Name: gm110360 Date: 04/29/2004
FULL PRODUCT VERSION :
Java HotSpot(TM) Server VM (build 1.4.2-b28, mixed mode)
ADDITIONAL OS VERSION INFORMATION :
Linux 2.4.20
and/or Windows XP
EXTRA RELEVANT SYSTEM CONFIGURATION :
SSL is managed by Apache 1.3.29 and mod_ssl 2.8.16
A DESCRIPTION OF THE PROBLEM :
When I try launching an applet via http, it works.
Now, I try launching this applet via https, it works,
BUT, if the web server (Apache) configure a client authentication (SSLVerifyClient 2), and I import my certificate PKCS12 (public certificate + private key) in the keystore of Control Panel (in secure sites), IT DOESN'T WORK ...
the Exception is :
java.lang.ClassNotFoundException: AppletTest.class
...
Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
However, if I test a handshake with a standalone http client (before I import my pkcs12 certificate in cacerts), it works...
My tests are under Linux and Mozilla,
but they are equals under Windows XP and Internet Explorer.
However, in Windows, if I put
-Djavax.net.ssl.keyStore=d:\temp\myKey.p12 -Djava.net.ssl.keyStorePassword=myPass -Djavax.net.ssl.keyStoreType=PKCS12
in the java runtime parameters, it works since jre 1.4.1_03 (but not before).
Under Linux, this doesn't work with jre 1.4.2 :-(
I wonder me if the problem can be that the trustore (~/.java/deployment/security/deployment.jssecerts) have no password ...
STEPS TO FOLLOW TO REPRODUCE THE PROBLEM :
The steps :
1) in Apache, virtual host of your site, precise a client authentication :
SSLVerifyClient 2
SSLVerifyDepth 10
2) import the certificate PKCS12 in the Control Panel (secure site)
3) in the control panel, precise the desired java runtime (JRE 1.4.2 in ...)
4) open the browser and enter the url (https://your_virtual_host/test.html)
with test.html which contains the applet tag and your applet
EXPECTED VERSUS ACTUAL BEHAVIOR :
EXPECTED -
the Expected Result : the applet is launched and you can see it in the page.
ACTUAL -
the Actual Result : no applet.
ERROR MESSAGES/STACK TRACES THAT OCCUR :
Error Message :
...
] stop on trusted cert: [
[
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@3e
Validity: [From: Mon Jan 29 01:00:00 CET 1996,
To: Wed Aug 02 01:59:59 CEST 2028]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US
SerialNumber: [ 70bae41d 10d92934 b638ca7b 03ccbabf]
]
Algorithm: [MD2withRSA]
Signature:
0000: BB 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A .L.+.,&.O.......
0010: 11 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 ....(.g./.......
0020: 95 BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E ....l,.Q.s...S.N
0030: D6 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 .&.v.W..^!......
0040: 21 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C !X.i..D...D9.\..
0050: 00 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D ..V......EL....=
0060: F0 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F .2.......Q..b...
0070: C0 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ...r..6:k.N..d.d
] Thread-3, READ: SSLv3 Handshake, length = 119 *** CertificateRequest Cert
Types: RSA, DSS, Cert Authorities: <EMAILADDRESS=###@###.###,
CN=sysadmin.prs, O=CVF, L=Paris, C=FR> *** ServerHelloDone Thread-3, SEND
SSLv3 ALERT: warning, description = no_certificate Thread-3, WRITE: SSLv3
Alert, length = 2 JsseJCE: Using JSSE internal implementation for cipher
RSA/ECB/PKCS1Padding *** ClientKeyExchange, RSA PreMasterSecret, SSLv3
Random Secret: { 3, 0, 27, 62, 242, 15, 0, 105, 157, 248, 42, 60, 13, 127,
171, 37, 163, 159, 39, 39, 89, 47, 48, 211, 194, 72, 74, 39, 194, 62, 152,
115, 86, 106, 99, 245, 202, 251, 171, 174, 201, 222, 134, 177, 229, 113,
200, 160 } Thread-3, WRITE: SSLv3 Handshake, length = 132 SESSION KEYGEN:
PreMaster Secret: 0000: 03 00 1B 3E F2 0F 00 69 9D F8 2A 3C 0D 7F AB 25
...>...i..*<...% 0010: A3 9F 27 27 59 2F 30 D3 C2 48 4A 27 C2 3E 98 73
..''Y/0..HJ'.>.s 0020: 56 6A 63 F5 CA FB AB AE C9 DE 86 B1 E5 71 C8 A0
