Jason, You are right on target with what we discovered this afternoon. We are switching over to Apache HTTP Server. The jks file is what is currently being used in our prod environment. I'm playing around with QAS, which will be promoted to Prod later. Sorry for not clarifying earlier.
After following a similar path to what you have noted below, we learned that the ca-bundle.crt referenced by the SSLCertificateChainFile directive was bad. We had to download a new one from Thawte. That fixed the problem! I still think the Keystore Explorer is cool as dirt, much easier to look at than the cmd. :) Many thanks for the assistance! Scott From: Action Request System discussion list(ARSList) [mailto:[email protected]] On Behalf Of Jason Miller Sent: Thursday, January 31, 2013 2:58 PM To: [email protected] Subject: Re: Certificate Assistance ** I will admit that I am not a crypt/SSL/ketytool/OpenSSL expert however I am starting to get comfortable with it. Here is my take and my understanding of what can be done. The p12 keystore could be renamed to use a .pfx extensions (used in the MS world). You can either rename your Thawte keystore to .pfx or since they are more or less interchangeable according to my understanding you should be able to just import the .p12 keystore into your TC keystore. I have the following instructions I use (using Window directory syntax but the keytool command is the same just switch \ to /): Import pfx keystore into Tomcat Keystore o keytool.exe -importkeystore -srckeystore D:\Thawte.pfx -srcstoretype pkcs12 -destkeystore D:\TomcatKeystore -deststoretype jks In our usage this takes a .pfx file we exported from the Window Server using the Certificates MMC snap-in and imports the whole keystore. The .pfx keystore includes the server cert and root certs in to the TC keystore. I don't remember if I have tried using KeyStore Explorer to import a keystore into a keystore. I am pretty sure I have but I know the command line works. One point of clarification... When you say "Apache" are you talking about Apache Tomcat or Apache HTTP server? The instructions I gave were assuming you were talking about Tomcat since you mentioned Mid Tier. Looking that the error you posted and re-reading the thread I noticed you don't specify Tomcat and the error you posted looks like an Apache HTTP error. We have not had much success using Java keystores with Apache HTTP server. In our Apache httpd-ssl.conf we point: * SSLCertificateFile to the server's .crt file * SSLCertificateKeyFile to the servers .pem (private key) file * SSLCertificateChainFile to the intermediate .crt file HTH, Jason On Thu, Jan 31, 2013 at 8:04 AM, Myers, Scott <[email protected]<mailto:[email protected]>> wrote: ** Shazaam! That is a cool tool. It's a heck of a lot more readable than all that command line stuff. Thanks, Jason! I added the Thawte cert into the jks myself. Since sending this email, I have found that when I export that cert or convert it from the p12 version from Thawte, it drops the CA root. It only gives me the domain....*.domain.com<http://domain.com>. I used your tool to create a full chain and apply it to Apache's SSL. One of two things happens: 1) I continue to get the warning on the site or 2) Apache won't start b/c it doesn't like the crt I added. When Apache won't start, I see an error in the log: [Thu Jan 31 10:59:04 2013] [error] Unable to configure verify locations for client authentication Still working on that one. Thanks again for the help and the tool! From: Action Request System discussion list(ARSList) [mailto:[email protected]<mailto:[email protected]>] On Behalf Of Jason Miller Sent: Wednesday, January 30, 2013 5:20 PM To: [email protected]<mailto:[email protected]> Subject: Re: Certificate Assistance ** Just to make sure I am following you... Thawte sent you a jks keystore file with the cert and chain in it? If this is the case can you just replace the Tomcat keystore with this keystore? They are both Java keystores correct? You *may* have to change the Thawte keystore password to changeme, I have encountered some versions of TC that require that specific keystore password and others that allow you to specify the password in the config. Either way I'll mention a cool free tool that adds a GUI to many aspects of cert/keystore management. KeyStore Explorer is free (unfortunately not currently being developed): http://www.lazgosoftware.com/kse/index.html I found this tool after figuring out the process of requesting/exporting a cert and chain from an internal MS CA, converting it and importing into the TC keystore using OpenSSL and keytool. Just for fun and to test the tool I downloaded KeyStore Explorer and created a brand new TC keystore with the MS CA certs/chain in a matter of clicks. Jason On Wed, Jan 30, 2013 at 8:13 AM, Myers, Scott <[email protected]<mailto:[email protected]>> wrote: ** Hi all, I am trying to apply a certificate from Thawte to a Mid-Tier. The cert I have used is a wildcard that is currently in a jks file. When I export the crt from the jks, it is losing the chain. That flags as a warning on the website as "The site's security certificate is not trusted." I'm using a Linux Red Hat op system and have tried various methods of openssl and keytool apps. Any suggestions? Scott This email is subject to certain disclaimers, which may be reviewed via the following link. http://compass-usa.com/Pages/Disclaimer.aspx _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ This email is subject to certain disclaimers, which may be reviewed via the following link. http://compass-usa.com/Pages/Disclaimer.aspx _ARSlist: "Where the Answers Are" and have been for 20 years_ _ARSlist: "Where the Answers Are" and have been for 20 years_ This email is subject to certain disclaimers, which may be reviewed via the following link. http://compass-usa.com/Pages/Disclaimer.aspx _______________________________________________________________________________ UNSUBSCRIBE or access ARSlist Archives at www.arslist.org "Where the Answers Are, and have been for 20 years"

