Why do I get the error “Cannot store non-PrivateKeys” when creating an SSL Socket in Java?

前端 未结 3 1434
-上瘾入骨i
-上瘾入骨i 2020-12-15 12:00

I am working on an older IBM iSeries (IBM-i, i5OS, AS/400, etc), with a Java 5 JVM (Classic, not ITJ J9) on O/S version V5R3M0.

Here is the scenario in a nutshell:

相关标签:
3条回答
  • 2020-12-15 12:10

    Instead of using an ephemeral keystore, you could handle everything within a single SSLContext.

    You would need to initialise your SSLContext using an custom X509KeyManager instead of using the one given by the default KeyManagerFactory. In this X509KeyManager,chooseServerAlias(String keyType, Principal[] issuers, Socket socket) should return a different alias depending on the local address obtained from the socket.

    This way, you wouldn't have to worry about copying the private key from one keystore to another, and this would even work for keystore types from which you can't extract (and thus copy) but only use the private key, e.g. PKCS#11.

    0 讨论(0)
  • 2020-12-15 12:12

    The "Cannot store non-PrivateKeys" error message usually indicates you are trying to use secret symmetric keys with a JKS keystore type. The JKS keystore type only supports asymmetric (public/private) keys. You would have to create a new keystore of type JCEKS to support secret keys.

    0 讨论(0)
  • 2020-12-15 12:18

    As it turns out, this was a subtle problem, and it's worth giving the answer here in case someone else has something similar.

    The TLDR answer is that I did not check that my key and certificate were not null and as a result attempted to add a null key and certificate to a key-store. The longer answer follows.

    The way we have our web server set up to use SSL, specifically to support our user's typical configuration where the IP address is used to configure the web site listen address rather than a DNS name, is that it locates the certificate in the master key-store using the alias, and creates an ephemeral key-store containing just the certificate for that web site, using that key-store to configure an SSL context and an SSL socket factory, like so:

    // CREATE EPHEMERAL KEYSTORE FOR THIS SOCKET USING THE DESIRED CERTIFICATE
    try {
        final char[]      BLANK_PWD=new char[0];
        SSLContext        ctx=SSLContext.getInstance("TLS");
        KeyManagerFactory kmf=KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
        Key               ctfkey=mstkst.getKey(svrctfals,BLANK_PWD);
        Certificate[]     ctfchn=mstkst.getCertificateChain(svrctfals);
        KeyStore          sktkst;
    
        sktkst=KeyStore.getInstance("jks");
        sktkst.load(null,BLANK_PWD);
        sktkst.setKeyEntry(svrctfals,ctfkey,BLANK_PWD,ctfchn);
        kmf.init(sktkst,BLANK_PWD);
        ctx.init(kmf.getKeyManagers(),null,null);
        ssf=ctx.getServerSocketFactory();
        }
    catch(java.security.GeneralSecurityException thr) {
        throw new IOException("Cannot create server socket factory using ephemeral keystore ("+thr+")",thr);
        }
    

    Notice that it uses a blank password for extracting the private key and certificates from the master key-store. That was my problem - I had, out of habit from using keytool, created the private key-pair with a password (the same password as the key-store).

    Because I had a password on the certificate, the key and certificate were not extracted, and null was passed to sktkst.setKeyEntry(svrctfals,ctfkey,BLANK_PWD,ctfchn); However, setKeyEntry checks the passed Key using instanceof and concludes (correctly) that null is not an instanceof PrivateKey, resulting in the misleading error I was seeing.

    The corrected code checks that a key and certificate are found and sends appropriate errors:

    // CREATE EPHEMERAL KEYSTORE FOR THIS SOCKET USING THE DESIRED CERTIFICATE
    try {
        final char[]      BLANK_PWD=new char[0];
        SSLContext        ctx=SSLContext.getInstance("TLS");
        KeyManagerFactory kmf=KeyManagerFactory.getInstance(KeyManagerFactory.getDefaultAlgorithm());
        Key               ctfkey=mstkst.getKey(svrctfals,BLANK_PWD);
        Certificate[]     ctfchn=mstkst.getCertificateChain(svrctfals);
        KeyStore          sktkst;
    
        if(ctfkey==null) {
            throw new IOException("Cannot create server socket factory: No key found for alias '"+svrctfals+"'");
            }
        if(ctfchn==null || ctfchn.length==0) {
            throw new IOException("Cannot create server socket factory: No certificate found for alias '"+svrctfals+"'");
            }
    
        sktkst=KeyStore.getInstance("jks");
        sktkst.load(null,BLANK_PWD);
        sktkst.setKeyEntry(svrctfals,ctfkey,BLANK_PWD,ctfchn);
        kmf.init(sktkst,BLANK_PWD);
        ctx.init(kmf.getKeyManagers(),null,null);
        ssf=ctx.getServerSocketFactory();
        }
    catch(java.security.GeneralSecurityException thr) {
        throw new IOException("Cannot create server socket factory using ephemeral keystore ("+thr+")",thr);
        }
    
    0 讨论(0)
提交回复
热议问题