jetty - ssl with parameters NeedClientAuth/WantClientAuth set to true fails with javax.net.ssl.SSLHandshakeException: null cert chain / -
I have the XML file
& lt; Call name = "add connector" & gt; Is configured as. ; & Lt; Arg & gt; & Lt; New orbit = "org.mortbay.jetty.security.SslSelectChannelConnector" & gt; & Lt; Set name = "host" & gt; & Lt; SystemProperty default = "0.0.0.0" name = "https.host" & gt; & Lt; / SystemProperty & gt; & Lt; / Set & gt; & Lt; Set name = "port" & gt; & Lt; System Property Default = "0" name = "https.port" & gt; & Lt; / SystemProperty & gt; & Lt; / Set & gt; & Lt; Set name = "max idle time" & gt; 60000 & lt; / Set & gt; & Lt; Set name = "acceptor" & gt; 5 & lt; / Set & gt; & Lt; Set Name = "AcceptQueueSize" & gt; 100 & lt; / Set & gt; & Lt; Set name = "stats" & gt; True & lt; / Set & gt; & Lt; Set name = "keystore" & gt; & Lt; Systemproperty = "." Name = "java.config" & gt; & Lt; / SystemProperty & gt; /mykeystore.keystore< / Set & gt; & Lt; Set Name = "Keyword" & gt; Password & lt; / Set & gt; & Lt; Set name = "password" & gt; Password & lt; / Set & gt; & Lt; Set name = "NeedClientAuth" & gt; True & lt; / Set & gt; & Lt; Set name = "WantClientAuth" & gt; True & lt; / Set & gt; & Lt; / New & gt; & Lt; / Arg> & Lt; / Call & gt; When NeedClientAuth is set to false, I am able to open
When TrueClientAuth is set as shown in the above parameters, then this error Fails with
259424 2014-04-23 12: 02: 23,881 [825245763 @ qtp-1957835280-3] Warning org.mortbay.log - javax.net .ssl.SSL Handshake Exception: Faucet Proof Series 260138 2014 -04-23 12: 02: 24,521 [825245763 @ qtp-1957835280-3] Warning org.mortbay.log - javax.net.ssl.SSLHandshakeException: Faucet Certificate Series 260689 2014 -04-23 12: 02: 25,072 [825245763 @ Qtp-1957835280-3] Warning org.mortbay.log - javax .net.ssl.SSLProtocolException: Handshake Alert: no_certificate I have added root / intermediate / signed certificate to server keystore; I've also added root / intermediate in the client IE browser
The question is, is there any suggestion that any configuration is faulty and to make the keystore properly run and establish a signed certificate from CA Made by Keystore, Ytool -keystore serverdns.key Store -alias server -genkey -keyalg RSA -Keekies 2048
CSR key toll-creator -LIIS server -Store serverDecision.Castore-file server CSR
Signed certificate Letter ketol -import -trustcacerts -alias server -store serverdns.keystore -file signedcert.der.cer
This means that the client was unable to provide reliable certificates by your server's trust store, so the proof Scripture does not send the message. When the client requests the client certificate, it also sends a list of acceptable signatures, and the client can only send the certificate signed by that signer, or with the leading series for such a certificate.
This is usually if the customer has a self-signed certificate. In this case, you have to export the client's certificate from your keystore and import it into your server's Truststore.
& lt; Set name = "NeedClientAuth" & gt; True & lt; / Set & gt; & Lt; Set name = "WantClientAuth" & gt; True & lt; / Set & gt; It does not make sense to set them both. They are mutually exclusive if you do this, then NeedClientAuth probably takes precedence.
Comments
Post a Comment