Vjc..........q.. CONNECTION KEYGEN: Client Nonce: 0000: 40 06 B2 0F 2E 36 8B
42 9F CF 3B D7 06 F0 39 8A @....6.B..;...9. 0010: BE 6C 20 5C E3 62 CD 18
EF 43 2F 3C 83 5B 10 BA .l \.b...C/<.[.. Server Nonce: 0000: 40 06 B2 87 7E
C2 4A 3C 4A 6D 3F 92 97 64 CE F7 @.....J<Jm?..d.. 0010: FD 61 5B 15 9C 3E
ED 21 74 FD 01 C3 66 D8 F3 C5 .a[..>.!t...f... Master Secret: 0000: 83 F6
57 95 D9 1E A5 29 24 9B 51 3F 47 28 B2 5C ..W....)$.Q?G(.\ 0010: B9 8E 08
A4 0D DE FD 90 86 E3 FF 90 C1 4F 40 2E .............O@. 0020: 10 88 1B A3
0A 40 B8 20 68 71 79 5C 84 37 99 6D .....@. hqy\.7.m Client MAC write
Secret: 0000: 27 65 70 02 0B AD 01 D5 FC 4F C5 E0 E1 C2 2A BA
'ep......O....*. Server MAC write Secret: 0000: 7A 11 C8 D0 0A EB 20 FD A9
F4 56 9D F7 3D A2 D2 z..... ...V..=.. Client write key: 0000: 8C 63 F3 67
82 DC 4C 5B 16 4C 62 2B CC 63 7D F0 .c.g..L[.Lb+.c.. Server write key:
0000: 13 54 CB DD DD 8F A2 84 BA 5F 80 B7 76 D4 53 69 .T......._..v.Si
... no IV for cipher Thread-3, WRITE: SSLv3 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher RC4 *** Finished
verify_data: { 97, 235, 127, 136, 219, 97, 12, 80, 247, 104, 255, 148, 122,
168, 69, 216, 1, 101, 229, 104, 247, 164, 182, 174, 253, 145, 166, 166, 213,
184, 191, 94, 155, 188, 19, 73 } *** Thread-3, WRITE: SSLv3 Handshake,
length = 56 Thread-3, READ: SSLv3 Alert, length = 2 Thread-3, RECV SSLv3
ALERT: fatal, handshake_failure Thread-3, called closeSocket() Thread-3,
handling exception: javax.net.ssl.SSLHandshakeException: Received fatal
alert: handshake_failure charger : classe AppletTest.class introuvable.
java.lang.ClassNotFoundException: AppletTest.class at
sun.applet.AppletClassLoader.findClass(AppletClassLoader.java:153) at
sun.plugin.security.PluginClassLoader.findClass(PluginClassLoader.java:168)
at java.lang.ClassLoader.loadClass(ClassLoader.java:299) at
sun.applet.AppletClassLoader.loadClass(AppletClassLoader.java:114) at
java.lang.ClassLoader.loadClass(ClassLoader.java:255) at
sun.applet.AppletClassLoader.loadCode(AppletClassLoader.java:506) at
sun.applet.AppletPanel.createApplet(AppletPanel.java:566) at
sun.plugin.AppletViewer.createApplet(AppletViewer.java:1775) at
sun.applet.AppletPanel.runLoader(AppletPanel.java:495) at
sun.applet.AppletPanel.run(AppletPanel.java:292) at
java.lang.Thread.run(Thread.java:536) Caused by:
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.a(DashoA6275) at
com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.b(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.b(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(DashoA6275) at
sun.net.www.protocol.https.HttpsClient.afterConnect(DashoA6275) at
sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.setNewClient(D
ashoA6275) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.superConnect(Plu
ginDelegateHttpsURLConnection.java:292) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.access$000(Plugi
nDelegateHttpsURLConnection.java:42) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection$1.run(PluginDele
gateHttpsURLConnection.java:112) at
java.security.AccessController.doPrivileged(Native Method) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.connect(PluginDe
legateHttpsURLConnection.java:107) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.getInputStream(P
luginDelegateHttpsURLConnection.java:306) at
java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:238) at
sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(DashoA6275
) at sun.applet.AppletClassLoader.getBytes(AppletClassLoader.java:250) at
sun.applet.AppletClassLoader.access$100(AppletClassLoader.java:42) at
sun.applet.AppletClassLoader$1.run(AppletClassLoader.java:143) at
java.security.AccessController.doPrivileged(Native Method) at
sun.applet.AppletClassLoader.findClass(AppletClassLoader.java:140) ... 10
more Finalizer, called close() Finalizer, called closeInternal(true)
REPRODUCIBILITY :
This bug can be reproduced always.
