Yes. You are right. The procedure works. That was wrong is that I did no make the server host name and the client host name match in the certs and in the tomcat-user.xml file. Also I edited the ca.pem file a litte bit and changed it to ca.crt and imported this file into the browser's trusted root certificate. This is not shown in your procedure. A couple of openssl commands have modified because of the newer revision of openssl.

I have made all commands into BATCH file and I also added the subj parameter into the command. Now when you double click the BATCH file name, you do not need to key in the domain name, you can edit in the BATCH file instead. This avoids type error. Now I can make all of the commands finish in a shot as long as the hostnames and the passwords and the keystore files name and locations are defined. This may contribute to Tomcat community.

It is working with both newest Netcape and IE.

I will work on the Linux the same job and change the BATCH file into bash script file.

Thank you !

Frank Peng.


-----Original Message-----
From: Gaël Lams <[EMAIL PROTECTED]>
To: Tomcat Users List <users@tomcat.apache.org>
Sent: Mon, 19 Jun 2006 11:01:49 +0200
Subject: Re: Tomcat SSL, after clientAuth="false" worked, how to set up to "true"?

> The problem is that Microsoft Internet Explore and Netscape now are serious about the Root > Trust Authorities. ...

I'm not sure what you mean by "serious about the Root Trust
Authorities" but I tested the ssl client authentication on several
computers, both inside and outside our LAN with both Internet Explorer
6 and Firefox 1.0.x and it works for me. If you don't use a trusted
certificate, the "only practical" issue (see my PS for a security
issue) is that the user trying to connect to that web site will be
prompted by a message saying that the certificate does not come from a
trusted root, and asking you whether you want to have a look at the
information provided with the certificate and whether you want to
accept it.

Regards,

Gaël

PS: when you use self-signed certificates, there is also a security
risk, i.e the risk of what it called a man-in-the-middle attack : an
attacker could send the client his own self-signed certificate which
has the same name as that in the server's self-signed certificate. The
attacker then connects to the real server himself. When the client
sends data to the server the attacker reads it and then sends it along
to the real server.

---------------------------------------------------------------------
To start a new topic, e-mail: users@tomcat.apache.org
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to