Agreed. I was thinking in terms of the TLS exchange during which the client
uses the public key to send a symmetric key to the server.
I should have read the text further and more literally. Sorry about the
confusion.
Nicolas Therrien ing.
Senior Software Engineer
Airbus DS Communications
your text if you need a reviewer.
Nicolas Therrien ing.
Senior Software Engineer
Airbus DS Communications
home of VESTA®
200 Boul. de la Technologie, Suite 300
Gatineau, QC J8Z 3H6
Canada
819.931.2139 (DIRECT)
www.Airbus-DSComm.com
-Original Message-
From: Christopher Schultz [mailto:ch.
If you have autodeploy set to ON, make sure you clean your webapps from any
leftover war files. I would delete the folder contents entirely and redeploy.
On 19.11.2017 07:32, Karen Goh wrote:
> Hi,
>
> I am writing to this group as I could not get an answer from anywhere.
>
> Basically, I
-Original Message-
From: Don Flinn [mailto:fl...@alum.mit.edu]
Sent: Tuesday, November 14, 2017 1:58 AM
To: Tomcat Users List
Subject: Trying to understand How Tomcat uses Keystore for SSL
I've done some reading on SSL and understand the protocol is as follows;
GMT+00:00, Nicolas Therrien
> <nicolas.therr...@airbus-dscomm.com> wrote:
>
>
>
>> My understanding is that when "certificateVerification" is set to
>> "required", the server would perform the same verification as the
>> client does, t
the server behavior be correct, can someone explain to me why it
is like that?I find it odd that the client certificate can be copied around
and used by anyone and still pass mutual authentication...
Thanks in advance,
Nicolas Therrien ing.
Senior Software Engineer
Airbus DS Communications
hom