[ 
https://issues.apache.org/jira/browse/ARTEMIS-3100?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dominik Figl updated ARTEMIS-3100:
----------------------------------
    Description: 
I failed to configure Artemis with one-way SSL in combination with HA Failover.

Can anybody point out a working example to me? (I'm pretty new to that topic :) 
)

I also failed to get access to the slack channel :\

My Goal: 

2 Artemis Instances on CentOs Servers (one live and one backup server) with 
Server Side Certificate to enable the clients to encrypt the traffic. No Client 
side certs are needed.

My current configurate attempt:
 LIVE:
 <acceptor 
name="artemis-netty">tcp://0.0.0.0:61619?tcpSendBufferSize=1048576;tcpReceiveBufferSize=1048576;amqpMinLargeMessageSize=102400;protocols=CORE,AMQP,STOMP,HORNETQ,MQTT,OPENWIRE;useEpoll=true;amqpCredits=1000;amqpLowCredits=300;amqpDuplicateDetection=true;sslEnabled=true;keyStorePath=activemq.example.keystore;keyStorePassword=activemqexample;enabledProtocols=TLSv1,TLSv1.1,TLSv1.2;needClientAuth=false;verifyHost=false;trustAll=true</acceptor>

 <connectors> <connectors> <connector 
name="artemis">tcp://vrz8576t:61619</connector>  <!-- connector to the server1 
-->        <connector 
name="artemis-slave-connector">tcp://kai8576t:61619</connector>   </connectors> 
     <ha-policy> <replication> <master/> </replication>      </ha-policy>

<cluster-connections> <cluster-connection name="my-cluster"> 
<connector-ref>artemis</connector-ref> 
<message-load-balancing>ON_DEMAND</message-load-balancing> 
<max-hops>0</max-hops> <static-connectors>               
<connector-ref>artemis-slave-connector</connector-ref>            
</static-connectors> </cluster-connection> </cluster-connections>

BACKUP:
 <acceptor 
name="artemis-netty">tcp://0.0.0.0:61619?tcpSendBufferSize=1048576;tcpReceiveBufferSize=1048576;amqpMinLargeMessageSize=102400;protocols=CORE,AMQP,STOMP,HORNETQ,MQTT,OPENWIRE;useEpoll=true;amqpCredits=1000;amqpLowCredits=300;amqpDuplicateDetection=true;sslEnabled=true;keyStorePath=activemq.example.keystore;keyStorePassword=activemqexample;enabledProtocols=TLSv1,TLSv1.1,TLSv1.2;needClientAuth=false;verifyHost=false;trustAll=true</acceptor>
     

<connectors><connectors> <connector 
name="artemis">tcp://kai8576t:61619</connector>  <connector 
name="artemis-master-connector">tcp://vrz8576t:61619</connector>      
</connectors>
       <ha-policy> <replication> <slave/> </replication>      </ha-policy>
       <cluster-connections> <cluster-connection name="my-cluster"> 
<connector-ref>artemis</connector-ref> 
<message-load-balancing>ON_DEMAND</message-load-balancing> 
<max-hops>0</max-hops> <static-connectors>                    
<connector-ref>artemis-master-connector</connector-ref>                
</static-connectors> </cluster-connection>      </cluster-connections>

Certificate generation:
 keytool -genkey -keystore activemq.example.keystore -storepass activemqexample 
-keypass activemqexample -dname "CN=ActiveMQ Artemis Server, OU=Artemis, 
O=ActiveMQ, L=AMQ, S=AMQ, C=AMQ" -keyalg RSA
 keytool -export -keystore activemq.example.keystore -file server-side-cert.cer 
-storepass activemqexample
 keytool -import -keystore activemq.example.truststore -file 
server-side-cert.cer -storepass activemqexample -keypass activemqexample 
-noprompt

BR
 Dominik

 

  was:
I failed to configure Artemis with one-way SSL in combination with HA Failover.

