ok,*
*
here is the output of the command (sorry for the frensh):*

keytool -list -keystore /home/mycompany/keystoreHope.ks -alias omarmahmoud
Tapez le mot de passe du Keystore :
omarmahmoud, 26 mars 2009, PrivateKeyEntry,
Empreinte du certificat (MD5) :
1D:6A:97:3D:2A:6F:DB:20:2D:8D:CA:2A:42:5E:60:8C*

I made a new empty keystore and imported the certificate into it:*

*keytool -list -keystore keystoreA
Tapez le mot de passe du Keystore :

Type Keystore : JKS
Fournisseur Keystore : SUN

Votre Keystore contient 2 entrée(s)

omar, 27 mars 2009, trustedCertEntry,
Empreinte du certificat (MD5) :
1D:6A:97:3D:2A:6F:DB:20:2D:8D:CA:2A:42:5E:60:8C*

but I couldn't signe my bundles with it:
*
jarsigner: Certificate chain not found for: omar.  omar must reference a
valid KeyStore key entry containing a private key and corresponding public
key certificate chain.*

I really apreciate your help.

Regards.



2009/3/27 Karl Pauls <[email protected]>

> Well, it is a self signed cert then right? That is still ok but you
> probably will have to export it and import it again into a different
> keystore to make it trusted. Can you show me the verbose listing of
> your keystore?
>
> regards,
>
> Karl
>
> On Fri, Mar 27, 2009 at 5:31 PM, Omar MAHMOUD <[email protected]>
> wrote:
> > no, I don't have a CA cert. I just made my cert via the keytool command.
> > Is a CA cert required?
> >
> > regards.
> >
> > 2009/3/27 Karl Pauls <[email protected]>
> >
> >> Did you add your CA cert to the keystore as trusted?
> >>
> >> regards,
> >>
> >> Karl
> >>
> >> On Fri, Mar 27, 2009 at 9:28 AM, Omar MAHMOUD <[email protected]>
> >> wrote:
> >> > Thank you very much for your reply.
> >> >
> >> > I am signing my bundle with a keystore that I have created, and which
> >> > contains my school (organization field): ENIT.
> >> > I tried with *, o=ENIT before and it doesn't work either.
> >> > here is the output of jarsigner command:
> >> >
> >> > *jarsigner -keystore /home/mycompany/myKeystore.ks -verify -verbose
> >> -certs
> >> > registerservice-1.0.jar
> >> >
> >> >        1386 Thu Mar 26 14:58:40 CET 2009 META-INF/MANIFEST.MF
> >> >         880 Thu Mar 26 14:58:40 CET 2009 META-INF/OMARMAHM.SF
> >> >        1035 Thu Mar 26 14:58:40 CET 2009 META-INF/OMARMAHM.DSA
> >> >           0 Thu Mar 26 11:50:42 CET 2009 META-INF/
> >> >           0 Thu Mar 26 11:50:42 CET 2009 META-INF/maven/
> >> >           0 Thu Mar 26 11:50:42 CET 2009
> >> > META-INF/maven/com.mycompany.osgisecuritytuto/
> >> >           0 Thu Mar 26 11:50:42 CET 2009
> META-INF/maven/com.**mycompany**
> >> > .osgisecuritytuto/registerservice/
> >> > smk      148 Thu Mar 26 11:50:42 CET 2009
> >> META-INF/maven/com.**mycompany**
> >> > .osgisecuritytuto/registerservice/pom.properties
> >> >
> >> >      X.509, CN=Omar MAHMOUD, OU=TIC, O=ENIT, L=Beni Khalled,
> ST=Nabeul,
> >> > C=TN (omarmahmoud)
> >> >      [certificate will expire on 24/06/09 13:10]
> >> >
> >> > smk     1804 Wed Feb 25 11:37:58 CET 2009
> >> META-INF/maven/com.**mycompany**
> >> > .osgisecuritytuto/registerservice/pom.xml
> >> >
> >> >      X.509, CN=Omar MAHMOUD, OU=TIC, O=ENIT, L=Beni Khalled,
> ST=Nabeul,
> >> > C=TN (omarmahmoud)
> >> >      [certificate will expire on 24/06/09 13:10]
> >> >
> >> >           0 Thu Mar 26 11:50:42 CET 2009 com/
> >> >           0 Thu Mar 26 11:50:42 CET 2009 com/**mycompany**/
> >> >           0 Thu Mar 26 11:50:42 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/
> >> >           0 Thu Mar 26 11:50:42 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/registerservice/
> >> >           0 Thu Mar 26 11:50:42 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/registerservice/iservice/
> >> > smk      243 Thu Mar 26 11:50:40 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/registerservice/iservice/GSMService.class
> >> >
> >> >      X.509, CN=Omar MAHMOUD, OU=TIC, O=ENIT, L=Beni Khalled,
> ST=Nabeul,
> >> > C=TN (omarmahmoud)
> >> >      [certificate will expire on 24/06/09 13:10]
> >> >
> >> >           0 Thu Mar 26 11:50:42 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/registerservice/service/
> >> > smk     2307 Thu Mar 26 11:50:40 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/registerservice/service/Activator.class
> >> >
> >> >      X.509, CN=Omar MAHMOUD, OU=TIC, O=ENIT, L=Beni Khalled,
> ST=Nabeul,
> >> > C=TN (omarmahmoud)
> >> >      [certificate will expire on 24/06/09 13:10]
> >> >
> >> > smk      677 Thu Mar 26 11:50:40 CET 2009 com/**mycompany**
> >> > /osgisecuritytuto/registerservice/service/NokiaGSMImpl.class
> >> >
> >> >      X.509, CN=Omar MAHMOUD, OU=TIC, O=ENIT, L=Beni Khalled,
