Re: SSL issue

2011-08-26 Thread Crypto Sal

On 08/26/2011 11:24 AM, Christopher Schultz wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Savitha,

On 8/25/2011 7:01 PM, Savitha Akella wrote:

Connector protocol=org.apache.coyote.http11.Http11Protocol
port=443 maxThreads=150 scheme=https secure=true
SSLEnabled=true

Okay.


keystoreFile=d:/users/apache-tomcat-7.0.11/keystore/key.keystore
keyAlias=keyalias keyPass=changeit

Okay.

clientAuth=true
truststoreFile=D:/users/apache-tomcat-7.0.11/keystore/trust.keystore



truststorePass=changeit

SSLVerifyClient=require

Okay.


sslProtocol=TLS

Should probably be SSLProtocol, but might not matter. Also, TLS is
not a documented valid value for this attribute.

http://tomcat.apache.org/tomcat-7.0-doc/config/http.html



Kindly double-check your data. I see that its the default and doesn't 
need to be defined but is probably defined for clarity.




SSLEngine=on

SSLEngine is not a recognized attribute.



It is for the Listener container. This would turn on/off APR. Seems like 
a simple mistake.




SSLVerifyDepth=4 /

Regards, Savitha On Thu, Aug 25, 2011 at 11:46 AM, Christopher
Schultz  ch...@christopherschultz.net  wrote:

Savitha,

On 8/25/2011 12:53 PM, Savitha Akella wrote:

We have given the trustStorePass value to point to a
keystore which has only the certificate for our web
services.

Do you mean truststoreFile?


Of course the clientAuth parameter is set to true.

Good.

Can you post yourConnector  configuration for us? Remember to
remove any passwords from it.

-chris

-



To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org

For additional commands, e-mail: users-h...@tomcat.apache.org



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk5Xur0ACgkQ9CaO5/Lv0PC4sACgraqr86G+o/CQ4m4pfn7SRoVy
NkYAoJhi4pR9EVYbeXbEEcYdSAgJ28+b
=jKq/
-END PGP SIGNATURE-

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org





-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: SLL Certificate Chain

2011-05-23 Thread Crypto Sal

On 05/23/2011 04:53 AM, Dipl.-Ing. Mag. Bernhard Hobiger wrote:

Hi,

I am running Tomcat 6.0.18 64bit on Windows Server 2008 R2 Enterprise. I 
obtained a certificate for my server from StartCom, installed it and configured 
the Connector. The server, intermediate and root certificates are in a keystore 
file. So far all went fine, except for one problem: Tomcat sends only the 
server certificate, not the whole certificate chain. This means that Firefox 
(all newer versions) thinks the certificate is invalid.

I tried to import the StartCom certificates into the default keystore cacerts, 
no difference. The problem is not that Tomcat cant validate the certificate, 
but that the intermediate certificate is not sent (verified with Wireshark).

I tried to set all entries in logging.properties to ALL, but I dont get 
anything in my logs. Has anyone encountered the same behaviour?

server.xml:
 Connector protocol=org.apache.coyote.http11.Http11Protocol
port=443 SSLEnabled=true
maxThreads=150 scheme=https secure=true
keystoreFile=C:\Program Files\Apache Software Foundation\Tomcat 
6.0\tomcat.keystore
keystorePass=...
keyAlias=intern
clientAuth=false sslProtocol=TLS /


keytool -list -keystore tomcat.keystore:


Keystore-Typ: JKS
Keystore-Provider: SUN
Ihr Keystore enthält 3 Einträge.
startcom.ca.sub, 23.05.2011, trustedCertEntry,
Zertifikatsfingerabdruck (MD5): 4F:9B:88:B0:78:F3:16:9F:19:DC:F1:A3:8A:50:DD:82
startcom.ca, 23.05.2011, trustedCertEntry,
Zertifikatsfingerabdruck (MD5): 22:4D:8F:8A:FC:F7:35:C2:BB:57:34:90:7B:8B:22:16
intern, 23.05.2011, PrivateKeyEntry,
Zertifikatsfingerabdruck (MD5): 30:93:DB:AD:5A:DB:76:00:49:EC:EA:0F:4B:9E:C3:3C

keytool -list -v -keystore tomcat.keystore: (output shortened)


Keystore-Typ: JKS
Keystore-Provider: SUN
Ihr Keystore enthält 3 Einträge.
Aliasname: startcom.ca.sub
Erstellungsdatum: 23.05.2011
Eintragstyp: trustedCertEntry
Eigner: CN=StartCom Class 2 Primary Intermediate Server CA, OU=Secure Digital 
Certificate Signing, O=StartCom Ltd., C=IL
Aussteller: CN=StartCom Certification Authority, OU=Secure Digital Certificate 
Signing, O=StartCom Ltd., C=IL
Seriennummer: b
Gültig von: Wed Oct 24 22:57:08 CEST 2007 bis: Mon Oct 22 22:57:08 CEST 2012
Digitaler Fingerabdruck des Zertifikats:
   MD5:  4F:9B:88:B0:78:F3:16:9F:19:DC:F1:A3:8A:50:DD:82
   SHA1: A9:C3:A1:41:78:DF:B2:B1:D1:94:1D:5E:3F:56:DA:FA:E2:E1:40:37
   Unterschrift-Algorithmusname: SHA1withRSA
   Version: 3
...
***
***

Aliasname: startcom.ca
Erstellungsdatum: 23.05.2011
Eintragstyp: trustedCertEntry
Eigner: CN=StartCom Certification Authority, OU=Secure Digital Certificate 
Signing, O=StartCom Ltd., C=IL
Aussteller: CN=StartCom Certification Authority, OU=Secure Digital Certificate 
Signing, O=StartCom Ltd., C=IL
Seriennummer: 1
Gültig von: Sun Sep 17 21:46:36 CEST 2006 bis: Wed Sep 17 21:46:36 CEST 2036
Digitaler Fingerabdruck des Zertifikats:
   MD5:  22:4D:8F:8A:FC:F7:35:C2:BB:57:34:90:7B:8B:22:16
   SHA1: 3E:2B:F7:F2:03:1B:96:F3:8C:E6:C4:D8:A8:5D:3E:2D:58:47:6A:0F
   Unterschrift-Algorithmusname: SHA1withRSA
   Version: 3
...