---------- BEGIN SOURCE ----------
create a file test.html with the applet tag which references this :
import java.util.*;
import java.applet.Applet;
import java.awt.*;
import javax.swing.*;
public class AppletTest extends Applet
{
private Font _textFont;
private Color _textColor;
public AppletTest()
{
}
public void init()
{
int background = Integer.parseInt(getParameter("BACKGROUND"), 16);
setBackground(new Color(background));
Font _textFont = new Font("Helvetica", Font.PLAIN, 10);
int textColor = Integer.parseInt(getParameter("TEXTCOLOR"), 16);
_textColor = new Color(textColor);
}
public void start()
{
}
public void stop()
{
}
public void paint(Graphics g)
{
g.setFont(_textFont);
g.setColor(_textColor);
g.drawString ("Ouverture du lecteur, veuillez patienter ...", 5, 15);
}
}
To import my certificate PKCS12 in cacerts (JKS), I use the tool keymove described here :
http://forums.java.sun.com/thread.jsp?forum=2&thread=4210
---------- END SOURCE ----------
CUSTOMER SUBMITTED WORKAROUND :
Workaround (under Windows XP):
put :
-Djavax.net.ssl.keyStore=d:\temp\myKey.p12 -Djava.net.ssl.keyStorePassword=myPass -Djavax.net.ssl.keyStoreType=PKCS12
in the java runtime parameters on the Control Panel
(Incident Review ID: 236996)
======================================================================
FULL PRODUCT VERSION :
Java HotSpot(TM) Server VM (build 1.4.2-b28, mixed mode)
ADDITIONAL OS VERSION INFORMATION :
Linux 2.4.20
and/or Windows XP
EXTRA RELEVANT SYSTEM CONFIGURATION :
SSL is managed by Apache 1.3.29 and mod_ssl 2.8.16
A DESCRIPTION OF THE PROBLEM :
When I try launching an applet via http, it works.
Now, I try launching this applet via https, it works,
BUT, if the web server (Apache) configure a client authentication (SSLVerifyClient 2), and I import my certificate PKCS12 (public certificate + private key) in the keystore of Control Panel (in secure sites), IT DOESN'T WORK ...
the Exception is :
java.lang.ClassNotFoundException: AppletTest.class
...
Caused by: javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
However, if I test a handshake with a standalone http client (before I import my pkcs12 certificate in cacerts), it works...
My tests are under Linux and Mozilla,
but they are equals under Windows XP and Internet Explorer.
However, in Windows, if I put
-Djavax.net.ssl.keyStore=d:\temp\myKey.p12 -Djava.net.ssl.keyStorePassword=myPass -Djavax.net.ssl.keyStoreType=PKCS12
in the java runtime parameters, it works since jre 1.4.1_03 (but not before).
Under Linux, this doesn't work with jre 1.4.2 :-(
I wonder me if the problem can be that the trustore (~/.java/deployment/security/deployment.jssecerts) have no password ...
STEPS TO FOLLOW TO REPRODUCE THE PROBLEM :
The steps :
1) in Apache, virtual host of your site, precise a client authentication :
SSLVerifyClient 2
SSLVerifyDepth 10
2) import the certificate PKCS12 in the Control Panel (secure site)
3) in the control panel, precise the desired java runtime (JRE 1.4.2 in ...)
4) open the browser and enter the url (https://your_virtual_host/test.html)
with test.html which contains the applet tag and your applet
EXPECTED VERSUS ACTUAL BEHAVIOR :
EXPECTED -
the Expected Result : the applet is launched and you can see it in the page.
ACTUAL -
the Actual Result : no applet.
ERROR MESSAGES/STACK TRACES THAT OCCUR :
Error Message :
...
] stop on trusted cert: [
[
Version: V1
Subject: OU=Class 3 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US
Signature Algorithm: MD2withRSA, OID = 1.2.840.113549.1.1.2
Key: com.sun.net.ssl.internal.ssl.JSA_RSAPublicKey@3e
Validity: [From: Mon Jan 29 01:00:00 CET 1996,
To: Wed Aug 02 01:59:59 CEST 2028]
Issuer: OU=Class 3 Public Primary Certification Authority, O="VeriSign,
Inc.", C=US
SerialNumber: [ 70bae41d 10d92934 b638ca7b 03ccbabf]
]
Algorithm: [MD2withRSA]
Signature:
0000: BB 4C 12 2B CF 2C 26 00 4F 14 13 DD A6 FB FC 0A .L.+.,&.O.......
