[ https://issues.apache.org/jira/browse/KAFKA-3647?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15270467#comment-15270467 ]
Elvar commented on KAFKA-3647: ------------------------------ Tried recreating the JKS's and this is how I did it {code} Generate the CA cert and key: openssl req -new -x509 -keyout ca.key -out ca.cert -days 3650 -subj "/C=IS/ST=Reykjavik/L=Reykjavik/O=M/OU=Mon/CN=kafka.local" -nodes Import CA cert to server truststore: keytool -keystore kafka.server.truststore.jks -alias CARoot -import -file ca.cert -storepass pass -noprompt Import CA cert to client truststore: keytool -keystore kafka.client.truststore.jks -alias CARoot -import -file ca.cert -storepass pass -noprompt Create server keystore and key: keytool -keystore kafka.server.keystore.jks -alias confluent-1 -validity 3650 -genkey -storepass pass -keypass pass -dname "CN=confluent-1, OU=Mon, O=M, L=Reykjavik, S=Reykjavik, C=IS" Create server CSR: keytool -keystore kafka.server.keystore.jks -alias confluent-1 -certreq -file server.csr -storepass pass Sign server CSR with CA key: openssl x509 -req -CA ca.cert -CAkey ca.key -in server.csr -out server.signed -days 3650 -CAcreateserial -passin pass:pass Import CA to the server keystore: keytool -keystore kafka.server.keystore.jks -alias CARoot -import -file ca.cert -storepass pass -noprompt Import signed server cert to server keystore: keytool -keystore kafka.server.keystore.jks -alias confluent-1 -import -file server.signed -storepass pass -noprompt Create client keystore and key: keytool -keystore kafka.client.keystore.jks -alias workclient -validity 3650 -genkey -storepass pass -keypass pass -dname "CN=workclient, OU=Mon, O=M, L=Reykjavik, S=Reykjavik, C=IS" Create client CSR: keytool -keystore kafka.client.keystore.jks -alias workclient -certreq -file client.csr -storepass pass Sign client CSR with CA key: openssl x509 -req -CA ca.cert -CAkey ca.key -in client.csr -out client.signed -days 3650 -CAcreateserial -passin pass:pass Import CA cert to the client keystore: keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca.cert -storepass pass -noprompt Import signed client cert to client keystore: keytool -keystore kafka.client.keystore.jks -alias workclient -import -file client.signed -storepass pass -noprompt {code} sslscan still reports only DSS cyphers. Using groovy and a simple command I am able to extract avialble ciphers in detail {code} groovy:000> java.security.Security.providers.each{p->p.getServices().each{s->println s}} {code} Here is my output {code:collapse=true} SUN: SecureRandom.NativePRNG -> sun.security.provider.NativePRNG SUN: SecureRandom.SHA1PRNG -> sun.security.provider.SecureRandom attributes: {ImplementedIn=Software} SUN: Signature.SHA1withDSA -> sun.security.provider.DSA$SHA1withDSA aliases: [DSA, DSS, SHA/DSA, SHA-1/DSA, SHA1/DSA, SHAwithDSA, DSAWithSHA1, OID.1.2.840.10040.4.3, 1.2.840.10040.4.3, 1.3.14.3.2.13, 1.3.14.3.2.27] attributes: {ImplementedIn=Software, KeySize=1024, SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey} SUN: Signature.NONEwithDSA -> sun.security.provider.DSA$RawDSA aliases: [RawDSA] attributes: {KeySize=1024, SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey} SUN: Signature.SHA224withDSA -> sun.security.provider.DSA$SHA224withDSA aliases: [OID.2.16.840.1.101.3.4.3.1, 2.16.840.1.101.3.4.3.1] attributes: {KeySize=2048, SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey} SUN: Signature.SHA256withDSA -> sun.security.provider.DSA$SHA256withDSA aliases: [OID.2.16.840.1.101.3.4.3.2, 2.16.840.1.101.3.4.3.2] attributes: {KeySize=2048, SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey} SUN: KeyPairGenerator.DSA -> sun.security.provider.DSAKeyPairGenerator