November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  

Categories

November 2024
M T W T F S S
 123
45678910
11121314151617
18192021222324
252627282930  

Failed in r_gsk_secure_soc_init: GSK_ERROR_BAD_CERT(gsk rc = 414)

Cause

The cause of this problem is that the plug-in keystore does not have the correct SSL signer certificate to match with the SSL personal certificate from the WebSphere Application Server node.
Environment
Note, this technote applies to WebSphere Application Server V7.0 (and later). If you are having the “GSK_ERROR_BAD_CERT” with a previous version of WebSphere Application Server, see the following technote instead: GSK_ERROR_BAD_CERT error configuring SSL between Plug-in and Application Server V6.1.

Resolving the problem

Environment
Note, this technote applies to WebSphere Application Server V7.0 (and later). If you are having the “GSK_ERROR_BAD_CERT” with a previous version of WebSphere Application Server, see the following technote instead: GSK_ERROR_BAD_CERT error configuring SSL between Plug-in and Application Server V6.1.
Resolving the problem
It is possible that the Plug-in keystore (plugin-key.kdb) on the WebSphere Application Server side, may already contain the necessary SSL signer certificates. If so, you can resolve this error by simply copying that plugin-key.kdb file to the web server system, and restarting the web server. In that case, please skip down, and start at step 20 below.

Often the Plug-in keystore (plugin-key.kdb) on the WebSphere Application Server side does NOT contain the necessary SSL signer certificates yet, so you need to find the correct signer certificate from the WebSphere Node and add it as a Signer certificate to the Plug-in CMS keystore, then copy the plugin-key.kdb file to the web server system.

NOTE: The plug-in keystore must contain the Signer Certificates for every WebSphere Node in the cell. So, if your cell has multiple WebSphere Nodes, you will need to repeat steps 1-19 for each one.

Here are the exact steps to use in the WebSphere Application Server administrative console:
In the WebSphere Application Server administrative console, go to Security > SSL certificate and key management > Manage endpoint security configurations.

Click on the WebSphere Application Server node (NodeDefaultSSLSettings).

Click on Key stores and certificates on the right side.

Click on NodeDefaultKeyStore.

Click on Personal certificates on the right side.

You will see a chained certificate. The personal certificate is the first one in the chain. The signer certificate is the second one in the chain. Look at the CN in the signer certificate. Also look at the serial number of the signer certificate.

image4

Note: That is the exact signer certificate that you need to use.

Go back to the Key stores and certificates page.

Click on NodeDefaultTrustStore.

Click on Signer certificates on the right side.

Find the signer certificate with the match CN and serial number from above, and check the box next to it. Click Extract.
image3

Note: That is the exact signer certificate that you need to use.

Go back to the Key stores and certificates page.

Click on NodeDefaultTrustStore.

Click on Signer certificates on the right side.

Find the signer certificate with the match CN and serial number from above, and check the box next to it. Click Extract.
image2

Enter a temporary path and filename (for example: /tmp/nodeRootSigner.arm). Click OK.

Go back to the Manage endpoint security configurations page.

Find the node which contains the web server definition. You will need to look inside the node and look inside the servers folder to find the web server (for example: webserver1). Click on the web server name.

Click on Key stores and certificates on the right side.

Click on CMSKeyStore (this is a link to the plugin-key.kdb file).

Click on Signer certificates.

Click Add.

Enter an Alias like “NodeRootSigner”, and enter the path and filename from step 7 (for example: /tmp/nodeRootSigner.arm). Click OK.
image1

Enter a temporary path and filename (for example: /tmp/nodeRootSigner.arm). Click OK.

Go back to the Manage endpoint security configurations page.

Find the node which contains the web server definition. You will need to look inside the node and look inside the servers folder to find the web server (for example: webserver1). Click on the web server name.

Click on Key stores and certificates on the right side.

Click on CMSKeyStore (this is a link to the plugin-key.kdb file).

Click on Signer certificates.

 

 

Click the Save link to save the changes.

Now go to Servers > Server Types > Web servers.

Click on the web server name in the list (for example: webserver1).

Click on Plug-in properties.

Click Copy to Web server key store directory. If the button is disabled, you will need to locate the plugin-key.kdb file on the deployment manager system, and copy it to the web server system into the Plugins/config/web_server directory. Where “webserver” is the name of the web server (for example: webserver1).

Click Add.

Enter an Alias like “NodeRootSigner”, and enter the path and filename from step 7 (for example: /tmp/nodeRootSigner.arm). Click OK

 

  1. Click the Save link to save the changes.
  2. Now go to Servers > Server Types > Web servers.
  3. Click on the web server name in the list (for example: webserver1).
  4. Click on Plug-in properties.
  5. Click Copy to Web server key store directory. If the button is disabled, you will need to locate the plugin-key.kdb file on the deployment manager system, and copy it to the web server system into the Plugins/config/web_server directory. Where “webserver” is the name of the web server (for example: webserver1).

 

 

image4

 

  1. Note: If the “Copy to Web server key store directory” button is not enabled (greyed out) it means that the web server definition does not have a Plug-in CMS keystore file. To avoid this problem, install the latest WAS fixpacks before creating the web server definition in WAS.
  2. Stop and restart the web server, and test to ensure that the HTTPS connection between the web server plug-in and the WebSphere Application Server application server is able to connect successfully now.

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>