Re: SSL Certificates and Tomcat 8.5.11

2018-05-17 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Laurie, On 5/17/18 11:33 AM, Laurie Miller-Cook wrote: > I am very new to Tomcat so please bear with me. Welcome. > I currently have a Thawte certificate that is installed within IIS > for our domain that is all managed by Rackspace. > > I now h

Re: SSL Certificates and Tomcat 8.5.11

2018-05-17 Thread Pierre Chiu
Hi Laurie, This is what I do. I don't use keystore. I use this within SSLHostConfig section. > On May 17, 2018, at 11:33 AM, Laurie Miller-Cook > wrote: > > Hi there, > > I am very new to Tomcat so please bear with me. > > I currently have a Thawte certificate that is installed within I

Re: SSL Certificates

2014-04-01 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Nithun, On 4/1/14, 4:02 PM, Bomma, Nithun wrote: > I want to get public & private keys from WebSphere and import into > Tomcat. > > We have WebSphere certificates (Signed by Verisign) until 2015 and we > want to use the same in tomcat. Where are t

RE: SSL Certificates

2014-04-01 Thread Bomma, Nithun
et] Sent: Monday, March 31, 2014 2:58 PM To: Tomcat Users List Subject: Re: SSL Certificates -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ninthun, On 3/31/14, 10:19 AM, Bomma, Nithun wrote: > Hello, > > We are using WebSphere v6.1 for SSO and we are moving to ForgeRock and >

Re: SSL Certificates

2014-03-31 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ninthun, On 3/31/14, 10:19 AM, Bomma, Nithun wrote: > Hello, > > We are using WebSphere v6.1 for SSO and we are moving to ForgeRock > and it uses Apache Tomcat (v7.0.37) > > We are trying to import the certificates (Verisign) including the > cha

Re: SSL Certificates

2014-03-31 Thread James H. H. Lampert
On 3/31/14 10:32 AM, Blume Wolfgang wrote: Hi, If your certificate need not be changed, then you need not create a new Certificate Signing Request (CSR) to get a new certificate, but only do the "Importing the Certificate" part of the description: Import chain certificate, then your existing cert

Re: SSL Certificates

2014-03-31 Thread Blume Wolfgang
..@gmail.com] > Sent: Monday, March 31, 2014 10:39 AM > To: Tomcat Users List > Subject: Re: SSL Certificates > > On Mon, Mar 31, 2014 at 7:19 AM, Bomma, Nithun >wrote: > > > Hello, > > > > We are using WebSphere v6.1 for SSO and we are moving to ForgeRock an

RE: SSL Certificates

2014-03-31 Thread Bomma, Nithun
ology (Operations) AIM: nithunbomma EMAIL: nithun.bo...@amtrak.com Desk: 215-349-2065; ATS: 728-2065; Cell: 215-704-4981 -Original Message- From: Leo Donahue [mailto:donahu...@gmail.com] Sent: Monday, March 31, 2014 10:39 AM To: Tomcat Users List Subject: Re: SSL Certificates On Mon, Mar 31,

Re: SSL Certificates

2014-03-31 Thread Leo Donahue
On Mon, Mar 31, 2014 at 7:19 AM, Bomma, Nithun wrote: > Hello, > > We are using WebSphere v6.1 for SSO and we are moving to ForgeRock and it > uses Apache Tomcat (v7.0.37) > > We are trying to import the certificates (Verisign) including the chain > certificates from WebSphere to Tomcat. > > Have

Re: SSL certificates

2014-01-17 Thread Ognjen Blagojevic
On 17.1.2014 19:14, James H. H. Lampert wrote: At this point, if you haven't already done so, I would strongly suggest getting your CA's tech support in on this. +1 Reserved IP addresses and internal server names are not unique on the Internet, so the certificates for them may be reused in di

Re: SSL certificates

2014-01-17 Thread James H. H. Lampert
At this point, if you haven't already done so, I would strongly suggest getting your CA's tech support in on this. Of course, your latest posts also beg the question of why you would be spending good money on a signed SSL certificate for an internal web site, or why you'd be using an internal

Re: SSL certificates

2014-01-17 Thread Miten Mehta
Hi Ognjen, Reading the pdf link you provided it seems that I should use ip based certificates and for each different ip which needs certificate I will have to request one. I should use -ext san=ip:$ip instead of -ext san=dns:$host. Then CA will not drop the details. Regards, Miten. On Fri, J

