to validation URL of CAS Server --> <init-param> <param-name>edu.yale.its.tp.cas.client.filter.validateUrl</param-name> <param-value>https://web2.ametsoc.org/cas/serviceValidate</param-value> </init-param> <!-- Full hostname with port number to be filtered. The port number is not required for standard ports (80,443) --> <init-param> <param-name>edu.yale.its.tp.cas.client.filter.serverName</param-name> <param-value>web2.ametsoc.org</param-value> </init-param> <!-- expose REMOTE_USER (from CAS Client version 2.1.0) --> <init-param> <param-name>edu.yale.its.tp.cas.client.filter.wrapRequest</param-name> <param-value>true</param-value> </init-param> </filter> <filter-mapping> <filter-name>CASFilter</filter-name> <url-pattern>/SSO/*</url-pattern> </filter-mapping> <!-- ########################### --> <servlet> <servlet-name>IdP</servlet-name> <display-name>Shibboleth Identity Provider</display-name> <servlet-class>edu.internet2.middleware.shibboleth.idp.IdPResponder</servlet -class> </servlet> <servlet-mapping> <servlet-name>IdP</servlet-name> <url-pattern>/SSO</url-pattern> </servlet-mapping> <servlet-mapping> <servlet-name>IdP</servlet-name> <url-pattern>/AA</url-pattern> </servlet-mapping> <servlet-mapping> <servlet-name>IdP</servlet-name> <url-pattern>/Artifact</url-pattern> </servlet-mapping> <servlet-mapping> <servlet-name>IdP</servlet-name> <url-pattern>/Status</url-pattern> </servlet-mapping> <mime-mapping> <extension>css</extension> <mime-type>text/css</mime-type> </mime-mapping> </web-app> Thanks, Pat MacDonald
_______________________________________________ Yale CAS mailing list [email protected] http://tp.its.yale.edu/mailman/listinfo/cas