aliases: [OID.1.2.840.10040.4.1, 1.2.840.10040.4.1, 1.3.14.3.2.12] attributes: {ImplementedIn=Software, KeySize=2048} SUN: MessageDigest.MD2 -> sun.security.provider.MD2 SUN: MessageDigest.MD5 -> sun.security.provider.MD5 attributes: {ImplementedIn=Software} SUN: MessageDigest.SHA -> sun.security.provider.SHA aliases: [SHA-1, SHA1, 1.3.14.3.2.26, OID.1.3.14.3.2.26] attributes: {ImplementedIn=Software} SUN: MessageDigest.SHA-224 -> sun.security.provider.SHA2$SHA224 aliases: [2.16.840.1.101.3.4.2.4, OID.2.16.840.1.101.3.4.2.4] SUN: MessageDigest.SHA-256 -> sun.security.provider.SHA2$SHA256 aliases: [2.16.840.1.101.3.4.2.1, OID.2.16.840.1.101.3.4.2.1] SUN: MessageDigest.SHA-384 -> sun.security.provider.SHA5$SHA384 aliases: [2.16.840.1.101.3.4.2.2, OID.2.16.840.1.101.3.4.2.2] SUN: MessageDigest.SHA-512 -> sun.security.provider.SHA5$SHA512 aliases: [2.16.840.1.101.3.4.2.3, OID.2.16.840.1.101.3.4.2.3] SUN: AlgorithmParameterGenerator.DSA -> sun.security.provider.DSAParameterGenerator attributes: {ImplementedIn=Software, KeySize=2048} SUN: AlgorithmParameters.DSA -> sun.security.provider.DSAParameters aliases: [OID.1.2.840.10040.4.1, 1.2.840.10040.4.1, 1.3.14.3.2.12] attributes: {ImplementedIn=Software} SUN: KeyFactory.DSA -> sun.security.provider.DSAKeyFactory aliases: [OID.1.2.840.10040.4.1, 1.2.840.10040.4.1, 1.3.14.3.2.12] attributes: {ImplementedIn=Software} SUN: CertificateFactory.X.509 -> sun.security.provider.X509Factory aliases: [X509] attributes: {ImplementedIn=Software} SUN: KeyStore.JKS -> sun.security.provider.JavaKeyStore$JKS attributes: {ImplementedIn=Software} SUN: KeyStore.CaseExactJKS -> sun.security.provider.JavaKeyStore$CaseExactJKS SUN: Policy.JavaPolicy -> sun.security.provider.PolicySpiFile SUN: Configuration.JavaLoginConfig -> sun.security.provider.ConfigSpiFile SUN: CertPathBuilder.PKIX -> sun.security.provider.certpath.SunCertPathBuilder attributes: {ValidationAlgorithm=RFC3280, ImplementedIn=Software} SUN: CertPathValidator.PKIX -> sun.security.provider.certpath.PKIXCertPathValidator attributes: {ValidationAlgorithm=RFC3280, ImplementedIn=Software} SUN: CertStore.LDAP -> sun.security.provider.certpath.ldap.LDAPCertStore attributes: {ImplementedIn=Software, LDAPSchema=RFC2587} SUN: CertStore.Collection -> sun.security.provider.certpath.CollectionCertStore attributes: {ImplementedIn=Software} SUN: CertStore.com.sun.security.IndexedCollection -> sun.security.provider.certpath.IndexedCollectionCertStore attributes: {ImplementedIn=Software} SunRsaSign: Signature.SHA1withRSA -> sun.security.rsa.RSASignature$SHA1withRSA aliases: [1.2.840.113549.1.1.5, OID.1.2.840.113549.1.1.5, 1.3.14.3.2.29] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunRsaSign: Signature.MD5withRSA -> sun.security.rsa.RSASignature$MD5withRSA aliases: [1.2.840.113549.1.1.4, OID.1.2.840.113549.1.1.4] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunRsaSign: Signature.MD2withRSA -> sun.security.rsa.RSASignature$MD2withRSA aliases: [1.2.840.113549.1.1.2, OID.1.2.840.113549.1.1.2] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunRsaSign: KeyFactory.RSA -> sun.security.rsa.RSAKeyFactory aliases: [1.2.840.113549.1.1, OID.1.2.840.113549.1.1] SunRsaSign: Signature.SHA256withRSA -> sun.security.rsa.RSASignature$SHA256withRSA aliases: [OID.1.2.840.113549.1.1.11, 1.2.840.113549.1.1.11] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunRsaSign: KeyPairGenerator.RSA -> sun.security.rsa.RSAKeyPairGenerator aliases: [OID.1.2.840.113549.1.1, 1.2.840.113549.1.1] SunRsaSign: Signature.SHA512withRSA -> sun.security.rsa.RSASignature$SHA512withRSA aliases: [1.2.840.113549.1.1.13, OID.1.2.840.113549.1.1.13] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunRsaSign: Signature.SHA384withRSA -> sun.security.rsa.RSASignature$SHA384withRSA aliases: [OID.1.2.840.113549.1.1.12, 1.2.840.113549.1.1.12] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunRsaSign: Signature.SHA224withRSA -> sun.security.rsa.RSASignature$SHA224withRSA aliases: [1.2.840.113549.1.1.14, OID.1.2.840.113549.1.1.14] attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey} SunEC: Signature.SHA224withECDSA -> sun.security.ec.ECDSASignature$SHA224 aliases: [OID.1.2.840.10045.4.3.1, 1.2.840.10045.4.3.1] attributes: {ImplementedIn=Software, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunEC: Signature.SHA512withECDSA -> sun.security.ec.ECDSASignature$SHA512 aliases: [OID.1.2.840.10045.4.3.4, 1.2.840.10045.4.3.4] attributes: {ImplementedIn=Software, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunEC: AlgorithmParameters.EC -> sun.security.ec.ECParameters aliases: [EllipticCurve] attributes: {ImplementedIn=Software, SupportedCurves=[secp112r1,1.3.132.0.6]|[secp112r2,1.3.132.0.7]|[secp128r1,1.3.132.0.28]|[secp128r2,1.3.132.0.29]|[secp160k1,1.3.132.0.9]|[secp160r1,1.3.132.0.8]|[secp160r2,1.3.132.0.30]|[secp192k1,1.3.132.0.31]|[secp192r1,NIST P-192,X9.62 prime192v1,1.2.840.10045.3.1.1]|[secp224k1,1.3.132.0.32]|[secp224r1,NIST P-224 ,1.3.132.0.33]|[secp256k1,1.3.132.0.10]|[secp256r1,NIST P-256,X9.62 prime256v1,1.2.840.10045.3.1.7]|[secp384r1,NIST P-384,1.3.132.0.34]|[secp521r1,NIST P-521,1.3.132.0.35]|[X9.62 prime192v2,1.2.840.10045.3.1.2]|[X9.62 prime192v3,1.2.840.10045.3.1.3]|[X9.62 prime239v1,1.2.840.10045.3.1.4]|[X9.62 prime239v2,1.2.840.10045.3.1.5]|[X9.62 prime239v3,1.2.840.100 45.3.1.6]|[sect113r1,1.3.132.0.4]|[sect113r2,1.3.132.0.5]|[sect131r1,1.3.132.0.22]|[sect131r2,1.3.132.0.23]|[sect163k1,NIST K-163,1.3.132.0.1]|[sect163r1,1.3.132.0.2]|[sect163r2,NIST B-163,1.3.132.0.15]|[sect193r1,1.3.132.0.24]|[sect193r2,1.3.132.0.25]|[sect233k1,NIST K-233,1.3.132.0.26]|[sect233r1,NIST B-233,1.3.132.0.27]|[sect239k1,1.3.132.0.3]|[sect283 k1,NIST K-283,1.3.132.0.16]|[sect283r1,NIST B-283,1.3.132.0.17]|[sect409k1,NIST K-409,1.3.132.0.36]|[sect409r1,NIST B-409,1.3.132.0.37]|[sect571k1,NIST K-571,1.3.132.0.38]|[sect571r1,NIST B-571,1.3.132.0.39]|[X9.62 c2tnb191v1,1.2.840.10045.3.0.5]|[X9.62 c2tnb191v2,1.2.840.10045.3.0.6]|[X9.62 c2tnb191v3,1.2.840.10045.3.0.7]|[X9.62 c2tnb239v1,1.2.840.10045. 3.0.11]|[X9.62 c2tnb239v2,1.2.840.10045.3.0.12]|[X9.62 c2tnb239v3,1.2.840.10045.3.0.13]|[X9.62 c2tnb359v1,1.2.840.10045.3.0.18]|[X9.62 c2tnb431r1,1.2.840.10045.3.0.20], KeySize=256} SunEC: Signature.SHA384withECDSA -> sun.security.ec.ECDSASignature$SHA384 aliases: [OID.1.2.840.10045.4.3.3, 1.2.840.10045.4.3.3] attributes: {ImplementedIn=Software, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunEC: KeyAgreement.ECDH -> sun.security.ec.ECDHKeyAgreement attributes: {ImplementedIn=Software, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunEC: Signature.NONEwithECDSA -> sun.security.ec.ECDSASignature$Raw attributes: {ImplementedIn=Software, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunEC: KeyPairGenerator.EC -> sun.security.ec.ECKeyPairGenerator aliases: [EllipticCurve] attributes: {ImplementedIn=Software, KeySize=256} SunEC: Signature.SHA1withECDSA -> sun.security.ec.ECDSASignature$SHA1 aliases: [1.2.840.10045.4.1, OID.1.2.840.10045.4.1] attributes: {ImplementedIn=Software, KeySize=256, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunEC: KeyFactory.EC -> sun.security.ec.ECKeyFactory aliases: [EllipticCurve] attributes: {ImplementedIn=Software} SunEC: Signature.SHA256withECDSA -> sun.security.ec.ECDSASignature$SHA256 aliases: [OID.1.2.840.10045.4.3.2, 1.2.840.10045.4.3.2] attributes: {ImplementedIn=Software, SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey} SunJSSE: KeyFactory.RSA -> sun.security.rsa.RSAKeyFactory aliases: [1.2.840.113549.1.1, OID.1.2.840.113549.1.1] SunJSSE: KeyPairGenerator.RSA -> sun.security.rsa.RSAKeyPairGenerator aliases: [1.2.840.113549.1.1, OID.1.2.840.113549.1.1] SunJSSE: Signature.MD2withRSA -> sun.security.rsa.RSASignature$MD2withRSA aliases: [1.2.840.113549.1.1.2, OID.1.2.840.113549.1.1.2] SunJSSE: Signature.MD5withRSA -> sun.security.rsa.RSASignature$MD5withRSA aliases: [1.2.840.113549.1.1.4, OID.1.2.840.113549.1.1.4] SunJSSE: Signature.SHA1withRSA -> sun.security.rsa.RSASignature$SHA1withRSA aliases: [1.2.840.113549.1.1.5, OID.1.2.840.113549.1.1.5, 1.3.14.3.2.29, OID.1.3.14.3.2.29] SunJSSE: Signature.MD5andSHA1withRSA -> sun.security.ssl.RSASignature SunJSSE: KeyManagerFactory.SunX509 -> sun.security.ssl.KeyManagerFactoryImpl$SunX509 SunJSSE: KeyManagerFactory.NewSunX509 -> sun.security.ssl.KeyManagerFactoryImpl$X509 aliases: [PKIX] SunJSSE: TrustManagerFactory.SunX509 -> sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory SunJSSE: TrustManagerFactory.PKIX -> sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory aliases: [SunPKIX, X509, X.509] SunJSSE: SSLContext.TLSv1 -> sun.security.ssl.SSLContextImpl$TLS10Context aliases: [TLS, SSL, SSLv3] SunJSSE: SSLContext.TLSv1.1 -> sun.security.ssl.SSLContextImpl$TLS11Context SunJSSE: SSLContext.TLSv1.2 -> sun.security.ssl.SSLContextImpl$TLS12Context SunJSSE: SSLContext.Default -> sun.security.ssl.SSLContextImpl$DefaultSSLContext SunJSSE: KeyStore.PKCS12 -> sun.security.pkcs12.PKCS12KeyStore SunJCE: Cipher.RSA -> com.sun.crypto.provider.RSACipher attributes: {SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey, SupportedPaddings=NOPADDING|PKCS1PADDING|OAEPWITHMD5ANDMGF1PADDING|OAEPWITHSHA1ANDMGF1PADDING|OAEPWITHSHA-1ANDMGF1PADDING|OAEPWITHSHA-224ANDMGF1PADDING|OAEPWITHSHA-256ANDMGF1PADDING|OAEPWITHSHA-384ANDMGF1PADDING|OAEPWITHSHA-512ANDMGF1PADDING, S upportedModes=ECB} SunJCE: Cipher.DES -> com.sun.crypto.provider.DESCipher attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING, SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64} SunJCE: Cipher.DESede -> com.sun.crypto.provider.DESedeCipher aliases: [TripleDES] attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING, SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64} SunJCE: Cipher.DESedeWrap -> com.sun.crypto.provider.DESedeWrapCipher attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING, SupportedModes=CBC} SunJCE: Cipher.PBEWithMD5AndDES -> com.sun.crypto.provider.PBEWithMD5AndDESCipher aliases: [OID.1.2.840.113549.1.5.3, 1.2.840.113549.1.5.3] SunJCE: Cipher.PBEWithMD5AndTripleDES -> com.sun.crypto.provider.PBEWithMD5AndTripleDESCipher SunJCE: Cipher.PBEWithSHA1AndRC2_40 -> com.sun.crypto.provider.PKCS12PBECipherCore$PBEWithSHA1AndRC2_40 aliases: [OID.1.2.840.113549.1.12.1.6, 1.2.840.113549.1.12.1.6] SunJCE: Cipher.PBEWithSHA1AndDESede -> com.sun.crypto.provider.PKCS12PBECipherCore$PBEWithSHA1AndDESede aliases: [OID.1.2.840.113549.1.12.1.3, 1.2.840.113549.1.12.1.3] SunJCE: Cipher.Blowfish -> com.sun.crypto.provider.BlowfishCipher attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING, SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64} SunJCE: Cipher.AES -> com.sun.crypto.provider.AESCipher$General aliases: [Rijndael] attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING, SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64|CFB72|CFB80|CFB88|CFB96|CFB104|CFB112|CFB120|CFB128|OFB72|OFB80|OFB88|OFB96|OFB104|OFB112|OFB120|OFB128} SunJCE: Cipher.AES_128/ECB/NoPadding -> com.sun.crypto.provider.AESCipher$AES128_ECB_NoPadding