Am Montag, den 07.12.2009, 10:25 -0800 schrieb Vadim Letitchevski:
> Bill.
> 
> I have followed the recommendations in that document but did not succeed.
> So I have a set of self-generated (using OpenSSL) credentials. OpenSSL server 
> and client work fine (connect) using these credentials with authentication 
> both ways.
> Following the instructions in 
> (http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html) I have done:
> 
> openssl pkcs12 -export -in /etc/pki/tls/certs/localhost.crt -inkey 
> /etc/pki/tls/private/localhost.key -out mycert.p12 -name tomcat -CAfile 
> /etc/pki/tls/cacert.pem -caname root -chain
> 
> I have used the password changeit.
> 
> Next I have edited server.xml to have these strings:
> 
>     <!-- Define a server-auth SSL HTTP/1.1 Connector on port 8442 -->
>     <Connector port="8442" maxHttpHeaderSize="8192" SSLEnabled="true"
>                keystoreFile="conf/mycert.p12" keystorePass="changeit"
>                maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
>                enableLookups="false" disableUploadTimeout="true"
>                scheme="https" secure="true"
>                clientAuth="false" sslProtocol="TLS" />
try to add
 keystoreType="pkcs12" truststoreType="pkcs12"
the default values for these are JKS. Look at
http://tomcat.apache.org/tomcat-6.0-doc/config/http.html at section SSL
support.

> 
>     <!-- Define a mutual-auth SSL HTTP/1.1 Connector on port 8443 -->
>     <Connector port="8443" maxHttpHeaderSize="8192" SSLEnabled="true"
>                keystoreFile="conf/mycert.p12" keystorePass="changeit"
>                truststoreFile="conf/mycert.p12" truststorePass="changeit"
>                maxThreads="150" minSpareThreads="25" maxSpareThreads="75"
>                enableLookups="false" disableUploadTimeout="true"
>                scheme="https" secure="true"
>                clientAuth="true" sslProtocol="TLS" />
same here.

bye
 Felix
> 
> Then I started server and used Firefox trying to open https://localhost:8442 
> or https:/localhost:8443 with no success (failed to connect page).
> Catalina log file shows "java.io.exception: Invalid keystore format."
> What have I done wrong?
> 
> Thanks 
> Vadim. 
> 
> -----Original Message-----
> From: news [mailto:n...@ger.gmane.org] On Behalf Of Bill Barker
> Sent: Friday, December 04, 2009 7:25 PM
> To: users@tomcat.apache.org
> Subject: Re: JSSE question
> 
> 
> "Vadim Letitchevski" <vletitchev...@teledyne.com> wrote in message 
> news:e17da276f9a0c84fad22739de29c389005dafc3...@entmail01.tad.teledyne.com...
> >I am confused. Can Tomcat use only JKS keystore or it can also use pem 
> >or some other certificate storages?
> >
> 
> In the Tomcat docs (http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html),
> it shows how to use a PKCS12 keystore.  At some point that should be updated 
> to include an example for using a PKCS11 keystore.
> 
> The actual answer is that the JSSE Connector can use any keystore format that 
> is supported by your Java vendor.  In particular, with the Sun JVM, you can't 
> use PEM (however the APR Connector does use PEM).  However, it is usually 
> pretty easy to convert PEM to PKCS12 (see the link above for an example).
> 
> >
> > Thanks
> > Vadim.
> > (310)765-3812
> >
> >
> > 
> 
> 
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 



---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to