Have a look at the attached keystore. It contains 2 certificates. In the txt file you can find the contents. Each cert is identified by a localKeyID, which is different. This store does not contain private keys.

I say that truststoreFile should not contain private keys. Imagine that you want to trust on clients which are signed by e.g. Verisign CA 1. Then, you cannot add Verisign CA 1 private key to your truststore, obviously, because it is secret. Moreover, to verify that a certificate is issued by Verisign you only need to check the client certificate signature with Verisign PUBLIC key, which is is included in the certificate. That's why truststoreFile should not contain private keys. In fact, openSSL has something similar to truststoreFile ehich contains CA certificates (only certificates).

Any other comments?

Regards.

----- Original Message ----- From: "Martin Gainty" <[EMAIL PROTECTED]> To: "Tomcat Users List" <users@tomcat.apache.org>; "Víctor Torres - UPF" <[EMAIL PROTECTED]>
Sent: Tuesday, October 24, 2006 8:25 PM
Subject: Re: problem with truststoreFile in server.xml


Which other algorithm do you suggest to uniquely identify the cert contained within the keystore?
a sequence number?
a reference to an object?

The key (which is tied to the cert) uniquely identifies that particular cert in your keystore file

Saludos Cordiales!
M-
This e-mail communication and any attachments may contain confidential and privileged information for the use of the designated recipients named above. If you are not the intended recipient, you are hereby notified that you have received this communication in error and that any review, disclosure, dissemination, distribution or copying of it or its
contents
----- Original Message ----- From: "Víctor Torres - UPF" <[EMAIL PROTECTED]> To: "Tomcat Users List" <users@tomcat.apache.org>; "Martin Gainty" <[EMAIL PROTECTED]>
Sent: Tuesday, October 24, 2006 11:55 AM
Subject: Re: problem with truststoreFile in server.xml


Thanks, but this does not solve my problem.
What I can see in your directions is that you are using JKS keystore and you
are importing the certificate and the private key.
What I was saying is that it should NOT be necessary to import the private keys into a truststoreFile. In fact, when I use as truststoreFile a PKCS12 with the certificate and private key it works. It fails when the PKCS12 only
contains the certificate. This seems to me strange.

Any other suggestions?


----- Original Message ----- From: "Martin Gainty" <[EMAIL PROTECTED]>
To: "Tomcat Users List" <users@tomcat.apache.org>; "Víctor Torres - UPF"
<[EMAIL PROTECTED]>
Sent: Tuesday, October 24, 2006 5:41 PM
Subject: Re: problem with truststoreFile in server.xml


Hello Victor-

you may want to follow the directions on how to create an empty keystore
and then import Import the private key/certificate chain into the java
keystore using extkeytool
http://www.switch.ch/aai/certificates/certificateupdate.html

then take a look at the keys afterwards at
keytool -v -list -keystore www.example.edu.jks

Anyone else?
M--
This e-mail communication and any attachments may contain confidential and
privileged information for the use of the
designated recipients named above. If you are not the intended recipient,
you are hereby notified that you have received
this communication in error and that any review, disclosure,
dissemination, distribution or copying of it or its
contents
----- Original Message ----- From: "Víctor Torres - UPF" <[EMAIL PROTECTED]>
To: <users@tomcat.apache.org>
Sent: Tuesday, October 24, 2006 9:14 AM
Subject: problem with truststoreFile in server.xml


Dear all,

I have configured my Tomcat 5.5.17 to require SSL client authentication.
For
this purpose, I have stored my root CA certificate into a PKCS12 keystore
which I use as truststoreFile by configuring server.xml. This CA
certificate
is used to sign user certificates that I want to be trusted.

The problem I have is the following:
- truststoreFile (PKCS12) contains root CA certificate + private key ->
everything works perfectly.
- truststoreFile (PKCS12) contains root CA certificate -> clients cannot
connect.

truststoreFile should not contain private keys, so why does Tomcat behave
in
this way?

Thanks in advance.






---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]




---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]


Attachment: keystore.p12
Description: application/pkcs12

Bag Attributes
   localKeyID: C0 36 19 07 AD C4 88 97 A8 5E 72 6F 6B 09 EB E5 E6 F1 29 5C
   friendlyName: AXMEDIS AXCS CA
subject=/O=AXMEDIS/OU=AXMEDIS AXCS CA/C=ES/CN=AXMEDIS AXCS CA/emailAddress=axmed
[EMAIL PROTECTED]
issuer=/O=AXMEDIS/OU=AXMEDIS AXCS CA/C=ES/CN=AXMEDIS AXCS CA/emailAddress=axmedi
[EMAIL PROTECTED]
-----BEGIN CERTIFICATE-----
MIIClDCCAf2gAwIBAgIBATANBgkqhkiG9w0BAQUFADB3MRAwDgYDVQQKEwdBWE1F
RElTMRgwFgYDVQQLEw9BWE1FRElTIEFYQ1MgQ0ExCzAJBgNVBAYTAkVTMRgwFgYD
VQQDEw9BWE1FRElTIEFYQ1MgQ0ExIjAgBgkqhkiG9w0BCQEWE2F4bWVkaXNAYXht
ZWRpcy5vcmcwHhcNMDYwMTI1MTcwMjA0WhcNMTIwOTIwMTcwMjA0WjB3MRAwDgYD
VQQKEwdBWE1FRElTMRgwFgYDVQQLEw9BWE1FRElTIEFYQ1MgQ0ExCzAJBgNVBAYT
AkVTMRgwFgYDVQQDEw9BWE1FRElTIEFYQ1MgQ0ExIjAgBgkqhkiG9w0BCQEWE2F4
bWVkaXNAYXhtZWRpcy5vcmcwgZ0wDQYJKoZIhvcNAQEBBQADgYsAMIGHAoGBALJZ
0tbmJ6doyUvjYWTC2fx52XqrklMUDlvxd1EZdzHW91QNJQnnuf/uCnCm4m1W6S0u
3X+Fq6hWALaQifNfa9vzwpjgWEJTXZ8GTmsDkct9MG4KLSDE37TntJqWQL3qJsEK
1pw/BQB84lE87kTP4BmY5itsNjfT/AORB5sm7jbVAgERozIwMDAdBgNVHQ4EFgQU
wDYZB63EiJeoXnJvawnr5ebxKVwwDwYDVR0TBAgwBgEB/wIBADANBgkqhkiG9w0B
AQUFAAOBgQCStM4x3dMb8l0O0Z8roTpqBey4ushaQkxbNf+tcOom0O45bqXz8MrI
7nLGicp6GadZDmVVhzYZXXB8EWOLKJ8aXhnKrnk9KQ4vnOR3CURF41ZKA/jAKwNN
+wbbHiJ/5GUcjWEFQcpdXqt6n27GkY8w3vyqDO7J6GsgxwdOLH0Wow==
-----END CERTIFICATE-----
Bag Attributes
   friendlyName: Other cert
   friendlyName: Other cert
   localKeyID: F2 FF F4 87 F1 56 0F B7 3A 6E 5F 6D 49 0E 0B 5C 64 79 FF 5D
subject=/O=AXMEDIS/CN=ITO_17eae211-5710-35fb-8f1d-ce160de3e98a
issuer=/O=AXMEDIS/OU=AXMEDIS AXCS CA/C=ES/CN=AXMEDIS AXCS CA/emailAddress=axmedi
[EMAIL PROTECTED]
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to