FreeKB - Java Keystore Understanding the difference between a keystore and a truststore
Java Keystore - Understanding the difference between a keystore and a truststore

Let's say you have a web server that produces HTTPS web pages, such as https://www.example.com. When a client submits a request to get a web page from your web server, a TLS handshake occurs, so that the packets exchanged between the client and server are encrypted. In this scenario, a keystore could be used. The keystore on the server would contain the public certificate and private key that will be used. A keystore is a file such as foo.p12 or bar.jks.

A keystore contains both public certificates and private keys

The TLS handshake look like this.

  1. The client sends a "Client Hello" packet to the server.
  2. The server sends a "Server Hello" packet to the client, which includes the public certificate in the keystore file (not the private key).
  3. The client validates the public certificate against it's list of known, trusted certificate authorities, and then sends the server a premaster secret (random string of data). The premaster secret is encrypted with the public certificate. The server decrypts the premaster secret with the private key in the keystore.
  4. The client generates a session key and sends the server a FIN (finished) packet.
  5. The server generates a session key and sends the client a FIN (finished) packet.

 

Let's say you know you are going to be requesting a resource from a server often over a secured channel, such as HTTPS. Instead of going through the SSL handshake negotiation process to have the server provide you with the public certificate, you could store the servers public certificate in a truststore. Then, when you need to request a resource from the server, you will already have the certificate, so that you can present the certificate to the server and get on with the request. A truststore is a file, such as trust.p12.

A truststore contains public certificates. A truststore does not contain private keys.

 

The Java keytool command can be used to view, import, add, and remove public certificates and private keys from a keystore or truststore. In this example, the key.p12 keystore contains a public certificate called "default". A private key doesn't contain user specific data, such as an "alias" or "expiration date", so the user specific data in the keystore represents the public certificates, not the private key.

~]# keytool -list -v -storetype PKCS12 -storepass changeit -keystore /path/to/key.p12
. . .
Alias: default

 

In this example, the trust.p12 truststore contains a public certificate called "example.com".

~]# keytool -list -v -storetype PKCS12 -storepass changeit -keystore /path/to/trust.p12
. . .
Alias: example.com

 



Add a Comment




We will never share your name or email with anyone. Enter your email if you would like to be notified when we respond to your comment.




Please enter 5d579 in the box below so that we can be sure you are a human.




Comments


May 1st, 2020 by Sagar Barve
I would appreciate if you could give a step by step Explanation for diagram


August 26th, 2020 by Sunil
Hi, Thanks for sharing your knowledge. 1 doubt : Does it means that trust store always available on client side and keystore on server side ?


August 26th, 2020 by Jeremy (moderator)
Generally, a truststore is client side and a keystore is server side, but there are situations where a client or server may have both a keystore and truststore. It all comes down to how security is being implemented.


October 12th, 2020 by Febri in South East Asian (not thailand)
This article is GOLD!! Thank you . Why can everybody explain things this simple! ~ "If you can’t explain it simply, you don’t understand it well enough." - genius Einstein

Web design by yours truely - me, myself, and I   |   jeremy.canfield@freekb.net   |