Can anybody point out a working example to me? (I'm pretty new to that topic :) 
)

I also failed to get access to the slack channel :\

My Goal: 

2 Artemis Instances on CentOs Servers (one live and one backup server) with 
Server Side Certificate to enable the clients to encrypt the traffic. No Client 
side certs are needed.


My current configurate attempt:
LIVE:
<acceptor 
name="artemis-netty">tcp://0.0.0.0:61619?tcpSendBufferSize=1048576;tcpReceiveBufferSize=1048576;amqpMinLargeMessageSize=102400;protocols=CORE,AMQP,STOMP,HORNETQ,MQTT,OPENWIRE;useEpoll=true;amqpCredits=1000;amqpLowCredits=300;amqpDuplicateDetection=true;sslEnabled=true;sslProvider=OPENSSL;keyStorePath=activemq.example.keystore;keyStorePassword=activemqexample;enabledProtocols=TLSv1,TLSv1.1,TLSv1.2;needClientAuth=false;verifyHost=false;trustAll=true</acceptor>
 
 

 <connectors> <connectors> <connector 
name="artemis">tcp://vrz8576t:61619</connector>  <!-- connector to the server1 
-->        <connector 
name="artemis-slave-connector">tcp://kai8576t:61619</connector>   </connectors> 
     <ha-policy> <replication> <master/> </replication>      </ha-policy>

<cluster-connections> <cluster-connection name="my-cluster"> 
<connector-ref>artemis</connector-ref> 
<message-load-balancing>ON_DEMAND</message-load-balancing> 
<max-hops>0</max-hops> <static-connectors>               
<connector-ref>artemis-slave-connector</connector-ref>            
</static-connectors> </cluster-connection> </cluster-connections>

BACKUP:
<acceptor 
name="artemis-netty">tcp://0.0.0.0:61619?tcpSendBufferSize=1048576;tcpReceiveBufferSize=1048576;amqpMinLargeMessageSize=102400;protocols=CORE,AMQP,STOMP,HORNETQ,MQTT,OPENWIRE;useEpoll=true;amqpCredits=1000;amqpLowCredits=300;amqpDuplicateDetection=true;sslEnabled=true;sslProvider=OPENSSL;keyStorePath=activemq.example.keystore;keyStorePassword=activemqexample;enabledProtocols=TLSv1,TLSv1.1,TLSv1.2;needClientAuth=false;verifyHost=false;trustAll=true</acceptor>
     



<connectors><connectors> <connector 
name="artemis">tcp://kai8576t:61619</connector>  <connector 
name="artemis-master-connector">tcp://vrz8576t:61619</connector>      
</connectors>
      <ha-policy> <replication> <slave/> </replication>      </ha-policy>
      <cluster-connections> <cluster-connection name="my-cluster"> 
<connector-ref>artemis</connector-ref> 
<message-load-balancing>ON_DEMAND</message-load-balancing> 
<max-hops>0</max-hops> <static-connectors>                    
<connector-ref>artemis-master-connector</connector-ref>                
</static-connectors> </cluster-connection>      </cluster-connections>


Certificate generation:
keytool -genkey -keystore activemq.example.keystore -storepass activemqexample 
-keypass activemqexample -dname "CN=ActiveMQ Artemis Server, OU=Artemis, 
O=ActiveMQ, L=AMQ, S=AMQ, C=AMQ" -keyalg RSA
keytool -export -keystore activemq.example.keystore -file server-side-cert.cer 
-storepass activemqexample
keytool -import -keystore activemq.example.truststore -file 
server-side-cert.cer -storepass activemqexample -keypass activemqexample 
-noprompt

BR
Dominik

 


