Ok thanks, that explains a lot.

Unfortunately, I still don't get it to work. When I look at the
javax.net.debug output and compare to
http://en.wikipedia.org/wiki/Transport_Layer_Security#Client-authenticated%5FTLS%5Fhandshake,
I don't see *CertificateVerify* coming along, only the steps from one way
SSL are shown (and are succesfull). So the server responds with a 403
forbidden, client auth required message.

My config looks like this (using the wildcard because else it wouldn't
match, disabled cncheck to avoid those problems):
*  <http:conduit name="*.http-conduit"> *
* <http:tlsClientParameters disableCNCheck="true">*
* <sec:keyManagers keyPassword="mysecret">*
* <sec:keyStore type="JKS" password="mysecret"
file="/data/tomcat/serv03/keystore/.keystore" />*
* </sec:keyManagers>*
* <sec:cipherSuitesFilter>*
* <sec:include>.*_EXPORT_.*</sec:include>*
* <sec:include>.*_EXPORT1024_.*</sec:include>*
* <sec:include>.*_WITH_DES_.*</sec:include>*
* <sec:include>.*_WITH_NULL_.*</sec:include>*
* <sec:exclude>.*_DH_anon_.*</sec:exclude>*
* </sec:cipherSuitesFilter>*
* </http:tlsClientParameters>*
* </http:conduit> *

I don't have a trustManager configured as the server is using real certs
(vs self-signed), and I can see in the javax.net.debug logging that the
servers certificate is found and trusted.
The .keystore contains our self-signed certificate which is also imported
on the server side (IIS7).

Do I need to do anything else to enable client-authentication? Can I see in
the javax.net.debug output if the server even requests client auth?

On Tue, Jun 18, 2013 at 1:28 PM, Aki Yoshida <elak...@gmail.com> wrote:

> these are two different things (the inbound side configuration you already
> have and the outbound side configuration you asked for) and depending on
> what you need at each side, you can configure them independently.
>
>
>
> 2013/6/17 Nico Mommaerts <nico.mommae...@gmail.com>
>
> > Ok thanks! Had already read that but wasn't sure if that was needed if
> ssl
> > is also defined in Tomcat itself (is it harmful to also configure it
> > there?)
> >
> > On Mon, Jun 17, 2013 at 4:35 PM, Aki Yoshida <elak...@gmail.com> wrote:
> >
> > > you configure the ssl setting at your http conduit configuration.
> > > and this is explained in this cxf's online documentation:
> > >
> > >
> >
> http://cxf.apache.org/docs/client-http-transport-including-ssl-support.html#ClientHTTPTransport%28includingSSLsupport%29-ConfiguringSSLSupport
> > >
> > > regards, aki
> > >
> > >
> > > 2013/6/17 Nico Mommaerts <nico.mommae...@gmail.com>
> > >
> > > > Hey,
> > > >
> > > > I'm trying to setup a Camel CXF proxy with two way ssl (message gets
> > sent
> > > > to camel app over http, camel forwards to an external customer over
> > > https,
> > > > 2 way).
> > > > My Camel app is running on Tomcat (without Jetty running for CXF, I'm
> > > using
> > > > the CXFServlet). I have experience in setting up Tomcat for 2 way ssl
> > > with
> > > > Spring Webservices, but for Camel/CXF I see some literature about
> http
> > > > conduits and keystores.
> > > > So I'm not sure how to set this up for Camel/CXF, is it enough to
> > > configure
> > > > this on Tomcat level, like I do for normal Spring webservices, or do
> I
> > > need
> > > > to use the http conduit element in my configuration?
> > > >
> > > > Thanks in advance,
> > > > Nicolas Mommaerts
> > > >
> > >
> >
>

Reply via email to