To return expected results, you can:

  • Reduce the number of search terms. Each term you use focuses the search further.
  • Check your spelling. A single misspelled or incorrectly typed term can change your result.
  • Try substituting synonyms for your original terms. For example, instead of searching for "java classes", try "java training"
  • Did you search for an IBM acquired or sold product ? If so, follow the appropriate link below to find the content you need.
  • 6.1.0.47: WebSphere Application Server V6.1 Fix Pack 47
    6.1.0.41: Java SDK 1.5 SR12 FP5 Cumulative Fix for WebSphere Application Server
    6.1.0.43: Java SDK 1.5 SR13 Cumulative Fix for WebSphere Application Server
    6.1.0.45: Java SDK 1.5 SR14 Cumulative Fix for WebSphere Application Server
    6.1.0.47: Java SDK 1.5 SR16 Cumulative Fix for WebSphere Application Server

  • We are getting the following error, 10's of thousands of times
    (Log is 10 Million lines after a day or so) when a certificate
    is about to expire:
    CWWSS5189W: The certificate, which is owned by
    CN=SOAPRequester, OU=TRL, O=IBM, ST=Kanagawa, C=JP, uses the
    soaprequester alias, and is located in the
    /WebSphere/V6R1M0E/AppServer1/profiles/default/etc/ws-security/
    samples/dsig-sender.ks keystore,expires in 38 days.
    

    Local fix

    Problem summary

  • ****************************************************************
    * USERS AFFECTED:  All users of IBM WebSphere Application      *
    *                  Server V6.1                                 *
    ****************************************************************
    * PROBLEM DESCRIPTION: The certificates in the WS-Security     *
    *                      digital signature sample keystores      *
    *                      have expired.                           *
    ****************************************************************
    * RECOMMENDATION:  Install a fix pack that includes this APAR  *
    ****************************************************************
    The certificates in the WS-Security digital signature sample
    keystores expired on 08/26/2011.  The sample keystores are
    dsig-sender.ks, dsig-receiver.ks and intca2.cer and are
    located in the <PROFILE_ROOT>/etc/ws-security/samples
    directory.
    When one of the expired certificates in these keystores is
    used by the WS-Security runtime, messages similar to the
    following will be logged to the SystemOut.log:
    [08/26/11 13:02:03:455 BST]   3f5426 KeyStoreKeyLo E
    WSEC5156E: An exception while retrieving the key from KeyStore
    object: java.security.cert.CertificateExpiredException:
    NotAfter: Fri Aug 26 06:09:12 BST 2011
    [8/30/11 15:42:24:198 EDT] 4a7a6588 KeyStoreKeyLo E WSEC5181E:
    The certificate (Owner: "[email protected],
    CN=SOAP 2.1 Test CA, OU=TRL, O=IBM, L=Yamato, ST=Kanagawa,
    C=JP") with alias "soapca" from keystore
    "/opt/WebSphere/AppServer/etc/ws-security/samples/dsig-
    sender.ks
    " has expired: java.security.cert.CertificateExpiredException:
    NotAfter: Fri Aug 26 01:09:12 EDT 2011 at
    com.ibm.security.x509.CertificateValidity.valid(Unknown Source)
    If a certificate has is close to expiring, a message similar
    to the following will be logged:
    [8/30/11 14:07:31:326 EDT] 0000001e KeyStoreManag W
    CWWSS5189W: The certificate, which is owned by
    CN=SOAPRequester, OU=TRL, O=IBM, ST=Kanagawa, C=JP, uses the
    soaprequester alias, and is located in the
    /opt/IBM/WebSphere/AppServer61/profiles/AppSrv02/etc/ws-
    security
    /samples/dsig-sender.ks keystore, expires in 31 days.
    Since the runtime logs the messages each time the certificates
    are accessed, it is possible to log the messages excessively.
    

    Problem conclusion

  • The WS-Security sample digital signature certificates and
    encryption keys that are located in the following files are
    updated:
    dsig-receiver.ks
    dsig-sender.ks
    enc-receiver.jceks
    end-sender.jceks
    intca2.cer
    When new profiles are created, the new keystores will be used.
    Since it is possible that the keystores that are located in
    existing profiles had been updated after creation, the
    keystores in existing profiles will not be replaced.  Refer to
    the following technote for more information on how to update
    the sample keystores in existing profiles:
    http://www-01.ibm.com/support/docview.wss?uid=swg21507405
    The WS-Security runtime is also updated to log the WSEC5156E,
    WSEC5181E, and CWWSS5189W messages only once for each
    expired/about to expire certificate.
    IMPORTANT NOTE:
    The signing certificates and encryption keys that are being
    replaced by this APAR are used in the JAX-WS and JAX-RPC Web
    Services Default Bindings for Web Services Security.  They are
    provided for testing/example purposes only and should not be
    used on production systems.
    The fix for this APAR is currently targeted for inclusion in
    fix pack 6.1.0.41.  Please refer to the Recommended Updates
    page for delivery information:
    http://www.ibm.com/support/docview.wss?rs=180&uid=swg27004980
    

    Temporary fix

    Comments

    APAR Information

  • APAR number

    PM47470

  • Reported component name

    WEBSERVIC FEATU

  • Reported component ID

    5724J0850

  • Reported release

    61W

  • Status

    CLOSED PER

  • PE

    NoPE

  • HIPER

    NoHIPER

  • Special Attention

    NoSpecatt

  • Submitted date

    2011-09-09

  • Closed date

    2011-10-17

  • Last modified date

    2011-10-17

  • APAR is sysrouted FROM one or more of the following:

  • APAR is sysrouted TO one or more of the following:

    PM47701 PM47702

    Fix information

  • Fixed component name

    WEBSPHERE APP S

  • Fixed component ID

    5724J0800

  • Applicable component levels

  • R61A PSY

       UP

  • R61H PSY

       UP

  • R61I PSY

       UP

  • R61P PSY

       UP

  • R61S PSY

       UP

  • R61W PSY

       UP

  • R61Z PSY

       UP

  •