> I failed to configure SSL in combination with HA Failover
> ---------------------------------------------------------
>
>                 Key: ARTEMIS-3100
>                 URL: https://issues.apache.org/jira/browse/ARTEMIS-3100
>             Project: ActiveMQ Artemis
>          Issue Type: Wish
>    Affects Versions: 2.16.0
>            Reporter: Dominik Figl
>            Priority: Trivial
>
> I failed to configure Artemis with one-way SSL in combination with HA 
> Failover.
> Can anybody point out a working example to me? (I'm pretty new to that topic 
> :) )
> I also failed to get access to the slack channel :\
> My Goal: 
> 2 Artemis Instances on CentOs Servers (one live and one backup server) with 
> Server Side Certificate to enable the clients to encrypt the traffic. No 
> Client side certs are needed.
> My current configurate attempt:
>  LIVE:
>  <acceptor 
> name="artemis-netty">tcp://0.0.0.0:61619?tcpSendBufferSize=1048576;tcpReceiveBufferSize=1048576;amqpMinLargeMessageSize=102400;protocols=CORE,AMQP,STOMP,HORNETQ,MQTT,OPENWIRE;useEpoll=true;amqpCredits=1000;amqpLowCredits=300;amqpDuplicateDetection=true;sslEnabled=true;keyStorePath=activemq.example.keystore;keyStorePassword=activemqexample;enabledProtocols=TLSv1,TLSv1.1,TLSv1.2;needClientAuth=false;verifyHost=false;trustAll=true</acceptor>
>  <connectors> <connectors> <connector 
> name="artemis">tcp://vrz8576t:61619</connector>  <!-- connector to the 
> server1 -->        <connector 
> name="artemis-slave-connector">tcp://kai8576t:61619</connector>   
> </connectors>      <ha-policy> <replication> <master/> </replication>      
> </ha-policy>
> <cluster-connections> <cluster-connection name="my-cluster"> 
> <connector-ref>artemis</connector-ref> 
> <message-load-balancing>ON_DEMAND</message-load-balancing> 
> <max-hops>0</max-hops> <static-connectors>               
> <connector-ref>artemis-slave-connector</connector-ref>            
> </static-connectors> </cluster-connection> </cluster-connections>
> BACKUP:
>  <acceptor 
> name="artemis-netty">tcp://0.0.0.0:61619?tcpSendBufferSize=1048576;tcpReceiveBufferSize=1048576;amqpMinLargeMessageSize=102400;protocols=CORE,AMQP,STOMP,HORNETQ,MQTT,OPENWIRE;useEpoll=true;amqpCredits=1000;amqpLowCredits=300;amqpDuplicateDetection=true;sslEnabled=true;keyStorePath=activemq.example.keystore;keyStorePassword=activemqexample;enabledProtocols=TLSv1,TLSv1.1,TLSv1.2;needClientAuth=false;verifyHost=false;trustAll=true</acceptor>
>      
> <connectors><connectors> <connector 
> name="artemis">tcp://kai8576t:61619</connector>  <connector 
> name="artemis-master-connector">tcp://vrz8576t:61619</connector>      
> </connectors>
>        <ha-policy> <replication> <slave/> </replication>      </ha-policy>
>        <cluster-connections> <cluster-connection name="my-cluster"> 
> <connector-ref>artemis</connector-ref> 
> <message-load-balancing>ON_DEMAND</message-load-balancing> 
> <max-hops>0</max-hops> <static-connectors>                    
> <connector-ref>artemis-master-connector</connector-ref>                
> </static-connectors> </cluster-connection>      </cluster-connections>
> Certificate generation:
>  keytool -genkey -keystore activemq.example.keystore -storepass 
> activemqexample -keypass activemqexample -dname "CN=ActiveMQ Artemis Server, 
> OU=Artemis, O=ActiveMQ, L=AMQ, S=AMQ, C=AMQ" -keyalg RSA
>  keytool -export -keystore activemq.example.keystore -file 
> server-side-cert.cer -storepass activemqexample
>  keytool -import -keystore activemq.example.truststore -file 
> server-side-cert.cer -storepass activemqexample -keypass activemqexample 
> -noprompt
> BR
>  Dominik
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to