-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Jairaj,

On 5/4/15 10:38 AM, jairaj kamal wrote:
> Hi, Please find my response inline as below. Also *this is for
> Tomcat version 6*
> 
> 1.) Include the <Connector /> tag from `conf/server.xml` so we can
> see how you've configured Tomcat - Below is what I added <Connector
> port="8443" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="150"
> scheme="https" secure="true"
> 
> keystoreFile="C:\Users\svcr2wadmin\nedr2wqajob1\QA_Job1_report2web.key
store"
>
> 
keystorePass="report2web" clientAuth="false" sslProtocol="TLS" />
> 
> 2.) Include the exact version of Tomcat you're using - Tomcat
> version 6

There have been 43 versions of Tomcat 6 released. Which one?

Are you using the APR-enabled connector or the JSSE one? Since you are
using a Java Keystore, I'm assuming JSSE, but it's worth asking; the
setup is completely different for the two.

> 3.) Are you connecting directly to Tomcat or is there an HTTPD or
> some other server acting as a reverse proxy in between? - *not by
> HTTPD but Connecting via url https://hostname:8443/r2wpublisher/ 
> <https://hostname:8443/r2wpublisher/>*
> 
> 4.) Look at the certificate as displayed by your browser.  In
> Chrome, click the lock in the tool bar, other browsers are similar.
> Look at the details on the certificate and see what certificate
> you're being presented.  Is it the once that you purchased?  or
> perhaps an older self-signed on? - *Yes this is what I purchased
> but its displays error as "This CA Root certificate is not trusted
> because it is not in the Trusted Root Certification Authorities 
> store."*

What is the certificate chain that Chrome shows you? Start with your
own certificate and go up toward the root CA. Does it show every
certificate that you put into your keystore? Perhaps you are missing
one or more intermediate certificates.

> *Earlier I used below commands to configure SSL*
> 
> #Keystore creation keytool -genkey -alias report2web -keyalg RSA
> -keystore 
> C:\Users\svcr2wadmin\nedr2wqajob1\QA_Job1_report2web.keystore #CSR
> generation keytool -certreq -keyalg RSA -alias report2web -file 
> C:\Users\svcr2wadmin\nedr2wqajob1\QA_Job1_report2web.csr -keystore 
> C:\Users\svcr2wadmin\nedr2wqajob1\QA_Job1_report2web.keystore
> 
> #Root Certificate Import keytool -import -alias root -keystore 
> C:\Users\svcr2wadmin\nedr2wqajob1\QA_Job1_report2web.keystore
> -trustcacerts -file C:\Users\svcr2wadmin\nedr2wqajob1\TestRoot.cer
> 
> #SSL Certificate Import keytool -import -alias nedr2wqajob1
> -keystore 
> C:\Users\svcr2wadmin\nedr2wqajob1\QA_Job1_report2web.keystore
> -file C:\Users\svcr2wadmin\nedr2wqajob1\TestCA.cer

At some point, you need to re-import your own certificate. Which
certificate is the one you got signed? TestCA.cer or TestRoot.cer?
Also, nearly every certificate authority requires that you install an
"intermediate" certificate between your cert and the CA's root cert.

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
Comment: GPGTools - http://gpgtools.org
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=nzQT
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to