Revoking or deleting a client certificate

2004-05-12 Thread Plamen Neykov
Hi all,

It is probably a stupid question, but  
I have standalone tomcat installation with client authentication switched on 
as described in the tomcat documentation. The problem is that anybody who has 
a signed certificate from my CA can connect to tomcat - even if the client 
certificate is not in the tomcat keystore . How can I make sure that only 
clients with certificates existing in the tomcat keystore are allowed to 
connect?


Thanks a lot!


pgp0.pgp
Description: signature


Re: Revoking or deleting a client certificate

2004-05-12 Thread Plamen Neykov
Thanks for the very quick reply!

But  I had the certificates of the clients only initially in the keystore 
(no CA cert!) but I had trouble with MSIE and Mozilla - both denied to 
present the certificate to the server so that no connection was possible from 
those browsers :-(

On the second suggestion - it would be not very practical to send to every 
client a new CA cert. every time someone leaves the community

Is the Apache http server better on that or is it a kind of basic SSL problem 
here?

Thanks!

On Wednesday 12 May 2004 23:03, QM wrote:
 On Wed, May 12, 2004 at 10:57:30PM +0200, Plamen Neykov wrote:
 : I have standalone tomcat installation with client authentication switched 
on
 : as described in the tomcat documentation. The problem is that anybody who 
has
 : a signed certificate from my CA can connect to tomcat - even if the client
 : certificate is not in the tomcat keystore .
 
 Yes, that's considered a strong selling point of SSL trust
 chains/hierarchies.  ;)
 
 
 : How can I make sure that only
 : clients with certificates existing in the tomcat keystore are allowed to
 : connect?
 
 Remove the CA cert from the keystore and install only the certs (pub
 keys, that is) of clients that should be allowed to connect.
 
 Barring that, create a special CA for just Tomcat connections and store
 that in the keystore.  That would spare you the trouble of adding
 clients to the keystore individually.
 
 -QM
 


pgp0.pgp
Description: signature


Re: Revoking or deleting a client certificate

2004-05-12 Thread Plamen Neykov
I'm sure it will work ;-)

I think previously I misunderstood you - now just for my understanding - I 
should create a selfsigned CA just for signing the server certificate and 
then import in the keystore the client certificates which are signed with the 
org's standard CA cert. And then the client browsers  should be made aware of 
this selfsigned CA in addition so that they can verify the server 
authenticity?

Is that right? (it sounds actually logical to me :-))

Thanks


pgp0.pgp
Description: signature