Am 15.01.2026 um 18:11 schrieb [email protected]:
Hi all.
I've compiled the newest version of tomcat native in my tomcat 9.0.113 docker
container.
Now authentication with a client certificate fails. This has been working fine
with 1.3.1/2.0.9.
And the same setup still works with the JSSE connector.
As I read in the release notes there have been changes in the verification of
OCSP responses. My assumption, as the certs and client have not changed, would
be that there is something missing or a bug. Maybe my certs are wrong, but JSSE
is not complaining...
Is there anything I can try to debug or get more information within tomcat?
Thank You
Peter
Find my logs and config below:
▶ curl -v --http1.1 https://tomcat.fritz.box:8843 --cacert chain.logopk.crt.pem
--cert client.crt:xxx --cert-type PEM --key client.key
* Host tomcat.fritz.box:8843 was resolved.
* IPv6: (none)
* IPv4: 192.168.126.130
* Trying 192.168.126.130:8843...
* ALPN: curl offers http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* SSL Trust Anchors:
* CAfile: chain.logopk.crt.pem
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Request CERT (13):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Certificate (11):
* TLSv1.3 (OUT), TLS handshake, CERT verify (15):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519MLKEM768 /
RSASSA-PSS
* ALPN: server accepted http/1.1
* Server certificate:
* subject: C=DE; ST=Hessen; L=Dreieich; O=logo; OU=logo; CN=tomcat.fritz.box
* start date: Jan 14 22:20:04 2026 GMT
* expire date: Apr 14 22:21:04 2026 GMT
* issuer: C=DE; ST=Hessen; O=logo; OU=logo; CN=logo Intermediate CA 2025;
emailAddress=logo@xxx
* Certificate level 0: Public key type RSA (4096/152 Bits/secBits), signed
using sha512WithRSAEncryption
* Certificate level 1: Public key type RSA (4096/152 Bits/secBits), signed
using sha512WithRSAEncryption
* subjectAltName: "tomcat.fritz.box" matches cert's "tomcat.fritz.box"
* SSL certificate verified via OpenSSL.
* Established connection to tomcat.fritz.box (192.168.126.130 port 8843) from
192.168.126.1 port 54222
* using HTTP/1.x
GET / HTTP/1.1
Host: tomcat.fritz.box:8843
User-Agent: curl/8.18.0
Accept: */*
* Request completely sent off
* TLSv1.3 (IN), TLS alert, unknown CA (560):
* OpenSSL SSL_read: OpenSSL/3.6.0: error:0A000418:SSL routines::tlsv1 alert
unknown ca, errno 0
* closing connection #0
curl: (56) OpenSSL SSL_read: OpenSSL/3.6.0: error:0A000418:SSL routines::tlsv1
alert unknown ca, errno 0
as comparison the same request with native 1.3.1:
▶ curl -v --http1.1 https://tomcat.fritz.box:8843 --cacert chain.logopk.crt.pem
--cert client.crt:xxx --cert-type PEM --key client.key
* Host tomcat.fritz.box:8843 was resolved.
* IPv6: (none)
* IPv4: 192.168.126.130
* Trying 192.168.126.130:8843...
* ALPN: curl offers http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* SSL Trust Anchors:
* CAfile: chain.logopk.crt.pem
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, Request CERT (13):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, Certificate (11):
* TLSv1.3 (OUT), TLS handshake, CERT verify (15):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384 / X25519MLKEM768 /
RSASSA-PSS
* ALPN: server accepted http/1.1
* Server certificate:
* subject: C=DE; ST=Hessen; L=Dreieich; O=logo; OU=logo; CN=tomcat.fritz.box
* start date: Jan 14 22:20:04 2026 GMT
* expire date: Apr 14 22:21:04 2026 GMT
* issuer: C=DE; ST=Hessen; O=logo; OU=logo; CN=logo Intermediate CA 2025;
emailAddress=logo@xxx
* Certificate level 0: Public key type RSA (4096/152 Bits/secBits), signed
using sha512WithRSAEncryption
* Certificate level 1: Public key type RSA (4096/152 Bits/secBits), signed
using sha512WithRSAEncryption
* subjectAltName: "tomcat.fritz.box" matches cert's "tomcat.fritz.box"
* SSL certificate verified via OpenSSL.
