Remy Maucherat wrote:
> Qingqing Ouyang wrote:
> 
>> Hi, Bill:
>>
>> Thanx for the comments.  Please see the following.
>>
>>
>>>> Can someone start the Tomcat server with clientAuth=false, but access
>>>> a URI that is protected by CLIENT-CERT?  If yes, then I think a
>>>> re-handshake is a must.
>>>
>>>
>>>
>>>
>>> But using CertificatesValve to accomplish this is the wrong way to do 
>>> it.
>>> Catalina has no good reason to know or care what transport the 
>>> request was
>>> received on.  It's the connector's job to take care of that.
>>>
>>> It looks like we may need another Action to handle this case (probably
>>> invoked by the Realm).  Comments?
>>
>>
>>
>> Okay, that is where my ignorance kicks in. ;-)
>>
>> I agree that Catalina does not have to know/care about what
>> transport the request is received on.  The logical place for
>> this to happen is somewhere:
>>
>> 1. Tomcat has enough information to determine the incoming
>>    request is intended for a Context that requires the
>>    client-cert authentication
>>
>> 2. Tomcat also has to have the handle on the specific
>>    transport mechanism to force this second handshake with
>>    the client.
>>
>> 3. The certificate information also has to be populated with
>>    the Request object for further authorization calls...
> 
> 
> We can have the current certificate valve send an action to the Coyote 
> layer, which would then update the appropriate attributes.
> I think some new method is needed in SSLSupport.

Ok, already there :)
Great job Bill :)

Remy


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to