Noted - excellent!

On 3/18/23, Kevin Huntly <kmhun...@gmail.com> wrote:
> I was able to read the keystore with both openssl and keytool, but for some
> reason the private key within the pkcs#12 file had a different password
> than the keystone password. I ended up just rebuilding the cert and the
> keystore, and it's working now. Thanks !
> ________________________________________________
>
> Kevin Huntly
> Email: kmhun...@gmail.com
> Cell: 716/424-3311
> ________________________________________________
>
> -----BEGIN GEEK CODE BLOCK-----
> Version: 1.0
> GCS/IT d+ s a C++ UL+++$ P+(++) L+++ E---
> W+++ N+ o K(+) w--- O- M-- V-- PS+ PE Y(+)
> PGP++(+++) t+ 5-- X-- R+ tv+ b++  DI++ D++
> G++ e(+) h--- r+++ y+++*
> ------END GEEK CODE BLOCK------
>
>
> On Sat, Mar 18, 2023 at 3:27 PM Thomas Hoffmann (Speed4Trade GmbH)
> <thomas.hoffm...@speed4trade.com.invalid> wrote:
>
>> Hello,
>>
>> the relevant error is:
>> Caused by: javax.crypto.BadPaddingException: Given final block not
>> properly padded. Such issues can arise if a bad key is used during
>> decryption.
>>
>> It seems there is something wrong with your keystore.
>> Are both, private and public key in the p12 file?
>> Can you check the contents with keytool?
>> Alternatively, you can also use pem files, they are more readable than
>> p12.
>>
>> Greetings, Thomas
>>
>> > -----Ursprüngliche Nachricht-----
>> > Von: Kevin Huntly <kmhun...@gmail.com>
>> > Gesendet: Samstag, 18. März 2023 19:15
>> > An: users@tomcat.apache.org
>> > Betreff: SSL issue
>> >
>> > Hello Everyone,
>> >
>> > I'm having an issue with my SSL connector:
>> >
>> > <stacktrace>
>> > 18-Mar-2023 14:12:46.996 SEVERE [main]
>> > org.apache.catalina.util.LifecycleBase.handleSubClassException Failed
>> > to
>> > initialize component
>> [Connector[org.apache.coyote.http11.Http11Nio2Protocol-
>> > 8443]]
>> >         org.apache.catalina.LifecycleException: Protocol handler
>> initialization
>> > failed
>> >                 at
>> > org.apache.catalina.connector.Connector.initInternal(Connector.java:1014)
>> >                 at
>> > org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
>> >                 at
>> >
>> org.apache.catalina.core.StandardService.initInternal(StandardService.java:549
>> > )
>> >                 at
>> > org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
>> >                 at
>> >
>> org.apache.catalina.core.StandardServer.initInternal(StandardServer.java:1032)
>> >                 at
>> > org.apache.catalina.util.LifecycleBase.init(LifecycleBase.java:136)
>> >                 at
>> > org.apache.catalina.startup.Catalina.load(Catalina.java:724)
>> >                 at
>> > org.apache.catalina.startup.Catalina.load(Catalina.java:746)
>> >                 at
>> >
>> java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMeth
>> > odHandleAccessor.java:104)
>> >                 at
>> > java.base/java.lang.reflect.Method.invoke(Method.java:578)
>> >                 at
>> > org.apache.catalina.startup.Bootstrap.load(Bootstrap.java:307)
>> >                 at
>> > org.apache.catalina.startup.Bootstrap.main(Bootstrap.java:477)
>> >         Caused by: java.lang.IllegalArgumentException: Get Key failed:
>> > Given final block not properly padded. Such issues can arise if a bad
>> key is used
>> > during decryption.
>> >                 at
>> > org.apache.tomcat.util.net
>> .AbstractJsseEndpoint.createSSLContext(AbstractJsse
>> > Endpoint.java:107)
>> >                 at
>> > org.apache.tomcat.util.net
>> .AbstractJsseEndpoint.initialiseSsl(AbstractJsseEndpoi
>> > nt.java:71)
>> >                 at
>> > org.apache.tomcat.util.net.Nio2Endpoint.bind(Nio2Endpoint.java:146)
>> >                 at
>> > org.apache.tomcat.util.net
>> .AbstractEndpoint.bindWithCleanup(AbstractEndpoin
>> > t.java:1302)
>> >                 at
>> > org.apache.tomcat.util.net
>> .AbstractEndpoint.init(AbstractEndpoint.java:1315)
>> >                 at
>> > org.apache.coyote.AbstractProtocol.init(AbstractProtocol.java:652)
>> >                 at
>> >
>> org.apache.coyote.http11.AbstractHttp11Protocol.init(AbstractHttp11Protocol.j
>> > ava:75)
>> >                 at
>> > org.apache.catalina.connector.Connector.initInternal(Connector.java:1012)
>> >                 ... 11 more
>> >         Caused by: java.security.UnrecoverableKeyException: Get Key
>> failed:
>> > Given final block not properly padded. Such issues can arise if a bad
>> key is used
>> > during decryption.
