-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Tom,

On 10/8/12 5:35 AM, Tom Anthony wrote:
> I just installed a third party certificate on Tomcat and was
> wondering whether there was a way to check with confidence that the
> ceritiftcae has been installed correctly on the server and that all
> communications between client and server are encrypted.

A couple of ways:

1. Connect via a web browser: use the https:// protocol. If the server
is speaking HTTP then you'll get an error message.

2. Use sslscan (http://www.titania.co.uk ; some Linux distros have it
in their package management systems). Just run sslscan [hostname]

3. https://www.ssllabs.com/ - use their "test my website" tool at the
bottom of their home page. It tells you about your certificates --
including making sure that you have a full cert chain and that the
certs are in the right order). It also tells you about other things
like if you are susceptible to BEAST and CRIME, and gives you a
"grade" based upon criteria I can't quite discern.

4. Use openssl's s_client:

   $ openssl s_client -connect hostname:port

It will give you some diagnostic information and actually let you
issue an HTTP request: it's pretty much 'telnet' except that it
tunnels it through SSL.

I'm sure there are other ways, too.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://www.enigmail.net/

iEYEARECAAYFAlBzHoEACgkQ9CaO5/Lv0PADEACfcpk6Unx5E7loXtzLnB6UAtT7
Lm0AoKzuRAHpSGKuynGMaw/vGaqMEtq4
=JLtL
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to