[ 
https://issues.apache.org/jira/browse/NIFI-8713?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Jul Tomten updated NIFI-8713:
-----------------------------
    Description: 
ConsumeJMS and PublichJMS  SSL/TLS - error message  PKIX path building failed

 

In the current design the keystore password is stored in plain text. It should 
be stored in sensitive property. se commenta now!

 

 

!image-2021-06-16-21-40-53-349.png!

 

getJMSQueue putJMSQueue works fine with the same jks file and SSL context 
service.
 invokeHTTP works fine with the same context service.

I have a  root ca that issues the server certificates without intermediate ca.
 In the trust store jks there is only one certificate so it's a very simple 
setup.

Is there any extra requirements on the jks trsutstore when using ConsumeJMS or 
PublishJMS compared to getJMSQueue putJMSQueue ?

 

The trust store type in the SSL context service seems to not matter if it is 
set to JKS or PKCS12 .

ConsumeJMS or PublishJMS fails both with JKS and PKCS12

 getJMSQueue putJMSQueue works with  JKS and PKCS12.

 

java keytool lists my trust store as keystore type PKCS12 provider SUN.

I have tested with a keystore of type JKS but it fails with the same error 
message. 

 

activemq-all-5.15.9.jar is used with ConsumeJMS or PublishJMS

getJMSQueue putJMSQueue uses ActiveMQ driver shipped with NiFi

 

The activemq-all-5.15.9.jar has been tested in sap po whrere it works fine. 

 

Tested using the JMS* properties on the processor instead of the connection 
factory service JMS context servive but still the same error message.

I guess the ConsumeJMS or PublishJMS doesn't use the specified ssl context 
service but maybe fall back to using jdk cacerts file?
 Tested putting the root ca cert in cacerts file and in the file pointed to by 
nifi.security.truststore but it is still the same error message.

 

  was:
ConsumeJMS and PublichJMS doesn't work over SSL/TLS - error message  PKIX path 
building failed

 

!image-2021-06-16-21-40-53-349.png!

 

getJMSQueue putJMSQueue works fine with the same jks file and SSL context 
service.
 invokeHTTP works fine with the same context service.

I have a  root ca that issues the server certificates without intermediate ca.
 In the trust store jks there is only one certificate so it's a very simple 
setup.

Is there any extra requirements on the jks trsutstore when using ConsumeJMS or 
PublishJMS compared to getJMSQueue putJMSQueue ?

 

The trust store type in the SSL context service seems to not matter if it is 
set to JKS or PKCS12 .

ConsumeJMS or PublishJMS fails both with JKS and PKCS12

 getJMSQueue putJMSQueue works with  JKS and PKCS12.

 

java keytool lists my trust store as keystore type PKCS12 provider SUN.

I have tested with a keystore of type JKS but it fails with the same error 
message. 

 

activemq-all-5.15.9.jar is used with ConsumeJMS or PublishJMS

getJMSQueue putJMSQueue uses ActiveMQ driver shipped with NiFi

 

The activemq-all-5.15.9.jar has been tested in sap po whrere it works fine. 

 

Tested using the JMS* properties on the processor instead of the connection 
factory service JMS context servive but still the same error message.

I guess the ConsumeJMS or PublishJMS doesn't use the specified ssl context 
service but maybe fall back to using jdk cacerts file?
Tested putting the root ca cert in cacerts file and in the file pointed to by 
nifi.security.truststore but it is still the same error message.

 


> ConsumeJMS and PublishJMS  SSL/TLS PKIX path building failed
> ------------------------------------------------------------
>
>                 Key: NIFI-8713
>                 URL: https://issues.apache.org/jira/browse/NIFI-8713
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Extensions
>    Affects Versions: 1.13.2
>         Environment: redhat 
> java sap machine 1.11
> activemq-all-5.15.9.jar
>            Reporter: Jul Tomten
>            Priority: Major
>              Labels: ConsumeJMS, PKIX, SSL, TLS, building, failed, path
>         Attachments: image-2021-06-16-21-40-53-349.png, 
> image-2021-06-17-12-07-32-920.png
>
>
> ConsumeJMS and PublichJMS  SSL/TLS - error message  PKIX path building failed
>  
> In the current design the keystore password is stored in plain text. It 
> should be stored in sensitive property. se commenta now!
>  
>  
> !image-2021-06-16-21-40-53-349.png!
>  
> getJMSQueue putJMSQueue works fine with the same jks file and SSL context 
> service.
>  invokeHTTP works fine with the same context service.
> I have a  root ca that issues the server certificates without intermediate ca.
>  In the trust store jks there is only one certificate so it's a very simple 
> setup.
> Is there any extra requirements on the jks trsutstore when using ConsumeJMS 
> or PublishJMS compared to getJMSQueue putJMSQueue ?
>  
> The trust store type in the SSL context service seems to not matter if it is 
> set to JKS or PKCS12 .
> ConsumeJMS or PublishJMS fails both with JKS and PKCS12
>  getJMSQueue putJMSQueue works with  JKS and PKCS12.
>  
> java keytool lists my trust store as keystore type PKCS12 provider SUN.
> I have tested with a keystore of type JKS but it fails with the same error 
> message. 
>  
> activemq-all-5.15.9.jar is used with ConsumeJMS or PublishJMS
> getJMSQueue putJMSQueue uses ActiveMQ driver shipped with NiFi
>  
> The activemq-all-5.15.9.jar has been tested in sap po whrere it works fine. 
>  
> Tested using the JMS* properties on the processor instead of the connection 
> factory service JMS context servive but still the same error message.
> I guess the ConsumeJMS or PublishJMS doesn't use the specified ssl context 
> service but maybe fall back to using jdk cacerts file?
>  Tested putting the root ca cert in cacerts file and in the file pointed to 
> by nifi.security.truststore but it is still the same error message.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to