Thanks Glen. Yes it works with the default provider. tstclnt fails
with the error Issuer certificate is invalid.

When I used with option -o (Override bad server cert), it works fine.
The certificate wes used is a Self signed certificate. So, probably
tstclnt didn't like it.

One more thing is, OpenSSL based c client is able to communicate with
server successfully.

Thanks,
Sreedhar

On Apr 2, 4:52 pm, Glen Beasley <glen.beas...@sun.com> wrote:
> hi,
>
> can you successfully  connect  to your server using JSSE  with it's
> default provider? meaning
> not using mozilla-JSS as the provider?
>
> I know you have used ssltap can you use NSS tool tstclnt?
>
> tstclnt -h <hostname> -p <port> -d <your nss cert db dir> -v -2 -3 -c v
>
> If you want full client auth specify your cert nickname with -n <your
> cert nickname>
>
> If the JSSE works with the default provider, and tstclnt works  then  open
> a bug on JSS with steps to recreate issue.
>
> -glen
>
>
>
> ksreedha...@gmail.com wrote:
> > Thanks Nelson for the reply.
>
> > Jss version is 4.2.5
> > JRE version is 1.6
> > NSS vesion is 3.11.4
>
> > See my comments inline.
> > On Apr 1, 8:45 pm, Nelson B Bolyard <nel...@bolyard.me> wrote:
>
> >> ksreedha...@gmail.com wrote, On 2009-04-01 17:54:
>
> >>> Hello,
>
> >>> I am [using] Mozilla-JSS as the provider in my Java application which
> >>> is a SSL client connecting to OpenSSL based SSL Server.
>
> >> You haven't reported version information, such as:
> >> - version of JDK/JRE
> >> - version of JSS
> >> - version of NSS
> >> It's possible that you have a version mismatch of some sort.
>
> >>> I am using the cipher suite "TLS_RSA_WITH_AES_128_CBC_SHA" and we are
> >>> using TLSv1.0 as the SSL protocol.
>
> >>> I get this exception when I try to connect to the server. Server has a
> >>> self signed RSA based certificate.
>
> >> I have rearranged the stack below, so that it appears as one continuous
> >> stack, with the first (or "root cause") exception at the top.
>
> >>> I thought premaster secret key is generated by the Client and encrypt
> >>> using the public key of the certificate so that Server will decrypt using
> >>> its private key.
>
> >> That's correct for the cipher suite "TLS_RSA_WITH_AES_128_CBC_SHA".
>
> >>> Can some one tell me what I am missing here and what this exception
> >>> means?
>
> >> The first exception reported in this stack, namely:
>
> >>> java.security.InvalidKeyException: Invalid key type: 
> >>> org.mozilla.jss.pkcs11.PK11RSAPublicKey
>
> >> says that the failure occurred when trying to encrypt the pre-master secret
> >> with the RSA public key.  The exception reports that the key it was given 
> >> as
> >> the pre-master secret, to be encrypted with the server's RSA public key, 
> >> was
> >> actually not a pre-master secret, but rather was an RSA public key.
>
> > But the premaster secret key is generated internally right?
>
> >> The code that threw the first exception may be seen at
>
> >>>http://bonsai.mozilla.org/cvsblame.cgi?file=mozilla/security/jss/org/...
> >>>  at org.mozilla.jss.provider.javax.crypto.JSSCipherSpi.importKey 
> >>> (JSSCipherSpi.java:123)
> >>>  at org.mozilla.jss.provider.javax.crypto.JSSCipherSpi.engineInit 
> >>> (JSSCipherSpi.java:161)
> >>>  at org.mozilla.jss.provider.javax.crypto.JSSCipherSpi.engineInit 
> >>> (JSSCipherSpi.java:270)
> >>>  at javax.crypto.Cipher.init(DashoA13*..)
> >>>  at com.sun.net.ssl.internal.ssl.JCE_RSACipher.encryptInit 
> >>> (RSACipher.java:76)
> >>>  at com.sun.net.ssl.internal.ssl.PreMasterSecret.<init> 
> >>> (PreMasterSecret.java:83)
>
> >> Consequently, it was unable to create an RSA-encrypted pre-master secret
> >> (also know as the "RSA pre-master secret"), and this is what the second
> >> exception is complaining about.
>
> >>> (which caused) javax.net.ssl.SSLKeyException: RSA premaster secret error
> >>>  at com.sun.net.ssl.internal.ssl.PreMasterSecret.<init> 
> >>> (PreMasterSecret.java:86)
> >>>  at com.sun.net.ssl.internal.ssl.ClientHandshaker.serverHelloDone 
> >>> (ClientHandshaker.java:439)
> >>>  at com.sun.net.ssl.internal.ssl.ClientHandshaker.processMessage 
> >>> (ClientHandshaker.java:132)
> >>>  at com.sun.net.ssl.internal.ssl.Handshaker.process_record 
> >>> (Handshaker.java:334)
> >>>  at com.sun.net.ssl.internal.ssl.SSLSocketImpl.readRecord 
> >>> (SSLSocketImpl.java:805)
> >>>  at com.sun.net.ssl.internal.ssl.SSLSocketImpl.performInitialHandshake 
> >>> (SSLSocketImpl.java:1046)
> >>>  at com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake 
> >>> (SSLSocketImpl.java:1059)
> >>>  at com.fhp.ems.main.TestSecurity_SSL.testSSL (TestSecurity_SSL.java:218)
> >>>  at com.fhp.ems.main.TestSecurity_SSL.main (TestSecurity_SSL.java:69)
>
> >> Maybe Glen can tell us more about diagnosing this failure.
>
>
>
>  smime.p7s
> 6KViewDownload- Hide quoted text -
>
> - Show quoted text -

-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to