0010: 11 84 8C F3 28 1C 67 92 2F 7C B6 C5 FA DF F0 E8 ....(.g./.......
0020: 95 BC 1D 8F 6C 2C A8 51 CC 73 D8 A4 C0 53 F0 4E ....l,.Q.s...S.N
0030: D6 26 C0 76 01 57 81 92 5E 21 F1 D1 B1 FF E7 D0 .&.v.W..^!......
0040: 21 58 CD 69 17 E3 44 1C 9C 19 44 39 89 5C DC 9C !X.i..D...D9.\..
0050: 00 0F 56 8D 02 99 ED A2 90 45 4C E4 BB 10 A4 3D ..V......EL....=
0060: F0 32 03 0E F1 CE F8 E8 C9 51 8C E6 62 9F E6 9F .2.......Q..b...
0070: C0 7D B7 72 9C C9 36 3A 6B 9F 4E A8 FF 64 0D 64 ...r..6:k.N..d.d
] Thread-3, READ: SSLv3 Handshake, length = 119 *** CertificateRequest Cert
Types: RSA, DSS, Cert Authorities: <EMAILADDRESS=###@###.###,
CN=sysadmin.prs, O=CVF, L=Paris, C=FR> *** ServerHelloDone Thread-3, SEND
SSLv3 ALERT: warning, description = no_certificate Thread-3, WRITE: SSLv3
Alert, length = 2 JsseJCE: Using JSSE internal implementation for cipher
RSA/ECB/PKCS1Padding *** ClientKeyExchange, RSA PreMasterSecret, SSLv3
Random Secret: { 3, 0, 27, 62, 242, 15, 0, 105, 157, 248, 42, 60, 13, 127,
171, 37, 163, 159, 39, 39, 89, 47, 48, 211, 194, 72, 74, 39, 194, 62, 152,
115, 86, 106, 99, 245, 202, 251, 171, 174, 201, 222, 134, 177, 229, 113,
200, 160 } Thread-3, WRITE: SSLv3 Handshake, length = 132 SESSION KEYGEN:
PreMaster Secret: 0000: 03 00 1B 3E F2 0F 00 69 9D F8 2A 3C 0D 7F AB 25
...>...i..*<...% 0010: A3 9F 27 27 59 2F 30 D3 C2 48 4A 27 C2 3E 98 73
..''Y/0..HJ'.>.s 0020: 56 6A 63 F5 CA FB AB AE C9 DE 86 B1 E5 71 C8 A0
Vjc..........q.. CONNECTION KEYGEN: Client Nonce: 0000: 40 06 B2 0F 2E 36 8B
42 9F CF 3B D7 06 F0 39 8A @....6.B..;...9. 0010: BE 6C 20 5C E3 62 CD 18
EF 43 2F 3C 83 5B 10 BA .l \.b...C/<.[.. Server Nonce: 0000: 40 06 B2 87 7E
C2 4A 3C 4A 6D 3F 92 97 64 CE F7 @.....J<Jm?..d.. 0010: FD 61 5B 15 9C 3E
ED 21 74 FD 01 C3 66 D8 F3 C5 .a[..>.!t...f... Master Secret: 0000: 83 F6
57 95 D9 1E A5 29 24 9B 51 3F 47 28 B2 5C ..W....)$.Q?G(.\ 0010: B9 8E 08
A4 0D DE FD 90 86 E3 FF 90 C1 4F 40 2E .............O@. 0020: 10 88 1B A3
0A 40 B8 20 68 71 79 5C 84 37 99 6D .....@. hqy\.7.m Client MAC write
Secret: 0000: 27 65 70 02 0B AD 01 D5 FC 4F C5 E0 E1 C2 2A BA
'ep......O....*. Server MAC write Secret: 0000: 7A 11 C8 D0 0A EB 20 FD A9
F4 56 9D F7 3D A2 D2 z..... ...V..=.. Client write key: 0000: 8C 63 F3 67
82 DC 4C 5B 16 4C 62 2B CC 63 7D F0 .c.g..L[.Lb+.c.. Server write key:
0000: 13 54 CB DD DD 8F A2 84 BA 5F 80 B7 76 D4 53 69 .T......._..v.Si
... no IV for cipher Thread-3, WRITE: SSLv3 Change Cipher Spec, length = 1
JsseJCE: Using JSSE internal implementation for cipher RC4 *** Finished
verify_data: { 97, 235, 127, 136, 219, 97, 12, 80, 247, 104, 255, 148, 122,
168, 69, 216, 1, 101, 229, 104, 247, 164, 182, 174, 253, 145, 166, 166, 213,
184, 191, 94, 155, 188, 19, 73 } *** Thread-3, WRITE: SSLv3 Handshake,
length = 56 Thread-3, READ: SSLv3 Alert, length = 2 Thread-3, RECV SSLv3
ALERT: fatal, handshake_failure Thread-3, called closeSocket() Thread-3,
handling exception: javax.net.ssl.SSLHandshakeException: Received fatal
alert: handshake_failure charger : classe AppletTest.class introuvable.
