Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-30 Thread Chad La Joie
Yep, this is a problem.  And, as I said, we don't have keystores, so 
even if it did pick up the new cert it still wouldn't work for us.


jean-frederic clere wrote:

OK I have added a new CA using:
+++
[EMAIL PROTECTED]:~  $JAVA_HOME/bin/keytool -import -trustcacerts -file 
~/CERTS/demoCA/cacert.pem  -keystore $JAVA_HOME/jre/lib/security/cacerts

+++
To get Tomcat accepting client certificates from this CA I had to 
restart it... Bad.

--
Chad La Joie 315Q St. Mary's Hall
Project Sentinel 202.687.0124

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-29 Thread jean-frederic clere

Chad La Joie wrote:


jean-frederic clere wrote:


Chad La Joie wrote:



Yeah, I know what mod-ssl says, and for most cases it's probably right,
however the optional_no_ca option is interesting to us because it
provides exactly the functionality that we need; accepting the client
cert, putting it in a standard place, and allowing our application to do
the verification for us.

As you said, PKCS12 wouldn't help us.  The problem isn't that the Java
keystore is some how flawed.  It's that that's just not a viable
mechanism for us.  Our certificates are communicated in SAML2 metadata
files.  These files change periodically (when new service or identity
providers come online or old ones go offline).  We had discussed a
process whereby we'd extract the certs from the file and create a
keystore but that has and unacceptable drawback, in our opinion.  With
the SAML2 metadata files we can get fresh copies of those files and use
them immediately in a running system.  With the keystore mechanism
Tomcat would need to be restarted because the keystore, or at least part
of it, is cached in memory and as far as I can tell, the cache is never
refreshed.  Given the indeterminate frequency for metadata updates, we
do not see this as a viable solution for a production level system.



I am not sure I got it right...

If you have clients that use client certificates you only need to get
them signed by a CA that is known by Tomcat or do you want to change the
server certificate Tomcat is using?



That's the problem, Tomcat might not know the CA that signed the cert.
All certificate information, including CA(s), are expressed in the SAML2
metadata file.  It could be that the CA that signed the client cert was
something like Verisign, but it's much more likely to be the case that
it's some organization's CA, which Tomcat wouldn't know about.


OK I have added a new CA using:
+++
[EMAIL PROTECTED]:~  $JAVA_HOME/bin/keytool -import -trustcacerts -file 
~/CERTS/demoCA/cacert.pem  -keystore $JAVA_HOME/jre/lib/security/cacerts

+++
To get Tomcat accepting client certificates from this CA I had to restart it... 
Bad.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-28 Thread jean-frederic clere

Chad La Joie wrote:

Hey guys,
  I was wondering if there were any thoughts on this particular
suggestion.  I hadn't seen anything on the list.


Have you tried to use keystoreType=PKCS12 in the connector?



Chad La Joie wrote:


Good Morning,
 I work on the Internet2 Shibboleth project and we've run in to an
issue with client cert authentication in a stand alone Tomcat
environment (i.e. without Apache HTTPD in front of it).  Shibboleth
clients use client cert auth when talking with the Shibboleth server,
however, the certificate chains for the clients are not in a Java
keystore.  Instead they are in XML files that contain a large amount of
metadata needed by both the client and the server.
 Our current, supported, deployment configuration is to have Apache
HTTPD in front of Tomcat and to use SSLVerifyClient optional_no_ca
HTTPD directive.  This allows the client to send its certificate, but
instead of HTTPD trying to validate the cert, it just passes the cert on
to the Shibboleth server.  This allows us to validate the certificate
against the cert chains in the metadata files within the server code (a
huge support boon for us).  What we'd like to request is a similar
option for the SSL connector when client cert auth is used so that we
can support a stand alone Tomcat set up too.
 Would this be possible?





-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-28 Thread jean-frederic clere

Chad La Joie wrote:

Hey guys,
  I was wondering if there were any thoughts on this particular
suggestion.  I hadn't seen anything on the list.