aliases: [2.16.840.1.101.3.4.1.1, OID.2.16.840.1.101.3.4.1.1] SunJCE: Cipher.AES_128/CBC/NoPadding -> com.sun.crypto.provider.AESCipher$AES128_CBC_NoPadding aliases: [2.16.840.1.101.3.4.1.2, OID.2.16.840.1.101.3.4.1.2] SunJCE: Cipher.AES_128/OFB/NoPadding -> com.sun.crypto.provider.AESCipher$AES128_OFB_NoPadding aliases: [2.16.840.1.101.3.4.1.3, OID.2.16.840.1.101.3.4.1.3] SunJCE: Cipher.AES_128/CFB/NoPadding -> com.sun.crypto.provider.AESCipher$AES128_CFB_NoPadding aliases: [2.16.840.1.101.3.4.1.4, OID.2.16.840.1.101.3.4.1.4] SunJCE: Cipher.AES_192/ECB/NoPadding -> com.sun.crypto.provider.AESCipher$AES192_ECB_NoPadding aliases: [2.16.840.1.101.3.4.1.21, OID.2.16.840.1.101.3.4.1.21] SunJCE: Cipher.AES_192/CBC/NoPadding -> com.sun.crypto.provider.AESCipher$AES192_CBC_NoPadding aliases: [2.16.840.1.101.3.4.1.22, OID.2.16.840.1.101.3.4.1.22] SunJCE: Cipher.AES_192/OFB/NoPadding -> com.sun.crypto.provider.AESCipher$AES192_OFB_NoPadding aliases: [2.16.840.1.101.3.4.1.23, OID.2.16.840.1.101.3.4.1.23] SunJCE: Cipher.AES_192/CFB/NoPadding -> com.sun.crypto.provider.AESCipher$AES192_CFB_NoPadding aliases: [2.16.840.1.101.3.4.1.24, OID.2.16.840.1.101.3.4.1.24] SunJCE: Cipher.AES_256/ECB/NoPadding -> com.sun.crypto.provider.AESCipher$AES256_ECB_NoPadding aliases: [2.16.840.1.101.3.4.1.41, OID.2.16.840.1.101.3.4.1.41] SunJCE: Cipher.AES_256/CBC/NoPadding -> com.sun.crypto.provider.AESCipher$AES256_CBC_NoPadding aliases: [2.16.840.1.101.3.4.1.42, OID.2.16.840.1.101.3.4.1.42] SunJCE: Cipher.AES_256/OFB/NoPadding -> com.sun.crypto.provider.AESCipher$AES256_OFB_NoPadding aliases: [2.16.840.1.101.3.4.1.43, OID.2.16.840.1.101.3.4.1.43] SunJCE: Cipher.AES_256/CFB/NoPadding -> com.sun.crypto.provider.AESCipher$AES256_CFB_NoPadding aliases: [2.16.840.1.101.3.4.1.44, OID.2.16.840.1.101.3.4.1.44] SunJCE: Cipher.AESWrap -> com.sun.crypto.provider.AESWrapCipher$General attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING, SupportedModes=ECB} SunJCE: Cipher.AESWrap_128 -> com.sun.crypto.provider.AESWrapCipher$AES128 aliases: [2.16.840.1.101.3.4.1.5, OID.2.16.840.1.101.3.4.1.5] SunJCE: Cipher.AESWrap_192 -> com.sun.crypto.provider.AESWrapCipher$AES192 aliases: [2.16.840.1.101.3.4.1.25, OID.2.16.840.1.101.3.4.1.25] SunJCE: Cipher.AESWrap_256 -> com.sun.crypto.provider.AESWrapCipher$AES256 aliases: [2.16.840.1.101.3.4.1.45, OID.2.16.840.1.101.3.4.1.45] SunJCE: Cipher.RC2 -> com.sun.crypto.provider.RC2Cipher attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING, SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64} SunJCE: Cipher.ARCFOUR -> com.sun.crypto.provider.ARCFOURCipher aliases: [RC4] attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING, SupportedModes=ECB} SunJCE: KeyGenerator.DES -> com.sun.crypto.provider.DESKeyGenerator SunJCE: KeyGenerator.DESede -> com.sun.crypto.provider.DESedeKeyGenerator aliases: [TripleDES] SunJCE: KeyGenerator.Blowfish -> com.sun.crypto.provider.BlowfishKeyGenerator SunJCE: KeyGenerator.AES -> com.sun.crypto.provider.AESKeyGenerator aliases: [Rijndael] SunJCE: KeyGenerator.RC2 -> com.sun.crypto.provider.KeyGeneratorCore$RC2KeyGenerator SunJCE: KeyGenerator.ARCFOUR -> com.sun.crypto.provider.KeyGeneratorCore$ARCFOURKeyGenerator aliases: [RC4] SunJCE: KeyGenerator.HmacMD5 -> com.sun.crypto.provider.HmacMD5KeyGenerator SunJCE: KeyGenerator.HmacSHA1 -> com.sun.crypto.provider.HmacSHA1KeyGenerator aliases: [OID.1.2.840.113549.2.7, 1.2.840.113549.2.7] SunJCE: KeyGenerator.HmacSHA224 -> com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA224 aliases: [OID.1.2.840.113549.2.8, 1.2.840.113549.2.8] SunJCE: KeyGenerator.HmacSHA256 -> com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA256 aliases: [OID.1.2.840.113549.2.9, 1.2.840.113549.2.9] SunJCE: KeyGenerator.HmacSHA384 -> com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA384 aliases: [OID.1.2.840.113549.2.10, 1.2.840.113549.2.10] SunJCE: KeyGenerator.HmacSHA512 -> com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA512 aliases: [OID.1.2.840.113549.2.11, 1.2.840.113549.2.11] SunJCE: KeyPairGenerator.DiffieHellman -> com.sun.crypto.provider.DHKeyPairGenerator aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1] SunJCE: AlgorithmParameterGenerator.DiffieHellman -> com.sun.crypto.provider.DHParameterGenerator aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1] SunJCE: KeyAgreement.DiffieHellman -> com.sun.crypto.provider.DHKeyAgreement aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1] attributes: {SupportedKeyClasses=javax.crypto.interfaces.DHPublicKey|javax.crypto.interfaces.DHPrivateKey} SunJCE: AlgorithmParameters.DiffieHellman -> com.sun.crypto.provider.DHParameters aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1] SunJCE: AlgorithmParameters.DES -> com.sun.crypto.provider.DESParameters SunJCE: AlgorithmParameters.DESede -> com.sun.crypto.provider.DESedeParameters aliases: [TripleDES] SunJCE: AlgorithmParameters.PBE -> com.sun.crypto.provider.PBEParameters SunJCE: AlgorithmParameters.PBEWithMD5AndDES -> com.sun.crypto.provider.PBEParameters aliases: [OID.1.2.840.113549.1.5.3, 1.2.840.113549.1.5.3] SunJCE: AlgorithmParameters.PBEWithMD5AndTripleDES -> com.sun.crypto.provider.PBEParameters SunJCE: AlgorithmParameters.PBEWithSHA1AndDESede -> com.sun.crypto.provider.PBEParameters aliases: [OID.1.2.840.113549.1.12.1.3, 1.2.840.113549.1.12.1.3] SunJCE: AlgorithmParameters.PBEWithSHA1AndRC2_40 -> com.sun.crypto.provider.PBEParameters aliases: [OID.1.2.840.113549.1.12.1.6, 1.2.840.113549.1.12.1.6] SunJCE: AlgorithmParameters.Blowfish -> com.sun.crypto.provider.BlowfishParameters SunJCE: AlgorithmParameters.AES -> com.sun.crypto.provider.AESParameters aliases: [Rijndael] SunJCE: AlgorithmParameters.RC2 -> com.sun.crypto.provider.RC2Parameters SunJCE: AlgorithmParameters.OAEP -> com.sun.crypto.provider.OAEPParameters SunJCE: KeyFactory.DiffieHellman -> com.sun.crypto.provider.DHKeyFactory aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1] SunJCE: SecretKeyFactory.DES -> com.sun.crypto.provider.DESKeyFactory SunJCE: SecretKeyFactory.DESede -> com.sun.crypto.provider.DESedeKeyFactory aliases: [TripleDES] SunJCE: SecretKeyFactory.PBEWithMD5AndDES -> com.sun.crypto.provider.PBEKeyFactory$PBEWithMD5AndDES aliases: [OID.1.2.840.113549.1.5.3, 1.2.840.113549.1.5.3, PBE] SunJCE: SecretKeyFactory.PBEWithMD5AndTripleDES -> com.sun.crypto.provider.PBEKeyFactory$PBEWithMD5AndTripleDES SunJCE: SecretKeyFactory.PBEWithSHA1AndDESede -> com.sun.crypto.provider.PBEKeyFactory$PBEWithSHA1AndDESede aliases: [OID.1.2.840.113549.1.12.1.3, 1.2.840.113549.1.12.1.3] SunJCE: SecretKeyFactory.PBEWithSHA1AndRC2_40 -> com.sun.crypto.provider.PBEKeyFactory$PBEWithSHA1AndRC2_40 aliases: [OID.1.2.840.113549.1.12.1.6, 1.2.840.113549.1.12.1.6] SunJCE: SecretKeyFactory.PBKDF2WithHmacSHA1 -> com.sun.crypto.provider.PBKDF2HmacSHA1Factory aliases: [OID.1.2.840.113549.1.5.12, 1.2.840.113549.1.5.12] SunJCE: Mac.HmacMD5 -> com.sun.crypto.provider.HmacMD5 attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.HmacSHA1 -> com.sun.crypto.provider.HmacSHA1 aliases: [OID.1.2.840.113549.2.7, 1.2.840.113549.2.7] attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.HmacSHA224 -> com.sun.crypto.provider.HmacCore$HmacSHA224 aliases: [OID.1.2.840.113549.2.8, 1.2.840.113549.2.8] attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.HmacSHA256 -> com.sun.crypto.provider.HmacCore$HmacSHA256 aliases: [OID.1.2.840.113549.2.9, 1.2.840.113549.2.9] attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.HmacSHA384 -> com.sun.crypto.provider.HmacCore$HmacSHA384 aliases: [OID.1.2.840.113549.2.10, 1.2.840.113549.2.10] attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.HmacSHA512 -> com.sun.crypto.provider.HmacCore$HmacSHA512 aliases: [OID.1.2.840.113549.2.11, 1.2.840.113549.2.11] attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.HmacPBESHA1 -> com.sun.crypto.provider.HmacPKCS12PBESHA1 attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.SslMacMD5 -> com.sun.crypto.provider.SslMacCore$SslMacMD5 attributes: {SupportedKeyFormats=RAW} SunJCE: Mac.SslMacSHA1 -> com.sun.crypto.provider.SslMacCore$SslMacSHA1 attributes: {SupportedKeyFormats=RAW} SunJCE: KeyStore.JCEKS -> com.sun.crypto.provider.JceKeyStore SunJCE: KeyGenerator.SunTlsPrf -> com.sun.crypto.provider.TlsPrfGenerator$V10 SunJCE: KeyGenerator.SunTls12Prf -> com.sun.crypto.provider.TlsPrfGenerator$V12 SunJCE: KeyGenerator.SunTlsMasterSecret -> com.sun.crypto.provider.TlsMasterSecretGenerator aliases: [SunTls12MasterSecret] SunJCE: KeyGenerator.SunTlsKeyMaterial -> com.sun.crypto.provider.TlsKeyMaterialGenerator aliases: [SunTls12KeyMaterial] SunJCE: KeyGenerator.SunTlsRsaPremasterSecret -> com.sun.crypto.provider.TlsRsaPremasterSecretGenerator aliases: [SunTls12RsaPremasterSecret] SunJGSS: GssApiMechanism.1.2.840.113554.1.2.2 -> sun.security.jgss.krb5.Krb5MechFactory SunJGSS: GssApiMechanism.1.3.6.1.5.5.2 -> sun.security.jgss.spnego.SpNegoMechFactory SunSASL: SaslClientFactory.DIGEST-MD5 -> com.sun.security.sasl.digest.FactoryImpl SunSASL: SaslClientFactory.NTLM -> com.sun.security.sasl.ntlm.FactoryImpl SunSASL: SaslClientFactory.GSSAPI -> com.sun.security.sasl.gsskerb.FactoryImpl SunSASL: SaslClientFactory.EXTERNAL -> com.sun.security.sasl.ClientFactoryImpl SunSASL: SaslClientFactory.PLAIN -> com.sun.security.sasl.ClientFactoryImpl SunSASL: SaslClientFactory.CRAM-MD5 -> com.sun.security.sasl.ClientFactoryImpl SunSASL: SaslServerFactory.CRAM-MD5 -> com.sun.security.sasl.ServerFactoryImpl SunSASL: SaslServerFactory.GSSAPI -> com.sun.security.sasl.gsskerb.FactoryImpl SunSASL: SaslServerFactory.DIGEST-MD5 -> com.sun.security.sasl.digest.FactoryImpl SunSASL: SaslServerFactory.NTLM -> com.sun.security.sasl.ntlm.FactoryImpl XMLDSig: TransformService.http://www.w3.org/2002/06/xmldsig-filter2 -> org.jcp.xml.dsig.internal.dom.DOMXPathFilter2Transform aliases: [XPATH2] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/2000/09/xmldsig#enveloped-signature -> org.jcp.xml.dsig.internal.dom.DOMEnvelopedTransform aliases: [ENVELOPED] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/2001/10/xml-exc-c14n#WithComments -> org.jcp.xml.dsig.internal.dom.DOMExcC14NMethod aliases: [EXCLUSIVE_WITH_COMMENTS] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/2001/10/xml-exc-c14n# -> org.jcp.xml.dsig.internal.dom.DOMExcC14NMethod aliases: [EXCLUSIVE] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments -> org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14NMethod aliases: [INCLUSIVE_WITH_COMMENTS] attributes: {MechanismType=DOM} XMLDSig: XMLSignatureFactory.DOM -> org.jcp.xml.dsig.internal.dom.DOMXMLSignatureFactory XMLDSig: TransformService.http://www.w3.org/2006/12/xml-c14n11 -> org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14N11Method attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/2000/09/xmldsig#base64 -> org.jcp.xml.dsig.internal.dom.DOMBase64Transform aliases: [BASE64] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315 -> org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14NMethod aliases: [INCLUSIVE] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/TR/1999/REC-xpath-19991116 -> org.jcp.xml.dsig.internal.dom.DOMXPathTransform aliases: [XPATH] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/TR/1999/REC-xslt-19991116 -> org.jcp.xml.dsig.internal.dom.DOMXSLTTransform aliases: [XSLT] attributes: {MechanismType=DOM} XMLDSig: TransformService.http://www.w3.org/2006/12/xml-c14n11#WithComments -> org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14N11Method attributes: {MechanismType=DOM} XMLDSig: KeyInfoFactory.DOM -> org.jcp.xml.dsig.internal.dom.DOMKeyInfoFactory SunPCSC: TerminalFactory.PC/SC -> sun.security.smartcardio.SunPCSC$Factory {code} > Unable to set a ssl provider > ---------------------------- > > Key: KAFKA-3647 > URL: https://issues.apache.org/jira/browse/KAFKA-3647 > Project: Kafka > Issue Type: Bug > Components: security > Affects Versions: 0.9.0.1 > Environment: Centos, OracleJRE 8, Vagrant > Reporter: Elvar > > When defining a ssl provider Kafka does not start because the provider was > not found. > {code} > [2016-05-02 13:48:48,252] FATAL [Kafka Server 11], Fatal error during > KafkaServer startup. Prepare to shutdown (kafka.server.KafkaServer) > org.apache.kafka.common.KafkaException: > org.apache.kafka.common.KafkaException: > java.security.NoSuchProviderException: no such provider: sun.security.ec.SunEC > at > org.apache.kafka.common.network.SslChannelBuilder.configure(SslChannelBuilder.java:44) > {code} > To test > {code} > /bin/kafka-server-start /etc/kafka/server.properties --override > ssl.provider=sun.security.ec.SunEC > {code} > This is stopping us from talking to Kafka with SSL from Go programs because > no common cipher suites are available. > Using sslscan this is available from Kafka > {code} > Supported Server Cipher(s): > Accepted TLSv1 256 bits DHE-DSS-AES256-SHA > Accepted TLSv1 128 bits DHE-DSS-AES128-SHA > Accepted TLSv1 128 bits EDH-DSS-DES-CBC3-SHA > Accepted TLS11 256 bits DHE-DSS-AES256-SHA > Accepted TLS11 128 bits DHE-DSS-AES128-SHA > Accepted TLS11 128 bits EDH-DSS-DES-CBC3-SHA > Accepted TLS12 256 bits DHE-DSS-AES256-GCM-SHA384 > Accepted TLS12 256 bits DHE-DSS-AES256-SHA256 > Accepted TLS12 256 bits DHE-DSS-AES256-SHA > Accepted TLS12 128 bits DHE-DSS-AES128-GCM-SHA256 > Accepted TLS12 128 bits DHE-DSS-AES128-SHA256 > Accepted TLS12 128 bits DHE-DSS-AES128-SHA > Accepted TLS12 128 bits EDH-DSS-DES-CBC3-SHA > Preferred Server Cipher(s): > SSLv2 0 bits (NONE) > TLSv1 256 bits DHE-DSS-AES256-SHA > TLS11 256 bits DHE-DSS-AES256-SHA > TLS12 256 bits DHE-DSS-AES256-GCM-SHA384 > {code} > From the Golang documentation these are avilable there > {code} > TLS_RSA_WITH_RC4_128_SHA uint16 = 0x0005 > TLS_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0x000a > TLS_RSA_WITH_AES_128_CBC_SHA uint16 = 0x002f > TLS_RSA_WITH_AES_256_CBC_SHA uint16 = 0x0035 > TLS_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0x009c > TLS_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0x009d > TLS_ECDHE_ECDSA_WITH_RC4_128_SHA uint16 = 0xc007 > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA uint16 = 0xc009 > TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA uint16 = 0xc00a > TLS_ECDHE_RSA_WITH_RC4_128_SHA uint16 = 0xc011 > TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0xc012 > TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA uint16 = 0xc013 > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA uint16 = 0xc014 > TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02f > TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02b > TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc030 > TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc02c > {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)