It should be noted that you might need to use an external tool of some sort to order and verify the certificate chain properly. I believe that's what we did when we ran into the problem. -- Thanks, Jeff
On Tue, May 23, 2017 at 10:05 AM, Jason Tucker <jasonwtuc...@gmail.com> wrote: > +1 to what Dave said. A full cert chain shouldn't be a problem in Traffic > Ops. Best to make sure server cert is at the top of the chain, and the rest > of the certs are below, in order, with the CA cert last. > > __Jason > > On Tue, May 23, 2017 at 2:15 PM, Dave Neuman <neu...@apache.org> wrote: > >> Hey Oren, >> Yes you can enter an externally created, full-chain certificate in Traffic >> Ops; we do this all the time. You shouldn't need to do anything special >> besides make sure that the certificate chain is in the correct order. I >> think you need to have the server (wildcard first) then the intermediates, >> then the root block. If that doesn't work, I would try reversing the >> order. >> >> --Dave >> >> On Tue, May 23, 2017 at 4:45 AM, Oren Shemesh <or...@qwilt.com> wrote: >> >> > Hi, >> > >> > After creating a DS which supports SSL, and using an official certificate >> > created by GoDaddy (As opposed to a self-signed certificate generated by >> > Ops), we ran into the following issue: >> > >> > An SSL scan from https://www.ssllabs.com/ssltest , done on >> > tr.<ds-name>.<cdn-domain>, complained about the fact that the server's >> > certificate chain is incomplete. >> > (Do try this tool on your servers, you might find the results >> interesting) >> > >> > I tried pasting the full certificate chain (Made from four blocks, each >> > marked with "-----BEGIN CERTIFICATE-----" and "-----END CERTIFICATE-----" >> > lines) into Ops, but this made the traffic router's situation worse: It >> > consumed the certificate chain with no problem, but now it presents a >> > certificate for GoDaddy, instead of a certificate for * >> > .<ds-name>.<cdn-domain>. >> > So, I guess that when pasting a certificate for a DS via Ops, it only >> uses >> > the first block in the chain. >> > >> > A quick check with tomcat documentation shows that in order for it to >> > present a full-chain certificate, two different 'keytool -import' >> commands >> > should be used, one for the 'root' and another for the 'server' (See >> > https://tomcat.apache.org/tomcat-7.0-doc/ssl-howto.html# >> > Importing_the_Certificate >> > ). >> > This might explain the problem: Given the current Ops GUI, I am entering >> a >> > chain of certificates in one block of text, using it as if it is a >> 'server' >> > certificate, instead of breaking it into a 'root' and a 'server' >> > certificate. >> > >> > So after all this, here is my question: >> > >> > Is there a way to use an externally-created, full-chain certificate, in >> > Traffic Ops ? >> > >> > Thanks a lot, Oren. >> > >> > -- >> > >> > *Oren Shemesh* >> > Qwilt | Work: +972-72-2221637| Mobile: +972-50-2281168 | or...@qwilt.com >> > <y...@qwilt.com> >> > >>