[JBoss JIRA] (WFCORE-2420) JMS client dependencies doesn't contain a default wildfly-config.xml
by Kabir Khan (JIRA)
[ https://issues.jboss.org/browse/WFCORE-2420?page=com.atlassian.jira.plugi... ]
Kabir Khan closed WFCORE-2420.
------------------------------
> JMS client dependencies doesn't contain a default wildfly-config.xml
> --------------------------------------------------------------------
>
> Key: WFCORE-2420
> URL: https://issues.jboss.org/browse/WFCORE-2420
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Reporter: Josef Cacek
> Assignee: Jeff Mesnil
> Priority: Critical
>
> Using the {{wildfly-jms-client-bom}} dependency for JMS clients doesn't introduce a default {{wildfly-config.xml}} with Elytron client configuration. As the result, clients are not able to authenticate (e.g. using JBOSS-LOCAL-USER SASL mechanism).
> The default configuration in {{wildfly-config.xml}} should allow similar behavior as with legacy security. So the following call should pass:
> {code}
> ConnectionFactory connectionFactory = (ConnectionFactory) namingContext.lookup("jms/RemoteConnectionFactory");
> {code}
> Currently the call throws exception:
> {code}
> SEVERE: Naming problem occured
> javax.naming.CommunicationException: WFNAM00018: Failed to connect to remote host [Root exception is javax.security.sasl.SaslException: Authentication failed: none of the mechanisms presented by the server are supported]
> at org.wildfly.naming.client.remote.RemoteNamingProvider.getPeerIdentityForNaming(RemoteNamingProvider.java:110)
> at org.wildfly.naming.client.remote.RemoteContext.lookupNative(RemoteContext.java:91)
> at org.wildfly.naming.client.AbstractFederatingContext.lookup(AbstractFederatingContext.java:78)
> at org.wildfly.naming.client.AbstractFederatingContext.lookup(AbstractFederatingContext.java:64)
> at org.wildfly.naming.client.WildFlyRootContext.lookup(WildFlyRootContext.java:123)
> at org.wildfly.naming.client.WildFlyRootContext.lookup(WildFlyRootContext.java:113)
> at javax.naming.InitialContext.lookup(InitialContext.java:417)
> at org.wildfly.security.elytron.demo.JmsClient.main(JmsClient.java:45)
> Caused by: javax.security.sasl.SaslException: Authentication failed: none of the mechanisms presented by the server are supported
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:412)
> at org.jboss.remoting3.remote.ClientConnectionOpenListener$Capabilities.handleEvent(ClientConnectionOpenListener.java:239)
> at org.xnio.ChannelListeners.invokeChannelListener(ChannelListeners.java:92)
> at org.xnio.conduits.ReadReadyHandler$ChannelListenerHandler.readReady(ReadReadyHandler.java:66)
> at org.xnio.nio.NioSocketConduit.handleReady(NioSocketConduit.java:89)
> at org.xnio.nio.WorkerThread.run(WorkerThread.java:567)
> at ...asynchronous invocation...(Unknown Source)
> at org.jboss.remoting3.EndpointImpl.connect(EndpointImpl.java:466)
> at org.jboss.remoting3.FutureConnection.connect(FutureConnection.java:113)
> at org.jboss.remoting3.FutureConnection.init(FutureConnection.java:75)
> at org.jboss.remoting3.FutureConnection.get(FutureConnection.java:151)
> at org.jboss.remoting3.EndpointImpl.getConnection(EndpointImpl.java:422)
> at org.jboss.remoting3.UncloseableEndpoint.getConnection(UncloseableEndpoint.java:57)
> at org.jboss.remoting3.Endpoint.getConnection(Endpoint.java:105)
> at org.wildfly.naming.client.remote.RemoteNamingProvider.lambda$new$0(RemoteNamingProvider.java:68)
> at org.wildfly.naming.client.remote.RemoteNamingProvider.getPeerIdentity(RemoteNamingProvider.java:126)
> at org.wildfly.naming.client.remote.RemoteNamingProvider.getPeerIdentityForNaming(RemoteNamingProvider.java:108)
> ... 7 more
> {code}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 6 months
[JBoss JIRA] (WFCORE-1675) Embedded server started non-modular use only first --jboss-home for FS paths
by Kabir Khan (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1675?page=com.atlassian.jira.plugi... ]
Kabir Khan closed WFCORE-1675.
------------------------------
> Embedded server started non-modular use only first --jboss-home for FS paths
> ----------------------------------------------------------------------------
>
> Key: WFCORE-1675
> URL: https://issues.jboss.org/browse/WFCORE-1675
> Project: WildFly Core
> Issue Type: Bug
> Components: CLI, Domain Management
> Reporter: Ken Wills
> Assignee: Ken Wills
> Priority: Blocker
>
> First --jboss-home value passed is always used to FS paths resolution. The issue affects embed-server started using jboss-cli-client.jar.
> *reproduce*
> start embed server using wf1, stop it, start another embed server using wf2
> {noformat}
> /home/workspace3
> ├── wf1
> │ └── wildfly-10.0
> └── wf2
> └── wildfly-10.0
> $ pwd ; java -jar jboss-cli-client.jar
> [disconnected /] embed-server --jboss-home=~/workspace3/wf1/wildfly-10.0
> [standalone@embedded /] stop-embedded-server
> [disconnected /] embed-server --jboss-home=~/workspace3/wf2/wildfly-10.0
> {noformat}
> *actual*
> _wf1_ is used
> {noformat}
> ...
> "name" => "jboss.server.config.dir",
> "path" => "/home/workspace3/wf1/wildfly-10.0/standalone/configuration",
> ...
> {noformat}
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 6 months
[JBoss JIRA] (WFCORE-1282) Unable to create HTTPS connection using *ECDH_RSA* cipher suites / kECDHr cipher string
by Kabir Khan (JIRA)
[ https://issues.jboss.org/browse/WFCORE-1282?page=com.atlassian.jira.plugi... ]
Kabir Khan closed WFCORE-1282.
------------------------------
> Unable to create HTTPS connection using *ECDH_RSA* cipher suites / kECDHr cipher string
> ---------------------------------------------------------------------------------------
>
> Key: WFCORE-1282
> URL: https://issues.jboss.org/browse/WFCORE-1282
> Project: WildFly Core
> Issue Type: Bug
> Components: Security
> Affects Versions: 1.0.2.Final
> Environment: Oracle Java
> Reporter: Martin Choma
> Assignee: Romain Pelisse
> Priority: Critical
> Attachments: client_debug_eap6.log, client_debug_eap7.log, server-cert-key-ec.jks, server_debug_eap6.log, server_debug_eap7.log
>
>
> User using these cipher suites / cipher name in EAP6 won't be able to use it in EAP7.
> Setting as critical as these cipher suites, are considered for strong and widely used in my opinion.
> In server log, error "no cipher suites in common" can be seen using -Djavax.net.debug=all.
> Note, that analogous configuration in EAP6 works fine.
> Issue can be seen on Oracle Java only, as on OpenJDK / IBM these suites are not provided by method getDefaultCipherSuites().
> Also is it possible to log "no cipher suites in common" and similar tls handshake errors without -Djavax.net.debug for better troubleshooting?
--
This message was sent by Atlassian JIRA
(v7.5.0#75005)
7 years, 6 months