***
***

Aliasname: intern
Erstellungsdatum: 23.05.2011
Eintragstyp: PrivateKeyEntry
Zertifikatskettenlänge: 1
Zertifikat[1]:
Eigner: 
EMAILADDRESS=postmas...@htl-klu.atmailto:EMAILADDRESS=postmas...@htl-klu.at, 
CN=intern.htl-klu.at, OU=StartCom Verified Certificate Member, O=Bernhard Hobiger, 
L=Klagenfurt, ST=Karnten, C=AT, OID.2.5.4.13=165616-YmmhPnif68b3zfKu
Aussteller: CN=StartCom Class 2 Primary Intermediate Server CA, OU=Secure 
Digital Certificate Signing, O=StartCom Ltd., C=IL
Seriennummer: 1a3d
Gültig von: Thu Mar 18 09:26:36 CET 2010 bis: Mon Mar 19 00:20:28 CET 2012
Digitaler Fingerabdruck des Zertifikats:
   MD5:  30:93:DB:AD:5A:DB:76:00:49:EC:EA:0F:4B:9E:C3:3C
   SHA1: AD:21:D5:1B:83:BB:DF:A7:61:BA:BD:E0:F9:7A:13:8B:F9:EF:8A:CC
   Unterschrift-Algorithmusname: SHA1withRSA
   Version: 3
...
***
***






Hello,

Please take notice at the following lines in your output...

My German(?) isn't all that good, but I see this,  
Zertifikatskettenlänge: 1, which I know in English should read 
something to the affect of... 'Certificate Chain Length'


This is why Tomcat (JSSE) is only serving up the one certificate (depth 
0) and when I see this output, it would appear the '-trustcacerts' flag 
was not used when importing the certificate(s). See this page for 
reference [ 
http://download.oracle.com/javase/6/docs/technotes/tools/windows/keytool.html 
]


Here's also a blog posting from a fellow StartCom customer.

http://magictrevor.wordpress.com/2011/01/26/startssl-startcom-certificates-and-tomcat/

I hope this helps!

--Crypto.Sal




Re: Need help with SSL Certificate install on Tomcat 6.0.29 APR.

2011-04-19 Thread Crypto Sal

Hi Jin,

In my experiences with the APR and Tomcat, you need to use 'OpenSSL' to 
generate the keypair (CSR/key) I am fairly certain the APR can't read 
Java Keystore files. You would only use a keystore (JKS) using 'keytool' 
with JSSE.


I think you have at least 2 options at this point:

1. Generate new key pair with OpenSSL using the 'req' utility.
2. Export new keystore that was created with 'keytool' to a PKCS12 file 
and then use openSSL to create PEM key, certificate and Certificate 
authority files.


I would suggest you do #1 vs. that of #2, unless #2 cause you extra 
money or you don't mind doing a little 'work'. :-P


--Crypto.Sal



On 04/19/2011 05:54 PM, Jin H wrote:

Hi.  We are a school running Tomcat 6.0.29 for Windows server 2003 with APR.  I 
currently have an SSL certificate installed.  I'm trying to update it with the 
renewed SSL certificate but I'm having no luck.

Here are the commands I used to create the CSR.

in the jdk1.6.0_17\bin folder i used this command:

keytool -certreq -keyalg RSA -alias alias2011 -file cert.csr -keystore 
key2011.key -keysize 2048

It then asks for a password which i enter.

I generated the CSR and sent it to my SSL vendor.  They e-mailed my ssl 
certificate back to me.
But they told me that I had to install 2 intermediate Certificate files.
I dowloaded a primary.crt and secondary.crt files from them.

I then ran this command to import the primary.crt

keytool -import -trustcacerts -alias primary -keystore key2011.key -file 
primary.crt

Then the secondary.crt

keytool -import -trustcacerts -alias secondary -keystore key2011.key -file 
secondary.crt

finally the SSL certificate they e-mailed back.

keytool -import -trustcacerts -alias alias2011 -keystore key2011.key -file 
2011.crt

After this I copy the key2011.key and 2011.crt to the root of tomcat.

I edited server.xml to this:

Connector port=8443 maxHttpHeaderSize=8192
maxThreads=150 minSpareThreads=25 maxSpareThreads=75
enableLookups=false disableUploadTimeout=true
acceptCount=100 scheme=https secure=true
SSLEnabled=true
SSLCertificateFile=${catalina.home}/2011.crt
SSLCertificateKeyFile=${catalina.home}/key2011.key
keystorePass=somethingkey
keyalias=alias2011
SSLPassword=somethingkey/

I didn't know the difference between SSLPassword and keystorePass so I put both 
in there.
I never put a password for my previous ssl certificate and it worked so I'm 
confused why I have to put one in now.

BTW here is the current server.xml that works with the about to expire SSL 
certificate.

