Betr.: Re: Betr.: Re: X509 certificates and https

2004-05-27 Thread R . Blom
Sorry, I'm not familiar with this environment.
Which CA certificate your server certificate is signed with?
Give me some important attributes.
Perhaps I can send you this certificate as an attachment.

 




Julie McCabe <[EMAIL PROTECTED]>
27-05-2004 16:47
Antwoord a.u.b. aan "Tomcat Users List"

 
Aan:"Tomcat Users List" <[EMAIL PROTECTED]>
cc: 
Onderwerp:  Re: Betr.: Re: X509 certificates and https


Hello,

I should have included this in my original mail but I am using Mozilla 
1.4.1
on RedHat Linuz 9.0 - any ideas?

Julie.

On Thursday 27 May 2004 15:47, [EMAIL PROTECTED] wrote:
> If you use Internet Explorer you simple go to the Trusted Certificate
> Authorties, select the CA certificate and export it to some format.
> You should then be able to import it into your trusted keystore.
>
> Ron
>
>
>
>
>
> Julie McCabe <[EMAIL PROTECTED]>
> 27-05-2004 16:21
> Antwoord a.u.b. aan "Tomcat Users List"
>
>
> Aan:"Tomcat Users List" <[EMAIL PROTECTED]>
> cc:
> Onderwerp:  Re: X509 certificates and https
>
>
> Hi,
>
> I tried the following command
>
> keytool -import -alias tomcat -keystore server.ks -trustcacerts -file
> server.crt
>
> with my certificate and key which are in pem format and it returned
> keytool error: java.lang.Exception: Input not an X.509 certificate
>
>
> I have the CA certifcate stored in my browser but cant see how I can
> export
> it?
>
> Thanks
> Julie.
>
> On Thursday 27 May 2004 15:24, [EMAIL PROTECTED] wrote:
> > The only thing you have to do is running the java keytool utily with
> > following command:
> >
> > keytool -import -alias tomcat -keystore server.ks -trustcacerts -file
> > server.crt
> >
> > This inserts thet server.crt certificate into the keystore that tomcat
> > uses.
> >
> > Your CA scertificate needs to be in the trusted keystore of your JRE
>
> under
>
> > which Tomcat runs.
> > If this is not the case put it in there as follows:
> >
> > keytool -import -keystore %JAVA_HOME%/lib/security/cacerts -file 
ca.pem
> > -alias my_alias
> >
> > This inserts the root certificate ca.pem into the trusted keystore of
>
> the
>
> > JRE being used.
> >
> > This should work.
> >
> > Ron Blom
>
> -
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




Betr.: Re: X509 certificates and https

2004-05-27 Thread R . Blom
If you use Internet Explorer you simple go to the Trusted Certificate 
Authorties, select the CA certificate and export it to some format.
You should then be able to import it into your trusted keystore.

Ron
 




Julie McCabe <[EMAIL PROTECTED]>
27-05-2004 16:21
Antwoord a.u.b. aan "Tomcat Users List"

 
Aan:"Tomcat Users List" <[EMAIL PROTECTED]>
cc: 
Onderwerp:  Re: X509 certificates and https


Hi,

I tried the following command

keytool -import -alias tomcat -keystore server.ks -trustcacerts -file
server.crt

with my certificate and key which are in pem format and it returned
keytool error: java.lang.Exception: Input not an X.509 certificate


I have the CA certifcate stored in my browser but cant see how I can 
export
it?

Thanks
Julie.

On Thursday 27 May 2004 15:24, [EMAIL PROTECTED] wrote:
> The only thing you have to do is running the java keytool utily with
> following command:
>
> keytool -import -alias tomcat -keystore server.ks -trustcacerts -file
> server.crt
>
> This inserts thet server.crt certificate into the keystore that tomcat
> uses.
>
> Your CA scertificate needs to be in the trusted keystore of your JRE 
under
> which Tomcat runs.
> If this is not the case put it in there as follows:
>
> keytool -import -keystore %JAVA_HOME%/lib/security/cacerts -file ca.pem
> -alias my_alias
>
> This inserts the root certificate ca.pem into the trusted keystore of 
the
> JRE being used.
>
> This should work.
>
> Ron Blom


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




Re: X509 certificates and https

2004-05-27 Thread R . Blom
The only thing you have to do is running the java keytool utily with 
following command:

keytool -import -alias tomcat -keystore server.ks -trustcacerts -file 
server.crt

This inserts thet server.crt certificate into the keystore that tomcat 
uses.

Your CA scertificate needs to be in the trusted keystore of your JRE under 
which Tomcat runs.
If this is not the case put it in there as follows:

keytool -import -keystore %JAVA_HOME%/lib/security/cacerts -file ca.pem 
-alias my_alias

This inserts the root certificate ca.pem into the trusted keystore of the 
JRE being used.

This should work.

Ron Blom

 

Betr.: X509 certificates and https

2004-05-27 Thread R . Blom
The only thing you have to do is running the java keytool utily with 
following command:

keytool -import -alias tomcat -keystore server.ks -trustcacerts -file 
server.crt

This inserts thet server.crt certificate into the keystore that tomcat 
uses.


Ron Blom

 




Julie McCabe <[EMAIL PROTECTED]>
27-05-2004 15:28
Antwoord a.u.b. aan "Tomcat Users List"

 
Aan:"Tomcat Users List" <[EMAIL PROTECTED]>
cc: 
Onderwerp:  X509 certificates and https


Hello,

I am trying to use SSL authenitcation with X509 certificates.  The 
certifcates
are not in the Java keystore.  I would like to know how to get my 
certificate
whichi is signed by a specific CA into the keystore and use the https
connector.

I have found some documentation on the web but have had little success 
with
getting my certificates into the keystore and SSL Connector configuration. 
 I
know my certificates are valid, maybe I am missing something with regards 
to
the CA which signed the certifcate.  I am using tomcat 4.1.27, Red Hat 
Linix
9.0.

Thanks,
Julie.



-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




Betr.: How to know http port and https port on tomcat

2004-05-27 Thread R . Blom
Just 

<%  request.getSchem() %>

Ron Blom

 




"Mariano" <[EMAIL PROTECTED]>
27-05-2004 14:49
Antwoord a.u.b. aan "Tomcat Users List"

 
Aan:"'Tomcat Users List'" <[EMAIL PROTECTED]>
cc: 
Onderwerp:  How to know http port and https port on tomcat


Hi all, can i know which port is using tomcat in http and https in jsp 
page
or servlet?

This values are sets in server.xml file in coyote connector port, for
example:





Thanks

Mariano López


-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




Client-certificate issues

2004-05-26 Thread R . Blom
Hi,

I want to use client-certificate authentication in our webapplication. 
There are two things that I really don't understand:

First:

Why is it necessary to set  clientAuth = true in the Factory-tag when 
configuring a Connector for SSL in server.xml, when only a certain part of 
the application should be protected for unauthorized access. It seems to 
me that this flag only should indicate whether mutual authentication 
(server and client authentication) should occur during the SSL-handshake 
or not. Consider the situation that I set this flag to false and setting a 
security role constraint for a certain servlet whith authentication method 
CLIENT-CERT. I would then expect that Tomcat asks the webbrowser to 
present the client certificate (and bind it as a attribute to the request 
object) the moment I try to to connect to this protected servlet. Instead 
I get the error No certificate chain found in this request.
The only possible moment to authenticate a user is during the mutual 
authentication (i.e. setting the clientAuth flag to yes) when the user is 
connected to the application for the first time . I think this not 
conforms to any of  Sun's servlet specifications.  Is this really a 
restriction to Tomcat or not?

Second:

When I set a security role constraint for a servlet with CLIENT-CERT as a 
authentication method, Tomcat forces me to put a CONFIDENTIAL transport 
garantee constraint for this servlet in web.xml. Although I understand 
that for the client certificate authentication process a SSL connection is 
used, I don't understand why the access to the servlet itself also must 
occur over a SSL-connection. I only want the CLIENT-CERT as a secure 
authenticating mechanism, but I do'nt always want a confidential transport 
(which puts a heavy load on the overall performance of my webapplication). 
Is this also a restriction to Tomcat? If not, what should I do to 
accomplish this?

Thanks in advance,

Ron Blom