BTW: mod-ssl says:
+++
In practice only levels none and require are really interesting, because level 
optional doesn't work with all browsers and level optional_no_ca is actually 
against the idea of authentication (but can be used to establish SSL test pages, 
etc.)

+++

And keystoreType= PKCS12 doesn't help.


Chad La Joie wrote:


Good Morning,
 I work on the Internet2 Shibboleth project and we've run in to an
issue with client cert authentication in a stand alone Tomcat
environment (i.e. without Apache HTTPD in front of it).  Shibboleth
clients use client cert auth when talking with the Shibboleth server,
however, the certificate chains for the clients are not in a Java
keystore.  Instead they are in XML files that contain a large amount of
metadata needed by both the client and the server.
 Our current, supported, deployment configuration is to have Apache
HTTPD in front of Tomcat and to use SSLVerifyClient optional_no_ca
HTTPD directive.  This allows the client to send its certificate, but
instead of HTTPD trying to validate the cert, it just passes the cert on
to the Shibboleth server.  This allows us to validate the certificate
against the cert chains in the metadata files within the server code (a
huge support boon for us).  What we'd like to request is a similar
option for the SSL connector when client cert auth is used so that we
can support a stand alone Tomcat set up too.
 Would this be possible?





-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-28 Thread Chad La Joie
Yeah, I know what mod-ssl says, and for most cases it's probably right,
however the optional_no_ca option is interesting to us because it
provides exactly the functionality that we need; accepting the client
cert, putting it in a standard place, and allowing our application to do
the verification for us.

As you said, PKCS12 wouldn't help us.  The problem isn't that the Java
keystore is some how flawed.  It's that that's just not a viable
mechanism for us.  Our certificates are communicated in SAML2 metadata
files.  These files change periodically (when new service or identity
providers come online or old ones go offline).  We had discussed a
process whereby we'd extract the certs from the file and create a
keystore but that has and unacceptable drawback, in our opinion.  With
the SAML2 metadata files we can get fresh copies of those files and use
them immediately in a running system.  With the keystore mechanism
Tomcat would need to be restarted because the keystore, or at least part
of it, is cached in memory and as far as I can tell, the cache is never
refreshed.  Given the indeterminate frequency for metadata updates, we
do not see this as a viable solution for a production level system.

jean-frederic clere wrote:
 Chad La Joie wrote:
 
 Hey guys,
   I was wondering if there were any thoughts on this particular
 suggestion.  I hadn't seen anything on the list.
 
 
 BTW: mod-ssl says:
 +++
 In practice only levels none and require are really interesting, because
 level optional doesn't work with all browsers and level optional_no_ca
 is actually against the idea of authentication (but can be used to
 establish SSL test pages, etc.)
 +++
 
 And keystoreType= PKCS12 doesn't help.
 

 Chad La Joie wrote:

 Good Morning,
  I work on the Internet2 Shibboleth project and we've run in to an
 issue with client cert authentication in a stand alone Tomcat
 environment (i.e. without Apache HTTPD in front of it).  Shibboleth
 clients use client cert auth when talking with the Shibboleth server,
 however, the certificate chains for the clients are not in a Java
 keystore.  Instead they are in XML files that contain a large amount of
 metadata needed by both the client and the server.
  Our current, supported, deployment configuration is to have Apache
 HTTPD in front of Tomcat and to use SSLVerifyClient optional_no_ca
 HTTPD directive.  This allows the client to send its certificate, but
 instead of HTTPD trying to validate the cert, it just passes the cert on
 to the Shibboleth server.  This allows us to validate the certificate
 against the cert chains in the metadata files within the server code (a
 huge support boon for us).  What we'd like to request is a similar
 option for the SSL connector when client cert auth is used so that we
 can support a stand alone Tomcat set up too.
  Would this be possible?