Connector port=8443 maxHttpHeaderSize=8192
maxThreads=150 minSpareThreads=25 maxSpareThreads=75
enableLookups=false disableUploadTimeout=true
acceptCount=100 scheme=https secure=true
SSLEnabled=true
SSLCertificateFile=${catalina.home}/hostname.crt
SSLCertificateKeyFile=${catalina.home}/hostname.key /



Please help.  Thanks in advance.




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Issues with Tomcat 6.0 Renewing SSL cert using keytool

2011-02-14 Thread Crypto Sal

Hi Sean,

Have you tried to specify just TLS or SSL for the sslProtocol? You 
presently have this set at TLSv1, which I do not believe is valid.


http://tomcat.apache.org/tomcat-6.0-doc/config/http.html

--Sal


On 02/14/2011 02:46 PM, Sean Killeen wrote:

It doesn't -- it tells me that a certificate already exists with that alias,
and the import fails.

--
Sean


On Mon, Feb 14, 2011 at 12:54 PM, Mark Thomasma...@apache.org  wrote:


On 14/02/2011 14:03, Sean Killeen wrote:

The next step seems to throw tomcat off. I believe I need to replace the
tomcat alias certificate. Barring a replace function in keytool (which

I

don't think exists, though I could be wrong), I think this means I have

to

delete the old tomcat certificate and replace it with the new one.

That will delete the key. I'm fairly sure you can just import the new
certificate and it will replace old one.

Mark



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org






-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Tomcat 5.5.23 with SSL

2011-02-14 Thread Crypto Sal

Hi Alexander,

As Mark has previously mentioned, there's no entry type of 
'privateKeyEntry' which is *required* for the certificate to work. I 
suspect what has happened is that you might not have been in the 
directory with your keystore file or you did not specify the right 
keystore as keytool is a little sneaky in this regard. If the keystore 
doesn't exist in the location that is specified, it will create it for 
you, but it will of course be missing the Private Key. I see this happen 
all too often. See if you have another 'keystore.kdb' file on your 
system and then try installing your certificate into it.


--Crypto.Sal




On 02/14/2011 12:52 PM, Mark Thomas wrote:

On 14/02/2011 15:45, Alexander Mills wrote:

For reference,

keytool -list -keystore keystore.kdb
[root@localhost tomcat5]# keytool -list -keystore keystore.kdb
Enter keystore password:

Keystore type: JKS
Keystore provider: SUN

Your keystore contains 1 entry

tomcat, Feb 14, 2011, trustedCertEntry,
Certificate fingerprint (MD5):
FC:XX:XX:87:74:CF:29:7A:F1:XX:9B:6E:18:32:7E:XX


That is just a certificate - there is no key so that is never going to work.

Mark



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org





-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: SSL Certificate : Unable to configure Tomcat server.xml

2010-10-26 Thread Crypto Sal

On 10/26/2010 04:08 AM, Richard da Silva wrote:

Thanks for your response, Darryl

But, the certificate is not the problem. The Tomcat Configuration is the issue 
(server.xml)



Richard da Silva




Richard,

Are you sure that the certificate isn't also the problem?

As Brett has previously mentioned, the APR is enabled [ Listener 
className=org.apache.catalina.core.AprLifecycleListener SSLEngine=on 
] , thus you need OpenSSL/mod_ssl style syntax and not the standard JSSE 
way of defining a keystore.



SSLCertificateFile=/usr/local/ssl/server.crt
SSLCertificateKeyFile=/usr/local/ssl/server.pem
SSLCertificateChainFile/usr/local/ssl/chain.pem


Your best bet at this time is to create a key and CSR with OpenSSL.
openssl req -nodes -newkey rsa:2048 -nodes -keyout myserver.key -out 
server.csr -subj /C=US/ST=NY/L=NY/O=MyCompany 
Ltd./OU=IT/CN=mysubdomain.mydomain.com
Then, send it to your CA to re-key the certificate. After all of that, 
modify the SSL connector as per the docs for the APR [ 
http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html ] (as per Brett too)


In your original server.xml file, I do not see an SSL definition, yet 
the SSL Engine is on. Are you sure this server is enabled with SSL in 
the original configuration?


--Sal














-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Installing certificate chain on Tomat

2010-04-10 Thread Crypto Sal

 On 04/10/2010 12:01 AM, /U wrote:

i am installing certificate chain on tomcat 6.x (JRE 1.6). From my CA I have
 private key (PEM),
 identity cert (PEM)  (CA X trusts myhost)
and a cert chain file (PEM file) (entrust trusts CA X)

The cert chain is: (entrust) === trusts ==  (CA X) == trusts ==  myhost


I have converted the private  key and identify cert into DER form
and have imported into /etc/keystore (tomcat's keystore).
I have imported the certificate chain PEM file into
${JAVA_HOME}/jre/lib/security/cacerts.

when I login to tomcat i get warning that certificate
  myhost isused by CA X is not trrusted.

It seems like browser does not get full cert chain (entrust =  CA X =
myhost).
what could I be doing wrong? pl help.

Regs,

/U


Hello,

You may want to take a look at Comodo's documentation for Tomcat.

https://support.comodo.com/index.php?_m=knowledgebase_a=viewarticlekbarticleid=1204

It shows how to easily install a trusted certificate for use with Tomcat 
(and most Java based Web Servers). I've used this documentation quite a 
few times and it has always been spot on.


You may want to view the contents of the keystore: keytool -v -list 
-keystore KEYSTORE_FILE; to see what is missing. Tomcat should have the 
Intermediate Cert(s) and the Entity/Domain Cert inside the keystore.


Hope this helps!






