Return-Path: X-Original-To: apmail-tomcat-users-archive@www.apache.org Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id E411B107E5 for ; Fri, 6 Dec 2013 08:48:31 +0000 (UTC) Received: (qmail 98499 invoked by uid 500); 6 Dec 2013 08:47:52 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 98393 invoked by uid 500); 6 Dec 2013 08:47:34 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 98366 invoked by uid 99); 6 Dec 2013 08:47:27 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 06 Dec 2013 08:47:27 +0000 X-ASF-Spam-Status: No, hits=1.5 required=5.0 tests=HTML_MESSAGE,RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of nancee.riehl@gmail.com designates 209.85.220.193 as permitted sender) Received: from [209.85.220.193] (HELO mail-vc0-f193.google.com) (209.85.220.193) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 06 Dec 2013 08:47:20 +0000 Received: by mail-vc0-f193.google.com with SMTP id ia6so70794vcb.8 for ; Fri, 06 Dec 2013 00:46:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=jjetqzF2z4t/wOJ9Y8Opa+UnnKfRgb5hz1fT75Xqua0=; b=XOjaQYshDIfOZseqXM1cbVIbIvXHCpC++O3BLP7OSdU6tJwe9RVyyjFg9n0eT/2cmX MhJc6UdsYL4vCV9cOTR78wx9So+a0LLojvHXKfMVkra41rsUB3d8wKp3vJPdlxpl4iyV s0ZVn0s3QJWQjMaCbChlIIZLLCToiYuaWodqm/yT6+DaMfZgvbu39s6k+G9+ZeyZe1gC 2ezIAqoPLZ5BQOjLMqu6LHIR2mh4WJXhOAgBIMSezY94g/drwV59U/DHHRf8saNZvUml sDa9itKnXEM4FYuV+x/NkWFz9L9mcOriHSwReagqkJeoqqxRrwvJWK7YeiU6HwVrgYp0 8vGA== MIME-Version: 1.0 X-Received: by 10.220.50.18 with SMTP id x18mr1316337vcf.29.1386319619538; Fri, 06 Dec 2013 00:46:59 -0800 (PST) Received: by 10.220.196.133 with HTTP; Fri, 6 Dec 2013 00:46:59 -0800 (PST) Date: Fri, 6 Dec 2013 09:46:59 +0100 Message-ID: Subject: Different SSLHandshakeExceptions tomcat 6.0.35 and 7.0.47 From: Nancee Riehl To: users@tomcat.apache.org Content-Type: multipart/alternative; boundary=047d7b34427a77f38c04ecd9b03e X-Virus-Checked: Checked by ClamAV on apache.org --047d7b34427a77f38c04ecd9b03e Content-Type: text/plain; charset=ISO-8859-1 Hi all, I've implemented my own JSSE-Implemantation to do some special Client-Certificate Validations. When I sent a Client Certificate with length 0 I get in tomcat 6.0.35 this Exception: javax.net.ssl.SSLHandshakeException: Received fatal alert: bad_certificate This is good because I can check it in my JUnit-Test. When I do the same test with tomcat 7.0.47 I get only this Exception: java.net.SocketException: Software caused connection abort: recv failed My Implemation for further Certificate Validations is not affected at this moment. The Handshake in my own Socket-Factory looks like this: try { super.handshake(sock); } catch (IOException e) { LOGGER.error(e); throw new SSLHandshakeException("Test"); } catch (Exception e) { LOGGER.error(e); throw new SSLException(e); } I've also created wireshark traces there I could see that with tomcat 6.0.35 I get an Alert Message with Level Fatal (2) and Description Bad Certificate (42) With tomcat 7.0.47 I get an Encrypted Alert without further information. Best regards, Nancee --047d7b34427a77f38c04ecd9b03e--