Re: Problem with OpenSSL cipher suites -what's wrong with this configuration?

2019-08-08 Thread logo
Mark, Am 08.08.2019 11:45, schrieb Mark Thomas: On 08/08/2019 10:15, Alten, Jessica-Aileen wrote: Therefore, I guess Tomcat cannot interpret these cipher suites for TLS 1.3. So is this possibly a bug in Tomcat with openSSL 1.1.1c and JDK 8 (again: I am not talking about JSSE here, it can only

Re: Problem with OpenSSL cipher suites -what's wrong with this configuration?

2019-08-08 Thread Mark Thomas
On 08/08/2019 10:15, Alten, Jessica-Aileen wrote: > Therefore, I guess Tomcat cannot interpret these cipher suites for TLS 1.3. > So is this possibly a bug in Tomcat with openSSL 1.1.1c > and JDK 8 (again: I am not talking about JSSE here, it can only do TLS 1.2)? Tomcat supports co

RE: Problem with OpenSSL cipher suites -what's wrong with this configuration?

2019-08-08 Thread Alten, Jessica-Aileen
> > I have a problem with the Tomcat 9.0.22 configuration for TLSv1.3 using > > jdk8u222-b10_openj9-0.15.1 on Windows Server 2016. In principle > > TLSv1.3 works, but I want to specify the allowed cipher suites as well. > > > > The relevant parts of server

Re: Problem with OpenSSL cipher suites -what's wrong with this configuration?

2019-08-07 Thread Peter Kreuser
t to specify the allowed cipher suites as well. > > The relevant parts of server.xml are: > SSLEngine="on" /> > ... >maxThreads="150" SSLEnabled="true" > sslImplementationName="org.apache.tomcat.util.net.openssl.OpenSSLI

Problem with OpenSSL cipher suites -what's wrong with this configuration?

2019-08-07 Thread Alten, Jessica-Aileen
Dear all, I have a problem with the Tomcat 9.0.22 configuration for TLSv1.3 using jdk8u222-b10_openj9-0.15.1 on Windows Server 2016. In principle TLSv1.3 works, but I want to specify the allowed cipher suites as well. The relevant parts of server.xml are

Re: Has anybody ever heard of "ECDHE-ECDSA-CHACHA20-POLY1305"? was Re: TLS protocols and cipher suites

2019-03-19 Thread Peter@Kreuser-Online
Hi James, > Am 18.03.2019 um 23:49 schrieb James H. H. Lampert : > > I've just (same customer as before) been asked about > ECDHE-ECDSA-CHACHA20-POLY1305 > and ECDHE-RSA-CHACHA20-POLY1305 > > and I can't find either one on the Sun or IBM JSSE cipher lists for Java 8. > Most certainly only >=Ja

Re: Has anybody ever heard of "ECDHE-ECDSA-CHACHA20-POLY1305"? was Re: TLS protocols and cipher suites

2019-03-19 Thread Peter@Kreuser-Online
Oh, and yes I’ve heard about them and used the RSA version! Peter > Am 18.03.2019 um 23:49 schrieb James H. H. Lampert : > > I've just (same customer as before) been asked about > ECDHE-ECDSA-CHACHA20-POLY1305 > and ECDHE-RSA-CHACHA20-POLY1305 > > and I can't find either one on the Sun or IBM

Has anybody ever heard of "ECDHE-ECDSA-CHACHA20-POLY1305"? was Re: TLS protocols and cipher suites

2019-03-18 Thread James H. H. Lampert
I've just (same customer as before) been asked about ECDHE-ECDSA-CHACHA20-POLY1305 and ECDHE-RSA-CHACHA20-POLY1305 and I can't find either one on the Sun or IBM JSSE cipher lists for Java 8. -- JHHL - To unsubscribe, e-mail: us

Re: TLS protocols and cipher suites available under JSSE?

2019-03-15 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 James, On 3/13/19 20:38, James H. H. Lampert wrote: > Thanks, Mr. Schultz. > > I managed to find the IBM docs. At least some of the cipher suites > the customer is talking about are supported all the way back to > their 7.0

Re: TLS protocols and cipher suites available under JSSE?

2019-03-14 Thread James H. H. Lampert
On 3/13/19, 2:53 PM, Christopher Schultz wrote: 7: https://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.html 8: https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html If you are using a non-standard "provider" (like one from IBM!), then you'

Re: TLS protocols and cipher suites available under JSSE?

2019-03-13 Thread James H. H. Lampert
Thanks, Mr. Schultz. I managed to find the IBM docs. At least some of the cipher suites the customer is talking about are supported all the way back to their 7.0 JVM. I've specified cipher suites by name in the connector, but I don't think I've done protocols. "TLS,&q

Re: TLS protocols and cipher suites available under JSSE?

2019-03-13 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 James, On 3/13/19 12:48 PM, James H. H. Lampert wrote: > We've got a customer who is asking about cipher suites and TLS > protocols. > > Given Tomcat 7.0.93, with the option of running it under JDK 7.0, > JDK 7.1, or JDK 8.0, c

TLS protocols and cipher suites available under JSSE?

