[ https://issues.apache.org/jira/browse/NIFI-8713?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17366537#comment-17366537 ]
Jul Tomten commented on NIFI-8713: ---------------------------------- It is very confusing that the TrustStoreType parameter has no effect. If set to JKS or PKCS12 it'll happily load any of the types. I think this is wrong. If set to PKCS12 it should load PKCS12 and issue anerror message if loading a JKS. If set to JKS it should load JKS and issue anerror message if loading a PKCS12. If automatic detection of keystore type is wanted there should be an extra option "automatic detection of keystore type". > ConsumeJMS and PublishJMS SSL/TLS PKIX path building failed > ------------------------------------------------------------ > > Key: NIFI-8713 > URL: https://issues.apache.org/jira/browse/NIFI-8713 > Project: Apache NiFi > Issue Type: Bug > Components: Extensions > Affects Versions: 1.13.2 > Environment: redhat > java sap machine 1.11 > activemq-all-5.15.9.jar > Reporter: Jul Tomten > Priority: Major > Labels: ConsumeJMS, PKIX, SSL, TLS, building, failed, path > Attachments: image-2021-06-16-21-40-53-349.png, > image-2021-06-17-12-07-32-920.png > > > ConsumeJMS and PublichJMS SSL/TLS - error message PKIX path building failed > > In the current design the keystore password is stored in plain text. It > should be stored in sensitive property. se comment below! > > > !image-2021-06-16-21-40-53-349.png! > > getJMSQueue putJMSQueue works fine with the same jks file and SSL context > service. > invokeHTTP works fine with the same context service. > I have a root ca that issues the server certificates without intermediate ca. > In the trust store jks there is only one certificate so it's a very simple > setup. > Is there any extra requirements on the jks trsutstore when using ConsumeJMS > or PublishJMS compared to getJMSQueue putJMSQueue ? > > The trust store type in the SSL context service seems to not matter if it is > set to JKS or PKCS12 . > ConsumeJMS or PublishJMS fails both with JKS and PKCS12 > getJMSQueue putJMSQueue works with JKS and PKCS12. > > java keytool lists my trust store as keystore type PKCS12 provider SUN. > I have tested with a keystore of type JKS but it fails with the same error > message. > > activemq-all-5.15.9.jar is used with ConsumeJMS or PublishJMS > getJMSQueue putJMSQueue uses ActiveMQ driver shipped with NiFi > > The activemq-all-5.15.9.jar has been tested in sap po whrere it works fine. > > Tested using the JMS* properties on the processor instead of the connection > factory service JMS context servive but still the same error message. > I guess the ConsumeJMS or PublishJMS doesn't use the specified ssl context > service but maybe fall back to using jdk cacerts file? > Tested putting the root ca cert in cacerts file and in the file pointed to > by nifi.security.truststore but it is still the same error message. > -- This message was sent by Atlassian Jira (v8.3.4#803005)