Hi Christopher,

Thanks for your elaborated reply.

Regarding your first question: 

No, i don't use the APR connector (port #443 i assume) & the tomcat-native
jar. I do use the plain old HTTP connector in server.xml.

So my only wish is to know what to write in those two attributes:
keystoreFile - Which of the 4 files i have do i need to point to (my guess
is the xxx.domainname.com.key )?
keystorePass - What do i write in this attribute? When i issue my own
certificate (using keytool) it was the password i used creating the
certificate itself.

I googled this & came across many sites. All explained the steps to initiate
a request & import the certificate, BUT i think that i'm over those steps
due to the fact that i have the .cer file at hand & all that is rest to do
is to configure the connector.

Thanks.


Christopher Schultz-2 wrote:
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Liav,
> 
> On 11/13/2009 10:48 AM, Liav Ezer wrote:
>> I need help configuring my http connector to be a secure one via SSL.
> 
> Are you expecting to use tcnative in order to use an "APR" connector, or
> do you want to use the plain-old Java HTTP connector? If you don't know
> what I'm talking about, you want the Java one. It's important to
> differentiate because the configurations are done differently.
> 
>> I have the purchased certificate's (from a CA which i don't know who is)
>> products in 4 different files:
>> 
>> xxx.domainname.com.cer   -> I don't know what is this file..
> 
> Neither do I. Look at the date stamps to see if it's relevant.
> 
>> xxx.domainname.com.key   -> I believe this is the encrypted key for the
>> certificate 
> 
> Hopefully, you created this file yourself and haven't given it to
> anyone. It should be a /private/ RSA key.
> 
>> xxx.domainname.com.csr   -> I believe this is the request
> 
> .csr files are typically "certificate request" files, so yet, that seems
> reasonable.
> 
>> xxx.domainname.com.crt   -> I believe this is the actual certificate
>> issed
>> by the CA
> 
> Generally, .crt files are the actual certificates. They are usually
> encrypted with a passphrase and can be unlocked using the .key file above.
> 
>> 1. What should i write at the keystoreFile? - Which of the 4 files i have
>> do
>> i need to point to?
>> 2. What do i write in the keystorePass attribute?
> 
> That depends on whether you are using APR or not. See above.
> 
>> 3. What should i do with the rest of those 4 files?
> 
> xxx.domainname.com.key - keep this in a safe place, preferably /not/ on
> your production server.
> 
> xxx.domainname.com.csr - You can probably discard this file, but it
> might be worth keeping around alongside your .key file.
> 
> xxx.domainname.com.cer - It depends on what this file is. It might even
> be a certificate file that has no password (which would be useful if you
> were using Apache httpd, but you didn't mention that so I suspect it's
> not useful to have such a certificate laying around).
> 
> - -chris
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.10 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
> 
> iEYEARECAAYFAkr9tQwACgkQ9CaO5/Lv0PBsYwCguvk35Bo0kLXB1UYrYr2iIAX7
> JKYAnjViDJDfcUrz4BeYnr351+v4i8us
> =BPyj
> -----END PGP SIGNATURE-----
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 
> 
> 

-- 
View this message in context: 
http://old.nabble.com/SSL-Configuration-Question-tp26338693p26343682.html
Sent from the Tomcat - User mailing list archive at Nabble.com.


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to