>> >                 at
>> >
>> java.base/sun.security.pkcs12.PKCS12KeyStore.engineGetKey(PKCS12KeyStore.j
>> > ava:454)
>> >                 at
>> >
>> java.base/sun.security.util.KeyStoreDelegator.engineGetKey(KeyStoreDelegator
>> > .java:91)
>> >                 at
>> > java.base/java.security.KeyStore.getKey(KeyStore.java:1077)
>> >                 at
>> > org.apache.tomcat.util.net
>> .SSLUtilBase.getKeyManagers(SSLUtilBase.java:353)
>> >                 at
>> > org.apache.tomcat.util.net
>> .SSLUtilBase.createSSLContext(SSLUtilBase.java:246)
>> >                 at
>> > org.apache.tomcat.util.net
>> .AbstractJsseEndpoint.createSSLContext(AbstractJsse
>> > Endpoint.java:105)
>> >                 ... 18 more
>> >         Caused by: javax.crypto.BadPaddingException: Given final block
>> not
>> > properly padded. Such issues can arise if a bad key is used during
>> decryption.
>> >                 at
>> > java.base/com.sun.crypto.provider.CipherCore.unpad(CipherCore.java:861)
>> >                 at
>> >
>> java.base/com.sun.crypto.provider.CipherCore.fillOutputBuffer(CipherCore.jav
>> > a:941)
>> >                 at
>> > java.base/com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:734)
>> >                 at
>> >
>> java.base/com.sun.crypto.provider.PBES2Core.engineDoFinal(PBES2Core.java:3
>> > 10)
>> >                 at
>> java.base/javax.crypto.Cipher.doFinal(Cipher.java:2207)
>> >                 at
>> > java.base/sun.security.pkcs12.PKCS12KeyStore.lambda$engineGetKey$0(PKCS1
>> > 2KeyStore.java:370)
>> >                 at
>> >
>> java.base/sun.security.pkcs12.PKCS12KeyStore$RetryWithZero.run(PKCS12KeySt
>> > ore.java:257)
>> >                 at
>> >
>> java.base/sun.security.pkcs12.PKCS12KeyStore.engineGetKey(PKCS12KeyStore.j
>> > ava:361)
>> >                 ... 23 more
>> > </stacktrace>
>> >
>> > And my SSL config:
>> >
>> > <code>
>> >         <Connector executor="tomcatThreadPool"
>> > protocol="org.apache.coyote.http11.Http11Nio2Protocol"
>> >
>> sslImplementationName="org.apache.tomcat.util.net.jsse.JSSEImplementation"
>> >             address="0.0.0.0" port="8443" maxHttpHeaderSize="8192"
>> > maxThreads="150" minSpareThreads="25" enableLookups="false"
>> > acceptCount="100" connectionTimeout="20000"
>> >             disableUploadTimeout="true" compression="on"
>> > compressionMinSize="2048" noCompressionUserAgents="gozilla, traviata"
>> > SSLEnabled="true" scheme="https">
>> >             <UpgradeProtocol
>> > className="org.apache.coyote.http2.Http2Protocol" />
>> >             <SSLHostConfig hostName="appsrv.lan" protocols="TLSv1.2">
>> >                 <Certificate
>> > certificateKeystoreFile="/home/appsrv/etc/tomcat.p12"
>> > certificateKeystoreType="PKCS12" certificateKeystorePassword="password"
>> />
>> >             </SSLHostConfig>
>> >         </Connector>
>> > </code>
>> >
>> > So, what am I doing wrong here?
>> > ________________________________________________
>> >
>> > Kevin Huntly
>> > Email: kmhun...@gmail.com
>> > ________________________________________________
>> >
>> > -----BEGIN GEEK CODE BLOCK-----
>> > Version: 1.0
>> > GCS/IT d+ s a C++ UL+++$ P+(++) L+++ E---
>> > W+++ N+ o K(+) w--- O- M-- V-- PS+ PE Y(+)
>> > PGP++(+++) t+ 5-- X-- R+ tv+ b++  DI++ D++
>> > G++ e(+) h--- r+++ y+++*
>> > ------END GEEK CODE BLOCK------
>>
>

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to