Hello!

On Fri, Jul 19, 2019 at 10:52:55AM -0700, PGNet Dev wrote:

> >> And, if I change nginx to be 'TLSv1.3-only',
> >>
> >> -  ssl_protocols TLSv1.3 TLSv1.2;
> >> -  ssl_ciphers "TLS13-CHACHA20-POLY1305-SHA256 TLS13-AES-256-GCM-SHA384 
> >> TLS13-AES-128-GCM-SHA256 ECDHE-ECDSA-CHACHA20-POLY1305";
> >> +  ssl_protocols TLSv1.3;
> >> +  ssl_ciphers "TLS13-CHACHA20-POLY1305-SHA256 TLS13-AES-256-GCM-SHA384 
> >> TLS13-AES-128-GCM-SHA256";
> >>
> >> even the webserver config check FAILs,
> >>
> >>    nginxconfcheck
> >>            TLS13-AES-128-GCM-SHA256") failed (SSL: error:1410D0B9:SSL 
> >> routines:SSL_CTX_set_cipher_list:no cipher match)
> >>            nginx: configuration file /usr/local/etc/nginx/nginx.conf test 
> >> failed
> >>
> >> and the server fails to start.
> > 
> > That's because the cipher string listed contains no valid ciphers.
> 
> 
> Sorry, I'm missing something :-/
> 
> What's specifically "invalid" about the 3, listed ciphers?
> 
>       TLS13-CHACHA20-POLY1305-SHA256 TLS13-AES-256-GCM-SHA384 
> TLS13-AES-128-GCM-SHA256

There are no such ciphers in the OpenSSL.
Try it yourself:

$ openssl ciphers TLS13-CHACHA20-POLY1305-SHA256
Error in cipher list
0:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher 
match:ssl/ssl_lib.c:2549:

[...]

-- 
Maxim Dounin
http://mdounin.ru/
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx

Reply via email to