 
 -
 To unsubscribe, e-mail: [EMAIL PROTECTED]
 For additional commands, e-mail: [EMAIL PROTECTED]
 

-- 
Chad La Joie 315Q St. Mary's Hall
Project Sentinel 202.687.0124

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-28 Thread jean-frederic clere

Chad La Joie wrote:

Yeah, I know what mod-ssl says, and for most cases it's probably right,
however the optional_no_ca option is interesting to us because it
provides exactly the functionality that we need; accepting the client
cert, putting it in a standard place, and allowing our application to do
the verification for us.

As you said, PKCS12 wouldn't help us.  The problem isn't that the Java
keystore is some how flawed.  It's that that's just not a viable
mechanism for us.  Our certificates are communicated in SAML2 metadata
files.  These files change periodically (when new service or identity
providers come online or old ones go offline).  We had discussed a
process whereby we'd extract the certs from the file and create a
keystore but that has and unacceptable drawback, in our opinion.  With
the SAML2 metadata files we can get fresh copies of those files and use
them immediately in a running system.  With the keystore mechanism
Tomcat would need to be restarted because the keystore, or at least part
of it, is cached in memory and as far as I can tell, the cache is never
refreshed.  Given the indeterminate frequency for metadata updates, we
do not see this as a viable solution for a production level system.


I am not sure I got it right...

If you have clients that use client certificates you only need to get them 
signed by a CA that is known by Tomcat or do you want to change the server 
certificate Tomcat is using?




jean-frederic clere wrote:


Chad La Joie wrote:



Hey guys,
 I was wondering if there were any thoughts on this particular
suggestion.  I hadn't seen anything on the list.



BTW: mod-ssl says:
+++
In practice only levels none and require are really interesting, because
level optional doesn't work with all browsers and level optional_no_ca
is actually against the idea of authentication (but can be used to
establish SSL test pages, etc.)
+++

And keystoreType= PKCS12 doesn't help.



Chad La Joie wrote:



Good Morning,
I work on the Internet2 Shibboleth project and we've run in to an
issue with client cert authentication in a stand alone Tomcat
environment (i.e. without Apache HTTPD in front of it).  Shibboleth
clients use client cert auth when talking with the Shibboleth server,
however, the certificate chains for the clients are not in a Java
keystore.  Instead they are in XML files that contain a large amount of
metadata needed by both the client and the server.
Our current, supported, deployment configuration is to have Apache
HTTPD in front of Tomcat and to use SSLVerifyClient optional_no_ca
HTTPD directive.  This allows the client to send its certificate, but
instead of HTTPD trying to validate the cert, it just passes the cert on
to the Shibboleth server.  This allows us to validate the certificate
against the cert chains in the metadata files within the server code (a
huge support boon for us).  What we'd like to request is a similar
option for the SSL connector when client cert auth is used so that we
can support a stand alone Tomcat set up too.
Would this be possible?





-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]






-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-28 Thread Chad La Joie


jean-frederic clere wrote:
 Chad La Joie wrote:
 
 Yeah, I know what mod-ssl says, and for most cases it's probably right,
 however the optional_no_ca option is interesting to us because it
 provides exactly the functionality that we need; accepting the client
 cert, putting it in a standard place, and allowing our application to do
 the verification for us.

 As you said, PKCS12 wouldn't help us.  The problem isn't that the Java
 keystore is some how flawed.  It's that that's just not a viable
 mechanism for us.  Our certificates are communicated in SAML2 metadata
 files.  These files change periodically (when new service or identity
 providers come online or old ones go offline).  We had discussed a
 process whereby we'd extract the certs from the file and create a
 keystore but that has and unacceptable drawback, in our opinion.  With
 the SAML2 metadata files we can get fresh copies of those files and use
 them immediately in a running system.  With the keystore mechanism
 Tomcat would need to be restarted because the keystore, or at least part
 of it, is cached in memory and as far as I can tell, the cache is never
 refreshed.  Given the indeterminate frequency for metadata updates, we
 do not see this as a viable solution for a production level system.
 
 
 I am not sure I got it right...
 
 If you have clients that use client certificates you only need to get
 them signed by a CA that is known by Tomcat or do you want to change the
 server certificate Tomcat is using?

That's the problem, Tomcat might not know the CA that signed the cert.
All certificate information, including CA(s), are expressed in the SAML2
metadata file.  It could be that the CA that signed the client cert was
something like Verisign, but it's much more likely to be the case that
it's some organization's CA, which Tomcat wouldn't know about.
-- 
Chad La Joie 315Q St. Mary's Hall
Project Sentinel 202.687.0124

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread Chad La Joie
Hey guys,
  I was wondering if there were any thoughts on this particular
suggestion.  I hadn't seen anything on the list.

Chad La Joie wrote:
 Good Morning,
   I work on the Internet2 Shibboleth project and we've run in to an
 issue with client cert authentication in a stand alone Tomcat
 environment (i.e. without Apache HTTPD in front of it).  Shibboleth
 clients use client cert auth when talking with the Shibboleth server,
 however, the certificate chains for the clients are not in a Java
 keystore.  Instead they are in XML files that contain a large amount of
 metadata needed by both the client and the server.
   Our current, supported, deployment configuration is to have Apache
 HTTPD in front of Tomcat and to use SSLVerifyClient optional_no_ca
 HTTPD directive.  This allows the client to send its certificate, but
 instead of HTTPD trying to validate the cert, it just passes the cert on
 to the Shibboleth server.  This allows us to validate the certificate
 against the cert chains in the metadata files within the server code (a
 huge support boon for us).  What we'd like to request is a similar
 option for the SSL connector when client cert auth is used so that we
 can support a stand alone Tomcat set up too.
   Would this be possible?

-- 
Chad La Joie 315Q St. Mary's Hall
Project Sentinel 202.687.0124

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Re: Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread gerencia
su correo ha sido recepcionado. gracias



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



AUTO {TOML#001-926-076}Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread info
Dear Customer,
 
Thank you for your interest in the services offered by TimesofMoney.com.We have 
received your email. Our Customer Relations Officer will get in touch with you 
shortly.  Assuring you of our best services always.
 
Warm Regards,
Customer Relations
TimesofMoney.com
A Times Group Company
-
This is an automated response. Please do not respond to this email.
-



AUTO {TOML#001-926-078}Feature Request: Optional No Cert validation on SSL connector

2005-06-27 Thread info
Dear Customer,
 
Thank you for your interest in the services offered by TimesofMoney.com.We have 
received your email. Our Customer Relations Officer will get in touch with you 
shortly.  Assuring you of our best services always.
 
Warm Regards,
Customer Relations
TimesofMoney.com
A Times Group Company
-
This is an automated response. Please do not respond to this email.
-



Feature Request: Optional No Cert validation on SSL connector

2005-06-21 Thread Chad La Joie
Good Morning,
  I work on the Internet2 Shibboleth project and we've run in to an
issue with client cert authentication in a stand alone Tomcat
environment (i.e. without Apache HTTPD in front of it).  Shibboleth
clients use client cert auth when talking with the Shibboleth server,
however, the certificate chains for the clients are not in a Java
keystore.  Instead they are in XML files that contain a large amount of
metadata needed by both the client and the server.
  Our current, supported, deployment configuration is to have Apache
HTTPD in front of Tomcat and to use SSLVerifyClient optional_no_ca
HTTPD directive.  This allows the client to send its certificate, but
instead of HTTPD trying to validate the cert, it just passes the cert on
to the Shibboleth server.  This allows us to validate the certificate
against the cert chains in the metadata files within the server code (a
huge support boon for us).  What we'd like to request is a similar
option for the SSL connector when client cert auth is used so that we
can support a stand alone Tomcat set up too.
  Would this be possible?
-- 
Chad La Joie 315Q St. Mary's Hall
Project Sentinel 202.687.0124

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]