Qingqing Ouyang wrote:
> Hi, Bill:
> 
> Thanx for the comments.  Please see the following.
> 
> 
>>> Can someone start the Tomcat server with clientAuth=false, but access
>>> a URI that is protected by CLIENT-CERT?  If yes, then I think a
>>> re-handshake is a must.
>>
>>
>>
>> But using CertificatesValve to accomplish this is the wrong way to do it.
>> Catalina has no good reason to know or care what transport the request 
>> was
>> received on.  It's the connector's job to take care of that.
>>
>> It looks like we may need another Action to handle this case (probably
>> invoked by the Realm).  Comments?
> 
> 
> Okay, that is where my ignorance kicks in. ;-)
> 
> I agree that Catalina does not have to know/care about what
> transport the request is received on.  The logical place for
> this to happen is somewhere:
> 
> 1. Tomcat has enough information to determine the incoming
>    request is intended for a Context that requires the
>    client-cert authentication
> 
> 2. Tomcat also has to have the handle on the specific
>    transport mechanism to force this second handshake with
>    the client.
> 
> 3. The certificate information also has to be populated with
>    the Request object for further authorization calls...

We can have the current certificate valve send an action to the Coyote 
layer, which would then update the appropriate attributes.
I think some new method is needed in SSLSupport.

Remy


--
To unsubscribe, e-mail:   <mailto:[EMAIL PROTECTED]>
For additional commands, e-mail: <mailto:[EMAIL PROTECTED]>

Reply via email to