-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Multiple SSL certificates on same server

2010-03-08 Thread Crypto Sal

On 03/08/2010 06:46 PM, Richard Huntrods wrote:

Does anyone know if it is possible, or has anyone done this:

I have two applications running on a single server. The applications 
use different domains and URLs, so the single Tomcat instance can 
easily tell them apart. (Note: this part is currently working just fine).


https://domain1/application1
https://domain2/application2

Again, both domains point to the same static IP, and yes, it is 
possible for someone to access either application from either domain. 
Normally, that is not an issue with the clients.


However, I currently have only one SSL certificate on the server - 
this is for domain1. So if you use domain1 to access application1, 
it's all fine. The security cert comes up green and all that.


BUT - if you try and access application2 via domain2, you get the red 
security cert (wrong domain / server name). I would like to purchase a 
second certificate for the second domain, and am wondering if this can 
be done, and how one would tell Tomcat (in server.xml) to acknowledge 
the second certificate.


Currently the stuff in server.xml looks like this:

Connector port=443 protocol=HTTP/1.1 SSLEnabled=true
  maxThreads=150 enableLookups=false scheme=https 
secure=true

  keystoreFile=./keys/.keystore keystorePass=myPassword
  clientAuth=false sslProtocol=TLS /


I have a bad feeling it's not possible, but wanted to ask anyway.

Thanks in advance.

-R



Richard,

It's possible.

It doesn't appear that Tomcat or Java(SUN) support RFC 3546 just yet 
(For Server Name Indication) even though Apache httpd does. However 
Windows XP users of IE will not be able to take advantage of SNI at this 
time anyway (to further rain on your parade). Vista and greater do make 
use of SNI though. Gotta wait for XP to die I guess. :-P


End result: Multi-Domain Certificate, separate ports, separate IPs or a 
load balancer that distributes the load to an internal IP based on FQDN, 
to which you could then use X amount of different SSL certs.(This last 
bit may be a wee bit complicated)


Hope this helps




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Tomcat 5 SSL keytool error: java.lang.Exception: Public key in reply and keystore don't match

2009-10-20 Thread Crypto Sal

Nicholas,

You bring up a good point about the alias. It's what I feel most people 
mess up on when installing SSL Certificates to a keystore. If no alias 
is specified upon creation of the keystore, the alias is mykey. You 
can import ANY certificate you want into the keystore. You don't need 
it's private key. So keytool will act as if nothing is wrong. It's very 
sneaky in this regard.


One can easily see the contents of the keystore: `keytool -keystore 
KEYSTORE_FILE -v -list -storepass PASSWORD  SOMEFILE.TXT ` and one can 
see the alias here if they so forget what they gave it.






Miguel,

In regards to your issue, make sure the CSR and Certificate's modulus 
match. Easiest way is via OpenSSL. Since, you're on CentOS, you probably 
already have this.


`openssl x509 -noout -modulus -in YOUR_CERT.crt | openssl md5` and 
`openssl req -noout -modulus -in YOUR.CSR | openssl md5 `


Compare these two hashes. And if they're different...

`openssl x509 -noout -serial -in YOUR_CERT.crt`, and verify the serial 
number with Network Solutions, your CA  as they might have sent you the 
wrong certificate. Worst comes to worst, you might have to get a 
re-issue and make your keystore and csr have unique matching file names.





On 10/20/2009 12:19 PM, Nicholas Sushkin wrote:

Miguel,

I just installed a cert using our own CA, had a bit of trouble myself, but
it worked in the end. I found comodo's and Herong Yang's instructions
useful. See

http://www.herongyang.com/crypto/OpenSSL_Signing_keytool_CSR.html and
https://support.comodo.com/index.php?_m=knowledgebase_a=viewarticlekbarticleid=1204

One thing to note is that when you import cert, use the same certificate
alias as the key's (for example, -genkey -alias tomcat followed
by -import -trustcacerts -aliast tomcat)


On Tuesday 20 October 2009 10:36, Miguel Ortiz wrote:

   

I have a tomcat 5 web server setup on CentOS, I am currently working on
installing a SSL cert but don't seem to be having any luck. I get the
following error:

keytool error: java.lang.Exception: Public key in reply and keystore
don't match

I have reissued the cert through Network Solutions and followed the
following instructions to generate and install the cert. I have run out
of my patience with them. Is there anything else that I may be missing?
Thanks

http://www.networksolutions.com/support/csr-for-java-based-webservers-su
ch-as-tomcat-using-keytool/

http://www.networksolutions.com/support/installation-for-java-based-webs
ervers-such-as-tomcat-using-keytool/


Miguel
 


   



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: Apache/Tomcat with SSL

2009-09-28 Thread Crypto Sal

Miguel,

Do you have Tomcat serving up Port 80 traffic or is that Apache's httpd? 
I suggest you have one web server handle both normal web traffic and SSL 
traffic (if possible), since this page is a login page, you might want 
to FORCE https on that page and not allow HTTP. It would almost appear 
that you have Tomcat serving up port 80 traffic and Apache serving up 
SSL/TLS connections. So if that were the case, use Tomcat to do the SSL 
as well and configure tomcat accordingly in the server.xml file.


Do keep in mind there is a difference between Tomcat and Apache (httpd). 
Please clarify your setup for us.






On 09/28/2009 01:47 PM, Miguel Ortiz wrote:

Jorge,

I have setup the SSL through Apache and Tomcat, if there is a different 
procedure for mod_ssl, I will try that as well. The site comes up fine when I 
access it without the https, however when I use the https, all I see is the jsp 
script.