* Established connection to tomcat.fritz.box (192.168.126.130 port 8843) from
192.168.126.1 port 54529
* using HTTP/1.x
GET / HTTP/1.1
Host: tomcat.fritz.box:8843
User-Agent: curl/8.18.0
Accept: */*
* Request completely sent off
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
< HTTP/1.1 200
< Strict-Transport-Security: max-age=31536000
< X-Frame-Options: DENY
< X-Content-Type-Options: nosniff
< X-XSS-Protection: 1; mode=block
< Content-Type: text/html;charset=ISO-8859-1
< Content-Length: 16
< Date: Thu, 15 Jan 2026 17:05:10 GMT
< Server: Apache Tomcat
<
This is Tomcat
* Connection #0 to host tomcat.fritz.box:8843 left intact
testssl.sh:
Certificate Validity (UTC) 89 >= 60 days (2026-01-14 22:20 --> 2026-04-14
22:21)
ETS/"eTLS", visibility info not present
Certificate Revocation List http://crl.fritz.box:8881/step.crl.pem
OCSP URI http://ocsp.fritz.box:8889
OCSP stapling not offered
OCSP must staple extension --
<Connector port="8443"
protocol="org.apache.coyote.http11.Http11Nio2Protocol"
sslImplementationName="org.apache.tomcat.util.net.jsse.JSSEImplementation"
allowTrace="false"
maxThreads="150"
SSLEnabled="true"
compression="off"
scheme="https"
server="Apache Tomcat"
secure="true"
defaultSSLHostConfigName="${hostname:-docker.fritz.box}" >
<UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol"
compression="on" />
<SSLHostConfig
hostName="tomcat.fritz.box"
honorCipherOrder="true"
protocols="+TLSv1.2,+TLSv1.3"
certificateVerification="none"
certificateRevocationListFile="${catalina.base}/conf/ssl/
ca-bundle-client.crl"
truststoreFile="${catalina.base}/conf/ssl/cacerts.jks"
truststorePassword="changeit"
ciphers="TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:!kECDH:ECDH+AESGCM:ECDH+CHACHA20:!aNULL:!SHA1:!AESCCM"
>
<Certificate certificateKeystoreFile="${catalina.base}/conf/ssl/
tomcat.p12"
certificateKeystorePassword="changeit"
certificateKeyAlias="tomcat"
type="RSA" />
</SSLHostConfig>
</Connector>
<Connector port="8843"
protocol="org.apache.coyote.http11.Http11Nio2Protocol"
sslImplementationName="org.apache.tomcat.util.net.openssl.OpenSSLImplementation"
server="Apache Tomcat"
allowTrace="false"
maxThreads="150"
SSLEnabled="true"
defaultSSLHostConfigName="${hostname:-docker.fritz.box}" >
<UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol"
compression="on" />
<SSLHostConfig honorCipherOrder="true" insecureRenegotiation="false"
hostName="tomcat.fritz.box"
protocols="+TLSv1.2,+TLSv1.3"
certificateVerification="required"
caCertificateFile="${catalina.base}/conf/ssl/
chain.logopk.crt.pem"
disableCompression="true"
disableSessionTickets="true"
ciphers="TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:!kECDH:ECDH+AESGCM:ECDH+CHACHA20:!aNULL:!SHA1:!AESCCM"
certificateRevocationListFile="${catalina.base}/
conf/ssl/ca-bundle-client.crl">
<Certificate certificateKeyFile="${catalina.base}/conf/ssl/ tomcat.key"
certificateFile="${catalina.base}/conf/ssl/tomcat.crt"
certificateChainFile="${catalina.base}/conf/ssl/
int.logopk.crt.pem"
type="RSA" />
</SSLHostConfig>
</Connector>
root@tomcat:/usr/local/tomcat# bin/version.sh
Using CATALINA_BASE: /opt/apache-tomcat.base
Using CATALINA_HOME: /usr/local/tomcat
Using CATALINA_TMPDIR: /opt/apache-tomcat.base/temp
Using JRE_HOME: /opt/java/openjdk
Using CLASSPATH: /usr/local/tomcat/bin/bootstrap.jar:/usr/local/
tomcat/bin/tomcat-juli.jar
Using CATALINA_OPTS: -XX:NativeMemoryTracking=summary -
Dhostname=docker3.fritz.box -Djava.awt.headless=true -
Djavax.net.ssl.trustStore=/opt/apache-tomcat.base/conf/ssl/cacerts.jks
-Xlog:gc:/opt/apache-tomcat.base/logs/gc.log -
Djava.security.egd=file:/dev/urandom -Dsun.net.inetaddr.ttl=60 -
Djava.library.path=/usr/local/tomcat/native-jni-lib -
Djdk.tls.ephemeralDHKeySize=2048 -
Djdk.tls.rejectClientInitiatedRenegotiation=true -
Djdk.tls.server.enableStatusRequestExtension=true -
Dcom.sun.management.jmxremote - Dcom.sun.management.jmxremote.port=10001 -
Dcom.sun.management.jmxremote.rmi.port=10002 -
Dcom.sun.management.jmxremote.authenticate=false -
Dcom.sun.management.jmxremote.ssl=false -
Djava.rmi.server.hostname=docker3.fritz.box -
Dcom.sun.management.jmxremote.local.only=false -javaagent:/opt/apache-
tomcat.base/bin/jmx_prometheus_javaagent-0.12.0.jar=8080:/opt/apache-
tomcat.base/bin/tomcat.yaml -XX:+UnlockDiagnosticVMOptions
NOTE: Picked up JDK_JAVA_OPTIONS: --add-opens=java.base/ java.lang=ALL-UNNAMED
--add-opens=java.base/java.lang.invoke=ALL- UNNAMED
--add-opens=java.base/java.lang.reflect=ALL-UNNAMED --add-
opens=java.base/java.io=ALL-UNNAMED --add-opens=java.base/
java.util=ALL-UNNAMED --add-opens=java.base/java.util.concurrent=ALL- UNNAMED
--add-opens=java.rmi/sun.rmi.transport=ALL-UNNAMED
Server version: Apache Tomcat/9.0.113
Server built: Dec 2 2025 19:51:24 UTC
Server number: 9.0.113.0
OS Name: Linux
OS Version: 6.12.57+deb13-arm64
Architecture: aarch64
JVM Version: 11.0.29+7
JVM Vendor: Eclipse Adoptium
root@tomcat:/usr/local/tomcat# openssl version
OpenSSL 3.5.4 30 Sep 2025 (Library: OpenSSL 3.5.4 30 Sep 2025)
tomcat | 15-Jan-2026 14:45:10.675 INFO [main]
org.apache.catalina.core.AprLifecycleListener.lifecycleEvent Loaded Apache
Tomcat Native library [1.3.4] using APR version [1.7.5].