mike!

thank you, ill try and work with this....

..tony

Tony Weeg
Senior Web Developer
UnCertified Advanced ColdFusion Developer
Information System Design
Navtrak, Inc.
Mobile workforce monitoring, mapping & reporting
www.navtrak.net
410.548.2337 

-----Original Message-----
From: Mike Chambers [mailto:[EMAIL PROTECTED]] 
Sent: Wednesday, December 11, 2002 1:32 PM
To: CF-Talk
Subject: RE: MACROMEDIA PEOPLE....RE: instant SSL HELP!!!!!


i asked about your problem internally and below is some info that should
help resolve your issues:

--
Looks to me like this Instant SSL company is new on the SSL scene and
their certificate signing authority is not trusted by default by the Sun
1.3.1 JVM.

If you run this command, you can which signers the JVM trusts:

C:\CFusionMX\runtime\jre\bin\keytool -list -storepass changeit -noprompt
-keystore C:\CFusionMX\runtime\jre\lib\security\cacerts

Keystore type: jks
Keystore provider: SUN

Your keystore contains 11 entries:

thawtepersonalfreemailca, Fri Feb 12 15:12:16 EST 1999,
trustedCertEntry,
Certificate fingerprint (MD5):
1E:74:C3:86:3C:0C:35:C5:3E:C2:7F:EF:3C:AA:3C:D9
thawtepersonalbasicca, Fri Feb 12 15:11:01 EST 1999, trustedCertEntry,
Certificate fingerprint (MD5):
E6:0B:D2:C9:CA:2D:88:DB:1A:71:0E:4B:78:EB:02:41
verisignclass3ca, Mon Jun 29 13:05:51 EDT 1998, trustedCertEntry,
Certificate fingerprint (MD5):
78:2A:02:DF:DB:2E:14:D5:A7:5F:0A:DF:B6:8E:9C:5D
thawtepersonalpremiumca, Fri Feb 12 15:13:21 EST 1999, trustedCertEntry,
Certificate fingerprint (MD5):
3A:B2:DE:22:9A:20:93:49:F9:ED:C8:D2:8A:E7:68:0D
thawteserverca, Fri Feb 12 15:14:33 EST 1999, trustedCertEntry,
Certificate fingerprint (MD5):
C5:70:C4:A2:ED:53:78:0C:C8:10:53:81:64:CB:D0:1D
verisignclass4ca, Mon Jun 29 13:06:57 EDT 1998, trustedCertEntry,
Certificate fingerprint (MD5):
1B:D1:AD:17:8B:7F:22:13:24:F5:26:E2:5D:4E:B9:10
verisignclass1ca, Mon Jun 29 13:06:17 EDT 1998, trustedCertEntry,
Certificate fingerprint (MD5):
51:86:E8:1F:BC:B1:C3:71:B5:18:10:DB:5F:DC:F6:20
verisignserverca, Mon Jun 29 13:07:34 EDT 1998, trustedCertEntry,
Certificate fingerprint (MD5):
74:7B:82:03:43:F0:00:9E:6B:B3:EC:47:BF:85:A5:93
thawtepremiumserverca, Fri Feb 12 15:15:26 EST 1999, trustedCertEntry,
Certificate fingerprint (MD5):
06:9F:69:79:16:66:90:02:1B:8C:8C:A2:C3:07:6F:3A
verisignclass2ca, Mon Jun 29 13:06:39 EDT 1998, trustedCertEntry,
Certificate fingerprint (MD5):
EC:40:7D:2B:76:52:67:05:2C:EA:F2:3A:4F:65:F0:D8
ldap, Fri Oct 11 08:50:17 EDT 2002, trustedCertEntry,
Certificate fingerprint (MD5):
8F:0B:5B:26:7D:17:0E:AC:B2:56:A8:5C:96:52:37:4F

As you can see, Thawte and Verisign are there, but no Instant SSL. I
also have an additional entry in mine, ldap, that is the certificate for
our test lab SSL signing authority (so we can test CFMX connecting to
SSL and generate our own certificates for our web and ldap servers
without paying).

So in order for him to get it to work, it should be as simple as
importing the certificate for Instant SSL into the keystore using the
keytool utility.

If the certificate for Instant SSL is provided in a text file, i.e.
c:\instantssl.cer, the command would like this:
C:\CFusionMX\runtime\jre\bin\keytool -import -keystore
C:\CFusionMX\runtime\jre\lib\security\cacerts -alias instantssl
-storepass changeit -noprompt -trustcacerts -file c:\instantssl.cer

CFMX needs to be restarted afterwards.

Here are the docs on keytool:
http://java.sun.com/j2se/1.3/docs/tooldocs/win32/keytool.html
--


--
Thanks to Trevor Baker for vetting my response. Just to clarify... The
certificate that needs to be installed in the JVM is the root CA
certificate for Instant SSL, not for the site he's trying to access.
According to Instant SSL, they use the GTE CyberTrust Root CA and Comodo
Class 3 Security Services CA to sign certificates, so, to be safe the
customer would want to install both certificates (not sure which one the
site's cert was signed by).  Instant SSL offers these two certificates
for download on their sites as .crt files:
http://www.instantssl.com/support/cert_installation/index.html
--

--
Yes - although we have found that putting the server cert into cacerts
instead of the CA certificate will also work.  It's not the right way to
do it, but in a pinch it gets you up and running.
--

--
Extracting Certificates from IE5 and installing them into CFMX

In Internet Explorer:

[Tools] [Internet Options] [Content tab]  [Certificates] [Trusted Root
Certification Authorities tab] [Advanced] 

        set [Export Format]  to DER encoded binary X.509 (*.cer)

The "Purposes" list should have everything except "Client
Authentication" and "Secure Email" checked.

click [OK]

highlight the Certificates you want (...or all of the certificates if
you want them all...) 

    drag&drop the highlighted certificates onto
C:\CFusionMX\runtime\jre\lib\security\      in a separate Windows
Explorer window

This should create .cer files for the certificates you selected.  If you
selected all the certificates, there will be more than 100 .cer files.

Use the following command in a DOS window to install the certificates
into the cacerts file. The current directory should be
C:\CFusionMX\runtime\jre\lib\security\.  
This command should be entered as one long line:

    for %a in (*.cer) DO  C:\CFusionMX\runtime\jre\bin\keytool -import
-trustcacerts -keystore cacerts -storepass changeit -noprompt -alias
"%~na" -file "%a"

Delete the .cer files which are no longer needed:

        del *.cer

Restart CFMX


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~|
Archives: http://www.houseoffusion.com/cf_lists/index.cfm?forumid=4
Subscription: 
http://www.houseoffusion.com/cf_lists/index.cfm?method=subscribe&forumid=4
FAQ: http://www.thenetprofits.co.uk/coldfusion/faq
Signup for the Fusion Authority news alert and keep up with the latest news in 
ColdFusion and related topics. http://www.fusionauthority.com/signup.cfm

Reply via email to