Miguel Ortiz
Network Engineer
x4818
wk: 954-331-4818
bbry: 954-649-1863
miguel.or...@macneillgroup.com


-Original Message-
From: Jorge Medina [mailto:jmed...@e-dialog.com]
Sent: Monday, September 28, 2009 10:55 AM
To: Tomcat Users List
Subject: RE: Apache/Tomcat with SSL


Also, in order to configure Apache with SSL you must have the module mod_ssl


-Original Message-
From: Jorge Medina [mailto:jmed...@e-dialog.com]
Sent: Monday, September 28, 2009 10:40 AM
To: Tomcat Users List
Subject: RE: Apache/Tomcat with SSL

Hola Miguel,

did you set up SSL in Apache ? Or did you do it in Tomcat ? Or in both ?

I am assuming that you want Apache to be the exposed server, therefore SSL 
must be configured in Apache.  You must also have configured Apache to forward 
the requests to Tomcat by using the Apache modules mod_jk or mod_proxy

-Jorge



-Original Message-
From: Miguel Ortiz [mailto:miguel.or...@macneillgroup.com]
Sent: Monday, September 28, 2009 8:32 AM
To: users@tomcat.apache.org
Subject: Apache/Tomcat with SSL

I recently setup a SSL cert on our Apache/Tomcat server. When I load our page, I can see 
the lock in my browser with all the SSL info, but the page only loads as a 
the jsp script and not the full page. Is there some configuration setting that I have 
missed. I can provide snippets from the server.xml, httpd.conf, and ssl.conf. Thanks in 
advance.

Miguel Ortiz
Network Engineer
x4818
wk: 954-331-4818
bbry: 954-649-1863
miguel.or...@macneillgroup.com




This email and any files transmitted with it are the confidential property of 
Focus Holdings, LLC and its subsidiaries, and intended solely for the use of 
the individual or entity to whom they are addressed. If you are not the named 
addressee you should not disseminate, distribute or copy this e-mail. Please 
notify the sender immediately by e-mail if you have received this e-mail by 
mistake and delete this e-mail from your system. If you are not the intended 
recipient you are notified that disclosing, copying, distributing or taking any 
action in reliance on the contents of this information is strictly prohibited.

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.5.409 / Virus Database: 270.13.112/2390 - Release Date: 09/28/09 
05:51:00



This email and any files transmitted with it are the confidential property of 
Focus Holdings, LLC and its subsidiaries, and intended solely for the use of 
the individual or entity to whom they are addressed. If you are not the named 
addressee you should not disseminate, distribute or copy this e-mail. Please 
notify the sender immediately by e-mail if you have received this e-mail by 
mistake and delete this e-mail from your system. If you are not the intended 
recipient you are notified that disclosing, copying, distributing or taking any 
action in reliance on the contents of this information is strictly prohibited.

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


   



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: SSL with multiple Tomcat instances

2009-08-26 Thread Crypto Sal
Don,
It's very strange that one works and the other does not especially since
they're from the same CA and presenting the same information. (Just
different common names) I can't connect to your external site [webadvisor]
via Firefox 3.5 or Chrome 4.0 due to the fact that your CA's OCSP responder
is down.[ Error Code: 403 Forbidden. The server denied the specified Uniform
Resource Locator (URL). Contact the server administrator. (12202) ].  I have
to disable OCSP in Firefox 3.5 to continue, but I do get a valid connection.

Has the error message changed at all since we've been working? Or are you
still getting a response that relates to Unknown Issuer?



On Wed, Aug 26, 2009 at 9:01 AM, Don Prezioso dp...@ashland.edu wrote:

 Sal,

 Thanks again.

 When I connect using port 8443 or 443, or using the FQDN or the IP address,
 I get the same response from the s_client request.

 The reason I am using port 8443 is so I don't have to have root running the
 tomcat instance. My understanding was that you had to be root to allocate
 ports under 1024. Just to have that extra little bit of security we have a
 user 'tomcat' that runs the tomcat instances. I didn't want to have to
 specify the port number in URLs, and we had some problems with people who
 weren't able to connect out through their company's firewall on port 8443,
 so we wanted to make it appear that they were connecting on port 443, but
 really be using 8443.

 So, when I connect in a browser, I use https://webui.ashland.edu

 Don




Re: SSL with multiple Tomcat instances

2009-08-26 Thread Crypto Sal

Don,

ipsCA is having some issues right now. Both OCSP (Online Certificate 
Status Protocol) and their CRL are DOWN. (It's not a good sign). 
Earlier, you stated that webui is the problem child, but webadvisor 
was working fine cross browser (Chrome, Firefox, IE, etc), correct or is 
this incorrect? Are both serving up pretty much the same content?


Based on your description of the error message, it almost sounds like a 
Java issue. Is it a Java dialog box that comes up? Does it look like 
this at all?


https://knowledge.verisign.com/resources/sites/VERISIGN/content/staging/SOLUTION/9000/SO9007/en_US/0.1/EV%20error.bmp

ipsCA does not exist in Java5 or 6 by default. It is in Browsers (IE, 
Firefox, Chrome, Safari), but not Java or Opera.


Attachments are pretty much stripped from this list. You'd either need 
to use imageshack.us or host elsewhere and provide the URL.


--Sal


On 08/26/2009 05:21 PM, Don Prezioso wrote:

Sorry, my pictures got stripped from the message so...

msg1.jpg basically says The web site's certificate cannot be verified. Do you want to continue? 
Name: webui.ashland.edu Publisher: webui.ashland.edu and has a link for more 
information...

msg2.jpg says The certificate was issued by a source that is not trusted. and 
has a link for Certificate Details...

msg3a-c show the certificate chain, including webui.ashland.edu, ipsCA CLASEA1, 
and IPS SERVIDORES.

--
Don Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio


-Original Message-
From: Don Prezioso
Sent: Wednesday, August 26, 2009 5:15 PM
To: Tomcat Users List
Subject: RE: SSL with multiple Tomcat instances

When I connect to webui.ashland.edu I get the message in msg1.jpg.

When I click on 'More Information...', I get the message in msg2.jpg

When I click on 'Certificate Details...' I get what you see in msg3a-c.jpg

Now this is the really strange thing. It appears to be a perfectly valid 
certificate with a valid CA. When connecting to webadvisor.ashland.edu, I see 
almost identical certificate details (the signature and CN are appropriately 
different). These are the same messages I have been getting all along.

The only thing that I can think is different between the two instances is that 
the webui instance is behind the firewall and cannot be seen from off campus. I 
didn't think that was an issue with validating certificates, is it?

Thanks again

Don

--
Don Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio


-Original Message-
From: Crypto Sal [mailto:crypto@gmail.com]
Sent: Wednesday, August 26, 2009 4:48 PM
To: Tomcat Users List
Subject: Re: SSL with multiple Tomcat instances

Don,
It's very strange that one works and the other does not especially since 
they're from the same CA and presenting the same information. (Just different 
common names) I can't connect to your external site [webadvisor] via Firefox 
3.5 or Chrome 4.0 due to the fact that your CA's OCSP responder is down.[ Error 
Code: 403 Forbidden. The server denied the specified Uniform Resource Locator 
(URL). Contact the server administrator. (12202) ].  I have to disable OCSP in 
Firefox 3.5 to continue, but I do get a valid connection.

Has the error message changed at all since we've been working? Or are you still getting a 
response that relates to Unknown Issuer?



On Wed, Aug 26, 2009 at 9:01 AM, Don Preziosodp...@ashland.edu  wrote:

   

Sal,

Thanks again.

When I connect using port 8443 or 443, or using the FQDN or the IP
address, I get the same response from the s_client request.

The reason I am using port 8443 is so I don't have to have root
running the tomcat instance. My understanding was that you had to be
root to allocate ports under 1024. Just to have that extra little bit
of security we have a user 'tomcat' that runs the tomcat instances. I
didn't want to have to specify the port number in URLs, and we had
some problems with people who weren't able to connect out through
their company's firewall on port 8443, so we wanted to make it appear
that they were connecting on port 443, but really be using 8443.

So, when I connect in a browser, I use https://webui.ashland.edu

Don


 


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


   



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



Re: SSL with multiple Tomcat instances

2009-08-26 Thread Crypto Sal

Don,

I think we found our culprit. (Java). The reason that webadvisor 
works, because it functions like a true server, your browser is speaking 
directly to the web server. webui is failing due to Java not trusting 
the IPS root certificate (which doesn't exist by default in Java 3-6+) 
Most people should have Java 5 or 6 installed, with some still using 
Java3(rare) or Java4(some linux people and older Windows users).Java5 is 
soon to be deprecated by Sun. As you may already know, Java compiling is 
done client-side vs. server side for your applet. So all of your users 
must have the IPS root installed in their instance of Java for this cert 
to work. There's a way to do it, but it is not all that practical. 
(adding root certs to Java on ALL clients, which may beyond your control)


Your best bet is to go with a more ubiquitous Commercial CA (Comodo, 
Versign, Thawte, GoDaddy, etc.), which would be ones that extend much 
further than Web Browsers. Java's default cert store is in a file called 
ca-certs, which is located in the security folder of where java 
resides. A simple locate cacerts will reveal its locate on the server. 
From here you can do a keytool -v -list -keystore PATH_TO_KEYSTORE  
OUTPUT_FILE , keystore pass is changeit, by default. Multiple 
versions of Java can exist on the same machine, if you would like to see 
which CAs are more ubiquitous for your installation.


--Sal

On 08/26/2009 09:19 PM, Don Prezioso wrote:

Hmmm...

Webadvisor serves up pretty much straight HTML, a little javascript, and much 
of the HTML is generated from another server, but what tomcat is serving up is 
mostly normal HTML.

WebUI however only serves up a single java applet. From that point on, the 
applet is talking to a completely different server and tomcat is out of the 
picture.  Also, the graphic you sent looks almost identical to the message I am 
seeing. So...

Would the java applet be using the certificate in addition to tomcat? Would I 
need to add the root certificate to a keystore that Java has somewhere?

Thanks for all your help.

Don

--
Donald Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio

From: Crypto Sal [crypto@gmail.com]
Sent: Wednesday, August 26, 2009 7:55 PM
To: Tomcat Users List
Subject: Re: SSL with multiple Tomcat instances

Don,

ipsCA is having some issues right now. Both OCSP (Online Certificate
Status Protocol) and their CRL are DOWN. (It's not a good sign).
Earlier, you stated that webui is the problem child, but webadvisor
was working fine cross browser (Chrome, Firefox, IE, etc), correct or is
this incorrect? Are both serving up pretty much the same content?

Based on your description of the error message, it almost sounds like a
Java issue. Is it a Java dialog box that comes up? Does it look like
this at all?

https://knowledge.verisign.com/resources/sites/VERISIGN/content/staging/SOLUTION/9000/SO9007/en_US/0.1/EV%20error.bmp

ipsCA does not exist in Java5 or 6 by default. It is in Browsers (IE,
Firefox, Chrome, Safari), but not Java or Opera.

Attachments are pretty much stripped from this list. You'd either need
to use imageshack.us or host elsewhere and provide the URL.

--Sal


On 08/26/2009 05:21 PM, Don Prezioso wrote:
   

Sorry, my pictures got stripped from the message so...

msg1.jpg basically says The web site's certificate cannot be verified. Do you want to continue? 
Name: webui.ashland.edu Publisher: webui.ashland.edu and has a link for more 
information...

msg2.jpg says The certificate was issued by a source that is not trusted. and 
has a link for Certificate Details...

msg3a-c show the certificate chain, including webui.ashland.edu, ipsCA CLASEA1, 
and IPS SERVIDORES.

