Hi Michael,
On 23 Jan 2015 17:16, "Michael Klishin" <mkli...@pivotal.io> wrote:
>
> On 23 January 2015 at 18:32:42, Gabriele Paggi (gabrie...@gmail.com) wrote:
> > I'm in the process of replacing SSL certificates in a working
> > setup.
[...]
> > - set depth: 4 in the ssl_options
> > - replaced cacertfile with cacerts in the ssl_options (is it
> > needed?)
[...]
> Search for "Verification Depth" on [1]. Make sure the root CA is on the appropriate list of
> trusted CA's on your system (this varies between OSes and platforms, e.g. JDK has its own store).
I read that paragraph and that's why I set depth: 4 in ssl_options.
My client is another RabbitMQ server which has this one as upstream in a federation; I don't think I need a keystore, right?
Do I need to use cacertfile or cacerts in ssl_options to specify my ca bundle (it doesn't work either way)?
thanks!
--
Gabriele
On 23 January 2015 at 19:32:11, Gabriele Paggi (gabriel...@gmail.com) wrote:
> My client is another RabbitMQ server which has this one as upstream
> in a federation; I don't think I need a keystore, right?
You don't. Note that BOTH server and client must use a sufficient verification depth.
For Federation this means configuring the Erlang client (amqp_client.ssl_options IIRC).
> Do I need to use cacertfile or cacerts in ssl_options to specify
> my ca bundle (it doesn't work either way)?
In ssl_options of what app? If you configure amqp_client.ssl_options
and ssl.ssl_options, then anything that uses TLS as a client should use the
settings you want.
On 23 January 2015 at 23:32:17, Gabriele Paggi (gabrie...@gmail.com) wrote:
> By configuring the Erlang client I guess you mean adding options
> under {rabbit, [ {ssl_options .... } ] } in rabbitmq.config,
> right?
Under {amqp_client, [{ssl_options, …}]}, since `rabbit` is for RabbitMQ server.
On 24 January 2015 at 00:02:58, Gabriele Paggi (gabrie...@gmail.com) wrote:
Please post the entire configuration.
> The client returns Verify return code: 0 (ok) and same does openssl
> verify -verbose -purpose sslserver -CAfile cabundle.pem server_cert.pem
>
> Is it there a particular format for the CA bundle other than appending
> pem files with the root CA being the last one in the file?
Not that I'm aware of, simply concat .pem files together in order.
On 24 January 2015 at 00:26:08, Gabriele Paggi (gabriel...@gmail.com) wrote:
> What do you mean with concatenate?
> If I verify the certificate against the bundle, openssl returns
> OK, both for the client and server certificates:
>
> [root@server private]# openssl verify -verbose -purpose sslserver
> -CAfile /etc/pki/tls/certs/cabundle.pem /etc/pki/tls/certs/xxx_server.pem
> /etc/pki/tls/certs/xxx_server.pem: OK
and the entire chain is in the CA bundle file, correct? I was referring to that.
tls-gen can produce certificates with chained CAs:
https://github.com/michaelklishin/tls-gen/
May I ask you to try your setup with such certificates? This may be a STOMP (and, in turn, MQTT) plugin
limitations. Since I can't ask you to hand me over the certificates/keys ;) tls-gen is out best bet to verify this.
On 24 January 2015 at 00:57:19, Gabriele Paggi (gabrie...@gmail.com) wrote:
> As you mention a possible STOMP plugin limitation, do you think
> this is related to the depth of the chain?
Yes, most likely. In fact, you can try the "basic" setup with tls-gen and see
if that works.
Trying with openssl s_server and the chained certificates is another good idea.
--
You received this message because you are subscribed to the Google Groups "rabbitmq-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to rabbitmq-users+unsubscribe@googlegroups.com.
To post to this group, send email to rabbitmq-users@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.