Closed GoogleCodeExporter closed 9 years ago
Original comment by linas.vi...@continuent.com
on 15 Jul 2013 at 9:12
The '--security-directory' option should default to '$CONTINUENT_ROOT/share'
since we make sure that directory always exists and is owned by the Tungsten
user.
Original comment by jeff.m...@continuent.com
on 15 Jul 2013 at 1:00
Change in the security.properties file made. Added substitution and a simple
test.
Passing over to Jeff to implement the rest in tpm
Original comment by ludovic....@continuent.com
on 15 Jul 2013 at 3:17
The new arguments will be
--security-directory
--enable-thl-ssl|--thl-ssl
--enable-rmi-ssl|--rmi-ssl
--enable-rmi-authentication|--rmi-authentication
--rmi-username
Original comment by jeff.m...@continuent.com
on 17 Jul 2013 at 11:44
The following arguments have been added:
--security-directory (default:<--home-directory>/share)
--thl-ssl (default: false)
--rmi-ssl (default: false)
--rmi-authentication (default: false)
--rmi-user (default: tungsten)
--java-keystore-password (default: tungsten)
--java-truststore-password (default: tungsten)
I need to add validation of the settings before this can be considered
complete. To do that I need to know how to test the various settings from the
command line.
- Validate the keystore and truststore exist
- Validate the rmi user exists in both files and properly authenticates
- Validate the proper certificate exists for thl encryption
Original comment by jeff.m...@continuent.com
on 23 Jul 2013 at 5:06
[deleted comment]
1) Validate the keystore and truststore exist
This also verifies that the password is correct:
keytool -list -v -keystore ./tungsten_keystore.jks -storepass tungsten
2) Validate the proper certificate exists for thl encryption
Same as 1), you can check that the certificate is in the list. You can use
-alias if needed
https://www.sslshopper.com/article-most-common-java-keytool-keystore-commands.ht
ml
3)Validate the rmi user exists in both files and properly authenticates
There are commnand line jmx client you could use to make a call to a running
manager and see if you get a response:
http://crawler.archive.org/cmdline-jmxclient/
http://wiki.cyclopsgroup.org/jmxterm
https://github.com/jeanarcand/jmxbox
Original comment by ludovic....@continuent.com
on 24 Jul 2013 at 7:43
All the validation that's currently possible is in. Keystore and truststore
with the given passwords are tested.
There's no simple way to test the password or jmxremote file, however that's
not really needed.
Original comment by linas.vi...@continuent.com
on 12 Aug 2013 at 3:59
The documentation for this has already been update, and an entry added to the
release notes.
Original comment by mc.br...@continuent.com
on 12 Aug 2013 at 4:56
Original issue reported on code.google.com by
robert.h...@continuent.com
on 13 Jul 2013 at 3:59