--
Don Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio


-Original Message-
From: Don Prezioso
Sent: Wednesday, August 26, 2009 5:15 PM
To: Tomcat Users List
Subject: RE: SSL with multiple Tomcat instances

When I connect to webui.ashland.edu I get the message in msg1.jpg.

When I click on 'More Information...', I get the message in msg2.jpg

When I click on 'Certificate Details...' I get what you see in msg3a-c.jpg

Now this is the really strange thing. It appears to be a perfectly valid 
certificate with a valid CA. When connecting to webadvisor.ashland.edu, I see 
almost identical certificate details (the signature and CN are appropriately 
different). These are the same messages I have been getting all along.

The only thing that I can think is different between the two instances is that 
the webui instance is behind the firewall and cannot be seen from off campus. I 
didn't think that was an issue with validating certificates, is it?

Thanks again

Don

--
Don Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio


-Original Message-
From: Crypto Sal [mailto:crypto@gmail.com]
Sent: Wednesday, August 26, 2009 4:48 PM
To: Tomcat Users List
Subject: Re

Re: SSL with multiple Tomcat instances

2009-08-25 Thread Crypto Sal

Don,

No problem. You're seeing valid output and yes a Root certificate is 
self-signed. As per the TLS protocol, it's optional and doesn't need to 
be there for things to function. What's strange is it's the same output 
as the webadvisor instance, outside of the FQDN entries of course.


When you connect in browsers are you using https://webui.ashland.edu 
or are you using https://webui.ashland.edu:8443? (I realize you state 
that you have iptables running to redirect traffic, but you shouldn't 
really need to do that, unless you have something dire need for Tomcat 
to be on anything but 443)


I'm curious to see what 443's output is. Could you also use s_client to 
connect to both the FQDN and the IP (using port 443 and 8443), so that 
we can rule out a DNS issue?


--Sal



On 08/25/2009 10:49 AM, Don Prezioso wrote:

Sal,

Thanks so much for the reply. I think the server.xml reference is correct. Here 
is the connector segment from that instance:

   Connector port=8443 address=172.18.19.16
maxThreads=600 minSpareThreads=25 maxSpareThreads=75
enableLookups=false disableUploadTimeout=true
acceptCount=100 scheme=https secure=true
clientAuth=false sslProtocol=TLS
keystoreFile=conf/webui.keystore/

We are using 8443 instead of 443 and have iptables set up to reroute any 
outside traffic that comes in on 443 to 8443. The other instance uses 
172.18.19.15 and the default keystore (~/.keystore).

As far as I can tell, that is all working OK.

Here is what I get from the command openssl s_client -connect 
webui.ashland.edu:8443:

CONNECTED(0003)
depth=2 /C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es
verify error:num=19:self signed certificate in certificate chain
verify return:0
---
Certificate chain
  0 s:/C=US/ST=Ohio/L=Ashland/O=Ashland University/OU=Administrative 
IT/CN=webui.ashland.edu
i:/C=ES/ST=Barcelona/L=Barcelona/O=IPS Certification Authority 
s.l./o=gene...@ipsca.com C.I.F.  B-B62210695/OU=ipsCA CLASEA1 Certification 
Authority/CN=ipsCA CLASEA1 Certification 
Authority/emailaddress=gene...@ipsca.com
  1 s:/C=ES/ST=Barcelona/L=Barcelona/O=IPS Certification Authority 
s.l./o=gene...@ipsca.com C.I.F.  B-B62210695/OU=ipsCA CLASEA1 Certification 
Authority/CN=ipsCA CLASEA1 Certification 
Authority/emailaddress=gene...@ipsca.com
i:/C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es
  2 s:/C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es
i:/C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es
---
Server certificate
-BEGIN CERTIFICATE-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Re: SSL with multiple Tomcat instances

2009-08-24 Thread Crypto Sal

Hi Don,

A few questions:


1) Does server.xml reference the appropriate IP and keystore for webui?

2) What's the output of: [ openssl s_client -connect 
webui.ashland.edu:443 ] from the box, more specifically just the top 
area that mentions the certificate chain. It should look something like 
this...


---
Certificate chain
 0 s:/C=US/ST=Ohio/L=Ashland/O=Ashland University/OU=Administrative 
IT/CN=webui.ashland.edu
   i:/C=ES/ST=Barcelona/L=Barcelona/O=IPS Certification Authority 
s.l./o=gene...@ipsca.com C.I.F.  B-B62210695/OU=ipsCA CLASEA1 
Certification Authority/CN=ipsCA CLASEA1 Certification 
Authority/emailaddress=gene...@ipsca.com
 1 s:/C=ES/ST=Barcelona/L=Barcelona/O=IPS Certification Authority 
s.l./o=gene...@ipsca.com C.I.F.  B-B62210695/OU=ipsCA CLASEA1 
Certification Authority/CN=ipsCA CLASEA1 Certification 
Authority/emailaddress=gene...@ipsca.com
   i:/C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es
 2 s:/C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es
   i:/C=ES/ST=BARCELONA/L=BARCELONA/O=IPS Seguridad 
CA/OU=Certificaciones/CN=IPS SERVIDORES/emailaddress=...@mail.ips.es

---

3) Have you stopped and started the instance in question each time you 
made a change to the certificates(keystore) or the server.xml file?



I don't see any issues with the way you generated the keystore, CSR or 
how you imported the certificates as that's how I would do it. It's 
pretty much the way Comodo, Verisign, Thawte, and DigiCert suggest you 
do so.