java.lang.ClassNotFoundException: AppletTest.class at
sun.applet.AppletClassLoader.findClass(AppletClassLoader.java:153) at
sun.plugin.security.PluginClassLoader.findClass(PluginClassLoader.java:168)
at java.lang.ClassLoader.loadClass(ClassLoader.java:299) at
sun.applet.AppletClassLoader.loadClass(AppletClassLoader.java:114) at
java.lang.ClassLoader.loadClass(ClassLoader.java:255) at
sun.applet.AppletClassLoader.loadCode(AppletClassLoader.java:506) at
sun.applet.AppletPanel.createApplet(AppletPanel.java:566) at
sun.plugin.AppletViewer.createApplet(AppletViewer.java:1775) at
sun.applet.AppletPanel.runLoader(AppletPanel.java:495) at
sun.applet.AppletPanel.run(AppletPanel.java:292) at
java.lang.Thread.run(Thread.java:536) Caused by:
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
at com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.a(DashoA6275) at
com.sun.net.ssl.internal.ssl.BaseSSLSocketImpl.b(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.b(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.a(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.j(DashoA6275) at
com.sun.net.ssl.internal.ssl.SSLSocketImpl.startHandshake(DashoA6275) at
sun.net.www.protocol.https.HttpsClient.afterConnect(DashoA6275) at
sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.setNewClient(D
ashoA6275) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.superConnect(Plu
ginDelegateHttpsURLConnection.java:292) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.access$000(Plugi
nDelegateHttpsURLConnection.java:42) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection$1.run(PluginDele
gateHttpsURLConnection.java:112) at
java.security.AccessController.doPrivileged(Native Method) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.connect(PluginDe
legateHttpsURLConnection.java:107) at
sun.net.www.protocol.https.PluginDelegateHttpsURLConnection.getInputStream(P
luginDelegateHttpsURLConnection.java:306) at
java.net.HttpURLConnection.getResponseCode(HttpURLConnection.java:238) at
sun.net.www.protocol.https.HttpsURLConnectionImpl.getResponseCode(DashoA6275
) at sun.applet.AppletClassLoader.getBytes(AppletClassLoader.java:250) at
sun.applet.AppletClassLoader.access$100(AppletClassLoader.java:42) at
sun.applet.AppletClassLoader$1.run(AppletClassLoader.java:143) at
java.security.AccessController.doPrivileged(Native Method) at
sun.applet.AppletClassLoader.findClass(AppletClassLoader.java:140) ... 10
more Finalizer, called close() Finalizer, called closeInternal(true)
REPRODUCIBILITY :
This bug can be reproduced always.
---------- BEGIN SOURCE ----------
create a file test.html with the applet tag which references this :
import java.util.*;
import java.applet.Applet;
import java.awt.*;
import javax.swing.*;
public class AppletTest extends Applet
{
private Font _textFont;
private Color _textColor;
public AppletTest()
{
}
public void init()
{
int background = Integer.parseInt(getParameter("BACKGROUND"), 16);
setBackground(new Color(background));
Font _textFont = new Font("Helvetica", Font.PLAIN, 10);
int textColor = Integer.parseInt(getParameter("TEXTCOLOR"), 16);
_textColor = new Color(textColor);
}
public void start()
{
}
public void stop()
{
}
public void paint(Graphics g)
{
g.setFont(_textFont);
g.setColor(_textColor);
g.drawString ("Ouverture du lecteur, veuillez patienter ...", 5, 15);
}
}
To import my certificate PKCS12 in cacerts (JKS), I use the tool keymove described here :
http://forums.java.sun.com/thread.jsp?forum=2&thread=4210
---------- END SOURCE ----------
CUSTOMER SUBMITTED WORKAROUND :
Workaround (under Windows XP):
put :
-Djavax.net.ssl.keyStore=d:\temp\myKey.p12 -Djava.net.ssl.keyStorePassword=myPass -Djavax.net.ssl.keyStoreType=PKCS12
in the java runtime parameters on the Control Panel
(Incident Review ID: 236996)
======================================================================
- duplicates
-
JDK-4802844 Support Client Authentication in HTTPS
-
- Resolved
-