a

What do you do when your SSL Certificate expired?

I ran into this problem the other day. My SSL Certificate expired for my dev domain. I went to Network Solutions, snagged a new Certificate using my old Certificate Signing Request (CSR), and tried to import it into my keystore. In the past, I’ve always generated my private key and CSR, and then imported a […]

I ran into this problem the other day. My SSL Certificate expired for my dev domain. I went to Network Solutions, snagged a new Certificate using my old Certificate Signing Request (CSR), and tried to import it into my keystore.
In the past, I’ve always generated my private key and CSR, and then imported a new certificate along with the complete chain. Since the old expired certificate was still in the keystore, I thought it made sense to blow away the appropriate alias in the keystore with the following command.

1
%JAVA_HOME%/bin/keytool -delete -alias tomcat_ssl -keystore C:/Users/Joel/.keystore

Big mistake.
What I didn’t realize is when you blow away your alias in the keystore, it not only blows away the certificate, but the private key as well. Oops.
Luckily, I still had my private key. I was hopeful that I could just import this private key into my keystore. Strike 2!
The Java keytool does not allow you to import an existing private key. Crap. I didn’t want to go back to Network Solutions to generate a new certificate. That’s a pain. There has to be a way to get a private key into my keystore.
Luckily, there is. You can’t import a private key directly into your keystore, but you can merge a private-cert pair into an existing keystore if the private-cert pair is in PKCS12 format. How’s that for fun?
To start, you need to use openssl to generate a PKCS12 file from your pem file. The pem file needs to be a combination of first your private key followed by your crt file for the domain.

1
C:/cygwin/home/Joel/dev> cat openssl_dev.crt >> openssl_dev.pem

Next you need to run openssl with the -in parameter to generate the PKCS12 fle.

1
C:/cygwin/home/Joel/dev> openssl pkcs12 -export -in openssl_dev.pem  -out openssl_dev.p12

Now, with the PKCS12 file, you need to do a keystore merge with your existing keystore.

1
%JAVA_HOME%/bin/keytool -importkeystore -srckeystore openssl_dev.p12 -srcstoretype PKCS12 -destkeystore C:/Users/Joel/.keystore

After doing the merge, when you look into your keystore, you will see that this entry has been given an alias of 1.

1
%JAVA_HOME%/bin/keytool -list -v -keystore C:/Users/Joel/.keystore > dump.txt

You will want to change this alias to something usable,

1
%JAVA_HOME%/bin/keytool -changealias -alias 1 -destalias tomcat_ssl

Now, you will also want to import other portions of the certificate chain.

1
%JAVA_HOME%/bin/keytool -import -alias root -keystore C:/Users/Joel/.keystore -trustcacerts -file network_first_add_trust_second_carriage_return.pem

Now, when I start up my tomcat instance referencing my tomcat_ssl alias, I’m back in business!

Related Articles

3 Ways Gen AI and AWS can Enhance Your Business

3 Ways Gen AI and AWS can Enhance Your Business

Amazon is on the cutting edge of new technologies. They have been increasingly experimenting with AI and learning algorithms, culminating in their most recent breakthroughs in Generative AI. Developers and technology enthusiasts have access to their innovations through the tools available on AWS.

Business Owner’s Guide to DevOps Essentials

Business Owner’s Guide to DevOps Essentials

As a business owner, it’s essential to maximize workplace efficiency. DevOps is a methodology that unites various departments to achieve business goals swiftly. Maintaining a DevOps loop is essential for the health and upkeep of deployed applications.