Hello,
On a previous
post(http://qpid.2158936.n2.nabble.com/Qpid-Dispatch-SSL-SASL-configuration-on-a-listener-tp7646048.html),
I had asked about how to setup the qpid-dispatch to work with SSL and SASL
authentication and I was able thanks to your help to get clients
(Consumer/producer) to connect to the dispatcher using the correct
certificates.
At that time, I was connected to the open AMQP port of the Java Broker which
had no security. I then, tried to connect to a port which only required SSL and
this is also working.
What is not working however is connecting the dispatcher to a port which has
SSL and requires client certificates on the Java Broker. When I run the
qdmanage command to create the connector, no connections shows up on the
virtual host tab in the Java Broker Web management console.
The qdmanage commands are not showing any errors and there are no errors on the
Java Broker's side. Is there a way to debug further what is happening with
qdmanage?
As a reminder, my certificates are generated by a self-signed CA composed of a
root authority and an intermediate one.
Dispatcher config
router {
id: router.10396
mode: interior
worker-threads: 4
}
ssl-profile {
name: ssl-full-profile
certFile: cert_lx.pem
keyFile: key_lx.pem
certDb: ca-chain.cert.pem
}
listener {
host: 0.0.0.0
port: 10396
role: normal
saslMechanisms: EXTERNAL
sslProfile: ssl-full-profile
requireSsl: yes
authenticatePeer: yes
}
listener {
host: 0.0.0.0
port: 10395
role: normal
saslMechanisms: ANONYMOUS
sslProfile: ssl-full-profile
requireSsl: yes
authenticatePeer: no
}
log {
module: DEFAULT
enable: warn+
output: dispatch.10396.log
}
Java Broker
AMP port is 10101 configured with the proper "KeyStore" of the broker, a
"NonJavaTrustStore" containing the ca-chain.cert.pem (Combination of the root
and intermediate certificates) and "Want SSL Client Certificate".
qdmanage commands
qdmanage -b amqps://localhost:10395 --ssl-key=key_lx.pem
--ssl-certificate=cert_lx.pem create --type=address prefix=perfQueue
waypoint=true name=perf.queue.addr
qdmanage -b amqps://localhost:10395 --ssl-key=key_lx.pem
--ssl-certificate=cert_lx.pem create --type=connector role=route-container
addr=localhost port=10101 name=localhost.broker.10101.connector
certFile=cert_lx.pem certDb=ca-chain.cert.pem
Regards,
Adel