Re: SSL certificates

2014-01-17 Thread Miten Mehta
If I remove internal /etc/hosts lookup entry should it resolve or you mean CA just dropped subjectAltName even though I included. - miten On Jan 17, 2014 7:31 PM, "Ognjen Blagojevic" wrote: > Miten, > > On 17.1.2014 14:33, Miten Mehta wrote: > >> The catalina.out complaines with SSL handshake sta

Re: SSL certificates

2014-01-17 Thread Miten Mehta
What's the alternative to using subjectAltName? I thought it was flexible to make certificate portable across our development environments. Should I use IP (internal instead)? - Miten. On Jan 17, 2014 7:31 PM, "Ognjen Blagojevic" wrote: > Miten, > > On 17.1.2014 14:33, Miten Mehta wrote: > >> Th

Re: SSL certificates

2014-01-17 Thread Ognjen Blagojevic
Miten, On 17.1.2014 14:33, Miten Mehta wrote: The catalina.out complaines with SSL handshake stating No Name matching mhoodws.ril.local found. For security reasons, CA shouldn't sign any certificate containing internal server name (either as CN, or subjectAltName): "As of July 1, 2012, all

Re: SSL certificates

2014-01-17 Thread Miten Mehta
Hi James, Thanks a lot. I followed your steps but seems I am getting different error as if the signed certificate is not dns based. The original self signed certificate was able to work fine in dns based format for keytool when I imported it into client keystore. below I created the self signed

Re: SSL certificates

2014-01-16 Thread James H. H. Lampert
Christopher Schultz wrote: :) Give me OpenSSL any day of the week. ;) Dunno. Can't recall ever having any experience with it at all. Just DCM (for securing IBM-proprietary servers, like their Secured Telnet [NOT ssh] server and their various proprietary web-serving products), and Keytool (f

Re: SSL certificates

2014-01-16 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 James, On 1/16/14, 6:18 PM, James H. H. Lampert wrote: > Christopher Schultz wrote: >> That is always true. But you don't need a certificate to create a >> CSR. > If Keytool and the Java Keystore format even recognize any > difference between the c

Re: SSL certificates

2014-01-16 Thread James H. H. Lampert
Christopher Schultz wrote: That is always true. But you don't need a certificate to create a CSR. If Keytool and the Java Keystore format even recognize any difference between the concepts of "keypair" and "self-signed certificate," it would be news to me. Speaking of one who regularly ins

Re: SSL certificates

2014-01-16 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 James, On 1/16/14, 5:04 PM, James H. H. Lampert wrote: > On 1/16/14 1:49 PM, Christopher Schultz wrote: >> Why are you self-signing a certificate if you are going to get >> it signed by a CA? > > A newly-created keypair in a Java keystore is, by de

Re: SSL certificates

2014-01-16 Thread James H. H. Lampert
On 1/16/14 1:49 PM, Christopher Schultz wrote: Why are you self-signing a certificate if you are going to get it signed by a CA? A newly-created keypair in a Java keystore is, by definition, a self-signed certificate. And you can't create a CSR without having a keypair from which to create it

Re: SSL certificates

2014-01-16 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Miten, On 1/16/14, 12:09 PM, Miten Mehta wrote: > Hi, > > Adding more clarification for ease below. > > 1) create keystore.jks with self signed cert (alias tomcat). Why are you self-signing a certificate if you are going to get it signed by a CA?

Re: SSL certificates

2014-01-16 Thread James H. H. Lampert
? will existing become redundant ? NO, the SIGNED certificate will, at least in effect, be MERGED with the original certificate. Deleting the original certificate from the keystore before importing the signed one will render the signed certificate WORTHLESS. -- James H. H. Lampert ---

Re: SSL certificates

2014-01-16 Thread Ike Ikonne
Hi, Step #4 is not correct; if you delete the existing certificate you would have lost everything. Please follow the instruction given by James H. H. Lampert. Thanks, Ike From: Miten Mehta To: users@tomcat.apache.org, Date: 01/16/2014 11:09 AM Subject:Re: SSL

Re: SSL certificates

2014-01-16 Thread Miten Mehta
Hi, Adding more clarification for ease below. 1) create keystore.jks with self signed cert (alias tomcat). 2) generate old.csr and send for signing to CA 3) get back new.cer (signed certificate) and root.cer (root certificate) 4) delete existing cert from keystore.jks (alias tomcat) 5) import roo

Re: SSL certificates

2014-01-16 Thread James H. H. Lampert
On 1/16/14 9:01 AM, Miten Mehta wrote: Hi, I am understanding SSL for tomcat using http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html. 1)I create jks using self signed certificate using keytool. 2) I generate CSR from that keystore/certificate. 3) I get it signed by CA who gives me root cert