I removed the ciperSuiteFilters, I get further now but now receive this:
default-workqueue-1, handling exception: java.net.SocketException:
Connection reset
%% Invalidated:  [Session-2, SSL_RSA_WITH_RC4_128_MD5]
default-workqueue-1, SEND TLSv1 ALERT:  fatal, description =
unexpected_message

I don't think this is Camel specific anymore, but if anyone would know the
answer... :)

On Wed, Jun 19, 2013 at 1:00 PM, Nico Mommaerts <nico.mommae...@gmail.com>wrote:

> Ok thanks, that explains a lot.
>
> Unfortunately, I still don't get it to work. When I look at the
> javax.net.debug output and compare to
> http://en.wikipedia.org/wiki/Transport_Layer_Security#Client-authenticated%5FTLS%5Fhandshake,
> I don't see *CertificateVerify* coming along, only the steps from one way
> SSL are shown (and are succesfull). So the server responds with a 403
> forbidden, client auth required message.
>
> My config looks like this (using the wildcard because else it wouldn't
> match, disabled cncheck to avoid those problems):
> *  <http:conduit name="*.http-conduit"> *
> * <http:tlsClientParameters disableCNCheck="true">*
> * <sec:keyManagers keyPassword="mysecret">*
> * <sec:keyStore type="JKS" password="mysecret"
> file="/data/tomcat/serv03/keystore/.keystore" />*
> * </sec:keyManagers>*
> * <sec:cipherSuitesFilter>*
> * <sec:include>.*_EXPORT_.*</sec:include>*
> * <sec:include>.*_EXPORT1024_.*</sec:include>*
> * <sec:include>.*_WITH_DES_.*</sec:include>*
> * <sec:include>.*_WITH_NULL_.*</sec:include>*
> * <sec:exclude>.*_DH_anon_.*</sec:exclude>*
> * </sec:cipherSuitesFilter>*
> * </http:tlsClientParameters>*
> * </http:conduit> *
>
> I don't have a trustManager configured as the server is using real certs
> (vs self-signed), and I can see in the javax.net.debug logging that the
> servers certificate is found and trusted.
> The .keystore contains our self-signed certificate which is also imported
> on the server side (IIS7).
>
> Do I need to do anything else to enable client-authentication? Can I see
> in the javax.net.debug output if the server even requests client auth?
>
>
> On Tue, Jun 18, 2013 at 1:28 PM, Aki Yoshida <elak...@gmail.com> wrote:
>
>> these are two different things (the inbound side configuration you already
>> have and the outbound side configuration you asked for) and depending on
>> what you need at each side, you can configure them independently.
>>
>>
>>
>> 2013/6/17 Nico Mommaerts <nico.mommae...@gmail.com>
>>
>> > Ok thanks! Had already read that but wasn't sure if that was needed if
>> ssl
>> > is also defined in Tomcat itself (is it harmful to also configure it
>> > there?)
>> >
>> > On Mon, Jun 17, 2013 at 4:35 PM, Aki Yoshida <elak...@gmail.com> wrote:
>> >
>> > > you configure the ssl setting at your http conduit configuration.
>> > > and this is explained in this cxf's online documentation:
>> > >
>> > >
>> >
>> http://cxf.apache.org/docs/client-http-transport-including-ssl-support.html#ClientHTTPTransport%28includingSSLsupport%29-ConfiguringSSLSupport
>> > >
>> > > regards, aki
>> > >
>> > >
>> > > 2013/6/17 Nico Mommaerts <nico.mommae...@gmail.com>
>> > >
>> > > > Hey,
>> > > >
>> > > > I'm trying to setup a Camel CXF proxy with two way ssl (message gets
>> > sent
>> > > > to camel app over http, camel forwards to an external customer over
>> > > https,
>> > > > 2 way).
>> > > > My Camel app is running on Tomcat (without Jetty running for CXF,
>> I'm
>> > > using
>> > > > the CXFServlet). I have experience in setting up Tomcat for 2 way
>> ssl
>> > > with
>> > > > Spring Webservices, but for Camel/CXF I see some literature about
>> http
>> > > > conduits and keystores.
>> > > > So I'm not sure how to set this up for Camel/CXF, is it enough to
>> > > configure
>> > > > this on Tomcat level, like I do for normal Spring webservices, or
>> do I
>> > > need
>> > > > to use the http conduit element in my configuration?
>> > > >
>> > > > Thanks in advance,
>> > > > Nicolas Mommaerts
>> > > >
>> > >
>> >
>>
>
>

Reply via email to