i updated the certs to my purchased ssl, while the interface now works with no self-signed errors, the java applet doesnt work
also tried the instructions at http://pve.proxmox.com/wiki/HTTPSCertificateConfiguration for the /etc/pve certs not just /etc/pve/local
i'm getting the following error when trying to load the console java applet after both attempts:
Code:Error: TLS handshake failed javax.net.ssl.SSLHandshakeException: java.security.cert.CertificateException: cert path too long
we just updated the wiki for 3.0, works here.
see http://pve.proxmox.com/wiki/HTTPSCertificateConfiguration
Initializing...
Connecting to esx1.datanom.net, port 5900...
Connected to server
RFB server supports protocol version 3.8
Using RFB protocol version 3.8
VeNCrypt chooser
X509Plain
Generating TLS context
Doing TLS handshake
Error: TLS handshake failed javax.net.ssl.SSLHandshakeException: java.security.cert.CertificateException: certificate does not match
java.lang.Exception: TLS handshake failed javax.net.ssl.SSLHandshakeException: java.security.cert.CertificateException: certificate does not match
at com.tigervnc.vncviewer.TLSTunnelBase.setup(TLSTunnelBase.java:73)
at com.tigervnc.vncviewer.RfbProto.authenticateX509(RfbProto.java:416)
at com.tigervnc.vncviewer.VncViewer.doAuthentification(VncViewer.java:445)
at com.tigervnc.vncviewer.VncViewer.doAuthentification(VncViewer.java:406)
at com.tigervnc.vncviewer.VncViewer.connectAndAuthenticate(VncViewer.java:385)
at com.tigervnc.vncviewer.VncViewer.run(VncViewer.java:202)
at java.lang.Thread.run(Unknown Source)
RFB socket closed
Just a longshot. Is tigervnc making a literal comparison of the certificates disregarding the concept of *.foo.bar. In other words does tigervnc not understand star certificates?
It seems to be related to this commit:
http://pve.proxmox.com/pipermail/pve-devel/2011-January/000590.html
Maybe you forgot to restart 'pveproxy' and 'pvedaemon'?
No, I did not.Maybe you forgot to restart 'pveproxy' and 'pvedaemon'?
+ if (certs == null || certs.length > 1) {
+ throw new CertificateException("cert path too long");
+ }
The above means that if there are returned more than one cert it bails with an error. Eg. chained certs are not allowed.
Now, this is weird. I have been able to make it work but working in a wrong way.Maybe you forgot to restart 'pveproxy' and 'pvedaemon'?
Yes, and I did also mention the same in 2012 so this bug has been sitting around in 2.x also.But that code is from 2011 - so the current code in 3.0 should behave exactly the same as in 2.X
Following the instructions for creating a chained certificate when the server, like nginx, does not have an option to load a chained cert file like apache.
The patch mentioned above is not able to handle all legitimate situations and therefore it is not complete.
The idea is that /etc/pve/pve-root-ca.pem is the CA (direct issuer) for all node certs. I am not sure why you want/need additional chain.