> ST=Nabeul,
> >> > C=TN (omarmahmoud)
> >> >      [certificate will expire on 24/06/09 13:10]
> >> >
> >> >           0 Thu Mar 26 11:50:42 CET 2009 util/
> >> > smk     1617 Thu Mar 26 11:50:40 CET 2009 util/Util.class
> >> >
> >> >      X.509, CN=Omar MAHMOUD, OU=TIC, O=ENIT, L=Beni Khalled,
> ST=Nabeul,
> >> > C=TN (omarmahmoud)
> >> >      [certificate will expire on 24/06/09 13:10]
> >> >
> >> >
> >> >  s = signature was verified
> >> >  m = entry is listed in manifest
> >> >  k = at least one certificate was found in keystore
> >> >  i = at least one certificate was found in identity scope
> >> >
> >> > jar verified.
> >> >
> >> > Warning:
> >> > This jar contains entries whose signer certificate will expire within
> six
> >> > months. *
> >> >
> >> > is there something wrong with the signature?
> >> >
> >> > Thank you very much for your help.
> >> > Best regards.
> >> > Omar MAHMOUD
> >> >
> >> > 2009/3/26 Karl Pauls <[email protected]>
> >> >
> >> >> Can you explain what kind of certificate (chain) you are trying to
> >> >> match? The given filter:
> >> >>
> >> >> *; o=ENIT
> >> >>
> >> >> would match bundles that have been signed by any certificate that has
> >> >> been signed by a CA that has a CN that _starts_ with o=ENIT. Not
> >> >> impossible but maybe not what you wanted? In case what you wanted to
> >> >> say is "if it is signed by a certificate that has o=ENIT in its CN
> >> >> then it should be:
> >> >>
> >> >> *, o=ENIT
> >> >>
> >> >> and if you want any certificate that has a CA that has o=ENIT
> >> >> somewhere in its CN then you should use:
> >> >>
> >> >> *;*,o=ENIT
> >> >>
> >> >> Again, please give some more information about your certificates.
> >> >>
> >> >> regards,
> >> >>
> >> >> Karl
> >> >>
> >> >> On Thu, Mar 26, 2009 at 6:17 PM, Omar MAHMOUD <[email protected]>
> >> >> wrote:
> >> >> > Hi All!!
> >> >> >
> >> >> > I'm working with OSGi security API under Felix.
> >> >> > I wanted to test 4 bundles:
> >> >> >
> >> >> > 1-a bundles that manages the permissions.
> >> >> > 2-RegisterService: a bundle that registers a service S.
> >> >> > 3-GoodBundle: a signed bundle that consumes S.
> >> >> > 4-MaliciousBundle: an unsigned bundles that attempts to consume S.
> >> >> >
> >> >> > I run Felix with  run_felix.sh = *{java
> >> >> > -Dfelix.config.properties=file:lib/felix/conf/config.properties
> >> >> > -Dfelix.cache.profiledir=lib/felix/profile -Djava.security.manager
> >> >> > -Djava.security.policy=lib/all.policy
> >> >> -Dfelix.keystore=file:/home/me/myKS.ks
> >> >> > -Dfelix.keystore.pass=mypass -Dfelix.keystore.type=JKS -jar
> >> >> > lib/felix/felix.jar}*
> >> >> >
> >> >> > The problem is that my 'GoodBundle' cannot get the service!
> >> >> >
> >> >> > It worked well when I substitued:
> >> >> >
> >> >> > *{m_signed = condPermAdmin.addConditionalPermissionInfo(new
> >> >> ConditionInfo[]{
> >> >> >                new
> >> ConditionInfo(BundleSignerCondition.class.getName(),
> >> >> new
> >> >> > String[]{"* ; o=ENIT"})
> >> >> >        }, ALLPERMISSION_INFO);
> >> >> > } *
> >> >> >
> >> >> > by
> >> >> > *{m_signed = condPermAdmin.addConditionalPermissionInfo(new
> >> >> ConditionInfo[]{
> >> >> >                new
> >> ConditionInfo(BundleLocationCondition.class.getName(),
> >> >> > new String[]{context.getBundle(7).getLocation()})
> >> >> >        }, ALLPERMISSION_INFO);
> >> >> > }* (GoodBundle has id=7)
> >> >> >
> >> >> >
> >> >> > So I doubted that there is something wrong with Jarsigneing, but
> the
> >> >> command
> >> >> > :
> >> >> >
> >> >> > *{jarsigner -keystore /home/me/myKS.ks GoodBundle-1.0.jar myAlias}*
> >> >> >
> >> >> > returns tells me that there is nothing wrong with the signature and
> >> all
> >> >> the
> >> >> > fields appear as they are supposed to be.
> >> >> >
> >> >> > What might be the problem?
> >> >> >
> >> >> > Thank you very much in advance.
> >> >> >
> >> >>
> >> >>
> >> >>
> >> >> --
> >> >> Karl Pauls
> >> >> [email protected]
> >> >>
> >> >> ---------------------------------------------------------------------
> >> >> To unsubscribe, e-mail: [email protected]
> >> >> For additional commands, e-mail: [email protected]
> >> >>
> >> >>
> >> >
> >>
> >>
> >>
> >> --
> >> Karl Pauls
> >> [email protected]
> >>
> >> ---------------------------------------------------------------------
> >> To unsubscribe, e-mail: [email protected]
> >> For additional commands, e-mail: [email protected]
> >>
> >>
> >
>
>
>
> --
> Karl Pauls
> [email protected]
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [email protected]
> For additional commands, e-mail: [email protected]
>
>

Reply via email to