Without knowing what the server is presenting, it is hard for me to tell 
you exactly what's wrong. As per RFC2246(TLS protocol), in a chained 
certificate environment the server must present the full chain (just 
Intermediates, Root is optional.) so that all RFC compliant clients 
(Chrome, Firefox, Opera, Safari, etc), can connect easily. (Internet 
Explorer actually tries to go behind the scenes and grab the 
intermediates from WindowsUpdate) Using OpenSSL's s_client command, 
should open things up a bit more and provide us with good information to 
use.


--Sal


On 08/24/2009 10:47 AM, Don Prezioso wrote:

These are standalone Tomcat instances (Tomcat is the web server, no Apache) 
running on Red Hat.

Each instance has it's own IP address (verified via netstat) and each address 
has a separate DNS entry (webadvisor.ashland.edu and webui.ashland.edu), each 
which resolve correctly. Each certificate is generated using the DNS name for 
the service it is intended for.

As far as I can tell, the certificate store is valid. When I use the keytool 
command to list the original keystore (the one with both certificates loaded in 
the same keystore), I get the attached listing. When I look at the new one 
(separate keystores, each with only one certificate) it looks the same except 
that it is missing the tomcat (the first instance) certificate and only has the 
webui certificate.

The commands I used to create the keystore were:

keytool -genkey -alias webui -keyalg RSA -keystore webui.keystore
keytool -certreq -alias webui -keystore webui.keystore
keytool -import -trustcacerts -alias IPSROOT -file IPSServidores.crt -keystore 
webui.keystore
keytool -import -trustcacerts -alias IPSCAA1 -file IPSCACLASEA1.crt -keystore 
webui.keystore
keytool -import -trustcacerts -alias webui -file webui.crt -keystore 
webui.keystore

The IPSServidores.crt is the IPS root certificate, IPSCACLASEA1.crt is the 
intermediate certificate, and webui.crt is the certificate reply from IPS.

These are the same steps I followed for the webadvisor instance and it is 
working properly.

The only things that I can think are different between these two tomcat 
instances are:
a) The webadvisor instance is visible through our firewall from off campus, and 
the webui instance is not (I am connecting from on campus)
b) The webadvisor instance is using the network device eth0, and webui is using 
eth0:0

Don

--
Don Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio


-Original Message-
From: Crypto Sal [mailto:crypto@gmail.com]
Sent: Thursday, August 20, 2009 8:00 PM
To: Tomcat Users List
Subject: Re: SSL with multiple Tomcat instances

Hi Don,

Is this Tomcat for Windows or Tomcat for a UNIX variant?

Have you verified the keystore as correct via * keytool -v -list
-keystore KEYSTORE_PATH/FILE* ? (Redirect that text to a file if need be!)

Did you use the *-trustcacerts* flag upon importing the certificates or
was this omitted?


   




-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




Re: SSL with multiple Tomcat instances

2009-08-20 Thread Crypto Sal

Hi Don,

Is this Tomcat for Windows or Tomcat for a UNIX variant?

Have you verified the keystore as correct via * keytool -v -list 
-keystore KEYSTORE_PATH/FILE* ? (Redirect that text to a file if need be!)


Did you use the *-trustcacerts* flag upon importing the certificates or 
was this omitted?



On 08/20/2009 04:49 PM, Don Prezioso wrote:

Peter,

Thanks for the reply. When I first started having this problem I was actually 
using a single keystore for both certificates. Yes there is both an 
intermediate and a root certificate that get loaded in the keystore, and I'm 
sure, at least when I was using a single keystore that they were loaded 
correctly because the other instance (and certificate) were working correctly.

With the second instance using a separate keystore, I get the same results 
whether the intermediate certificate is loaded in the keystore or not. That 
makes me think that somehow the second instance of Tomcat can't access the 
intermediate certificate, but somehow the first instance doesn't have that 
trouble?

Don

--
Don Prezioso
Director of Administrative I.T.
Ashland University
Ashland, Ohio


-Original Message-
From: peter.crowth...@googlemail.com [mailto:peter.crowth...@googlemail.com] On 
Behalf Of Peter Crowther
Sent: Thursday, August 20, 2009 4:40 PM
To: Tomcat Users List
Subject: Re: SSL with multiple Tomcat instances

2009/8/20 Don Preziosodp...@ashland.edu:
   

I have two instances of Tomcat 5.5 set up on a Red Hat box, each using separate 
IP addresses. I have obtained two certificates, one for each instance, and have 
put them in separate keystores. Both certificates are from IPSCA and both 
keystores have been set up in the same manner. Each keystore is properly 
referenced in the associated server.xml

The first instance (on eth0) is working with no problems. The second instance 
(on eth0:0), appears to work fine in IE, but when I connect using Firefox, 
Chrome, or Safari, I get the message:

The web site's certificate cannot be verified. Do you want to continue? The 
certificate cannot be verified by a trusted source.

When I view the certificate, it appears valid. If I click on 'Yes', then check 
the certificate, it says it is 'Verified by: IPS Certification Authority s.l.' 
and again, all appears fine.

Any ideas on why I am only getting the warning only on the second instance? I 
can't believe it is an issue with IPSCA since the first instance does not 
exhibit the problem.
 

Hmm.  This probably won't help you, but I recently had exactly those
symptoms when I hadn't installed the intermediate certificate for a
GlobalSign cert on an IIS server.  IE didn't care; everything else got
upset.

Do IPSCA use intermediate certs?  If so, are you *sure* they're
installed correctly on both keystores? ;-)

- Peter

-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


   



-
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org