[ 
https://issues.apache.org/jira/browse/NIFI-8713?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17366537#comment-17366537
 ] 

Jul Tomten commented on NIFI-8713:
----------------------------------

It is very confusing that the TrustStoreType parameter has no effect. If set to 
JKS or PKCS12 it'll happily load any of the types. I think this is wrong. 
If set to PKCS12 it should load PKCS12 and issue anerror message if loading a 
JKS.

If set to JKS it should load JKS and issue anerror message if loading a PKCS12.

If automatic detection of keystore type is wanted there should be an extra 
option "automatic detection of keystore type".

> ConsumeJMS and PublishJMS  SSL/TLS PKIX path building failed
> ------------------------------------------------------------
>
>                 Key: NIFI-8713
>                 URL: https://issues.apache.org/jira/browse/NIFI-8713
>             Project: Apache NiFi
>          Issue Type: Bug
>          Components: Extensions
>    Affects Versions: 1.13.2
>         Environment: redhat 
> java sap machine 1.11
> activemq-all-5.15.9.jar
>            Reporter: Jul Tomten
>            Priority: Major
>              Labels: ConsumeJMS, PKIX, SSL, TLS, building, failed, path
>         Attachments: image-2021-06-16-21-40-53-349.png, 
> image-2021-06-17-12-07-32-920.png
>
>
> ConsumeJMS and PublichJMS  SSL/TLS - error message  PKIX path building failed
>  
> In the current design the keystore password is stored in plain text. It 
> should be stored in sensitive property. se comment below!
>  
>  
> !image-2021-06-16-21-40-53-349.png!
>  
> getJMSQueue putJMSQueue works fine with the same jks file and SSL context 
> service.
>  invokeHTTP works fine with the same context service.
> I have a  root ca that issues the server certificates without intermediate ca.
>  In the trust store jks there is only one certificate so it's a very simple 
> setup.
> Is there any extra requirements on the jks trsutstore when using ConsumeJMS 
> or PublishJMS compared to getJMSQueue putJMSQueue ?
>  
> The trust store type in the SSL context service seems to not matter if it is 
> set to JKS or PKCS12 .
> ConsumeJMS or PublishJMS fails both with JKS and PKCS12
>  getJMSQueue putJMSQueue works with  JKS and PKCS12.
>  
> java keytool lists my trust store as keystore type PKCS12 provider SUN.
> I have tested with a keystore of type JKS but it fails with the same error 
> message. 
>  
> activemq-all-5.15.9.jar is used with ConsumeJMS or PublishJMS
> getJMSQueue putJMSQueue uses ActiveMQ driver shipped with NiFi
>  
> The activemq-all-5.15.9.jar has been tested in sap po whrere it works fine. 
>  
> Tested using the JMS* properties on the processor instead of the connection 
> factory service JMS context servive but still the same error message.
> I guess the ConsumeJMS or PublishJMS doesn't use the specified ssl context 
> service but maybe fall back to using jdk cacerts file?
>  Tested putting the root ca cert in cacerts file and in the file pointed to 
> by nifi.security.truststore but it is still the same error message.
>  



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to