2019-03-13 Thread James H. H. Lampert
We've got a customer who is asking about cipher suites and TLS protocols. Given Tomcat 7.0.93, with the option of running it under JDK 7.0, JDK 7.1, or JDK 8.0, can somebody point me to docs explaining what TLS levels and cipher suites are available under the various JVMs? --

Re: Why will Tomcat not accept EC cipher suites?

2018-01-09 Thread Christopher Schultz
> 2018 8:16 PM To: users@tomcat.apache.org Subject: Re: Why will >> Tomcat not accept EC cipher suites? >> >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 >> >> John, >> >> On 1/8/18 6:28 PM, john.e.gr...@wellsfargo.com.INVALID wrote: >>> Chris and Ma

RE: Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread John.E.Gregg
Chris, > -Original Message- > From: Christopher Schultz [mailto:ch...@christopherschultz.net] > Sent: Monday, January 08, 2018 8:16 PM > To: users@tomcat.apache.org > Subject: Re: Why will Tomcat not accept EC cipher suites? > > -BEGIN PGP SIGNED MESSAG

Re: Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread Christopher Schultz
018 5:21 PM To: users@tomcat.apache.org Subject: Re: Why will >> Tomcat not accept EC cipher suites? >> >> -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 >> >> Mark, >> >> On 1/8/18 3:36 PM, Mark Thomas wrote: >>> On 08/01/18 19:34, john.e.gr...@wellsfargo.

RE: Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread John.E.Gregg
Chris and Mark, > -Original Message- > From: Christopher Schultz [mailto:ch...@christopherschultz.net] > Sent: Monday, January 08, 2018 5:21 PM > To: users@tomcat.apache.org > Subject: Re: Why will Tomcat not accept EC cipher suites? > > -BEGIN PGP SIGNED MESSAG

Re: Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread Christopher Schultz
bled them, etc. With verbose >> SSL enabled, Tomcat, however, complains about >> "http-bio-7114-exec-4, handling exception: >> javax.net.ssl.SSLHandshakeException: no cipher suites in >> common." >> >> If I omit the "ciphers" property of th

Re: Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread Mark Thomas
> javax.net.ssl.SSLHandshakeException: no cipher suites in common." > > If I omit the "ciphers" property of the connector, I get this: > > No available cipher suite for TLSv1 > No available cipher suite for TLSv1.1 > No available cipher suite for TLSv1.2 >

RE: Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread Gali, Vamsi A
o:john.e.gr...@wellsfargo.com.INVALID] Sent: Monday, January 08, 2018 2:35 PM To: users@tomcat.apache.org Subject: Why will Tomcat not accept EC cipher suites? All, I'm using Tomcat 7.0.82 and java 1.8.0_152. I cannot get Tomcat to accept elliptic curve ciphers. I've written a sm

Why will Tomcat not accept EC cipher suites?

2018-01-08 Thread John.E.Gregg
on't think there is anything in the JDK that has disabled them, etc. With verbose SSL enabled, Tomcat, however, complains about "http-bio-7114-exec-4, handling exception: javax.net.ssl.SSLHandshakeException: no cipher suites in common." If I omit the "ciphers" propert

Re: Enforcing server preference for cipher suites

2017-10-13 Thread Harish Krishnan
Hi Chris, thanks for sharing your opinion. Just my last comment here to close this thread. BSAFE is anyways EOL now (or will be soon). We are already working on a replacement. Currently we are using the latest and greatest version of BSAFE with extended support. Once again, thank you all for the

Re: Enforcing server preference for cipher suites

2017-10-12 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Harish, On 10/12/17 10:55 AM, Harish Krishnan wrote: > Thank you all for the help and responses. We figured out what the > problem was. What I did was correct in terms of the attribute > setting, the tomcat version used and the JRE version used. How

Re: Enforcing server preference for cipher suites

2017-10-12 Thread Harish Krishnan
n for the timely response and help! Sent from my iPhone > On Oct 10, 2017, at 10:26 AM, Konstantin Kolinko > wrote: > > 2017-10-09 19:31 GMT+03:00 Harish Krishnan : >> Hi All, >> >> Need your expert input here. >> Not sure what I am doing wrong, but I can

Re: Enforcing server preference for cipher suites

2017-10-11 Thread Harish Krishnan
. Sent from my iPhone > On Oct 10, 2017, at 10:26 AM, Konstantin Kolinko > wrote: > > 2017-10-09 19:31 GMT+03:00 Harish Krishnan : >> Hi All, >> >> Need your expert input here. >> Not sure what I am doing wrong, but I cannot get this server preference >>

Re: Enforcing server preference for cipher suites

2017-10-10 Thread Konstantin Kolinko
2017-10-09 19:31 GMT+03:00 Harish Krishnan : > Hi All, > > Need your expert input here. > Not sure what I am doing wrong, but I cannot get this server preference > cipher suites feature working. > > My setup: > Latest tomcat 7.x build (which supports useServerCip

Re: Enforcing server preference for cipher suites

2017-10-10 Thread Harish Krishnan
Thanks for the response, