Hello,

I thought that Tomcat (at least recent versions) was able to get the full chain, but I guess I was wrong. I'm in fact using Jetty behind mod_jk, and it exposes the full chain of certificates in the "javax.servlet.request.X509Certificate" request attribute, as expected (I am using "JkOptions +ForwardSSLCertChain"). The version of mod_jk I'm using is that shipped with Ubuntu 8.04, so it's mod_jk 1.2.25. As far as I can tell, it hasn't been patched for this. I've also tried it successfully with the version shipped with CentOS.

I was getting the impression that mod_jk was being deprecated in favour of mod_proxy_ajp. I've also experienced intermittent connection problems between Apache Httpd and the Jetty-based application I'm using. These problems could be due to many things, including the way I've deployed the system, so I've tried to investigate it by using mod_proxy_ajp instead of mod_jk.

Best wishes,

Bruno.


Bill Barker wrote:
Yes, while mod_jk has an option to send the cert chain (added a little over 18 months ago by mturk), no Tomcat connector has an option to read it. As a result, Tomcat will read the end certificate and ignore the rest of the chain.

This is because the AJP/1.3 protocol was created back in the days of Servlet-2.2 (corresponding to Tomcat 3.x) and back then only the end certificate was exposed by the Servlet-API.

Mladen's patch to mod_jk is simplier than this one, so I would prefer it to this one. But I have no voting rights on this list :).

"Bruno Harbulot" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]
Hello,

I'm trying to use mod_proxy_ajp instead of mod_jk, but I'd like to be
able to pass the whole client certificate chain, instead of only the end
certificate. The servlet specification allows for a chain of
certificates to be presented and this is indeed possible with mod_jk,
using "JkOptions +ForwardSSLCertChain".

This doesn't seem to be possible using mod_proxy_ajp, which uses the
content of the SSL_CLIENT_CERT variable only.

Reply via email to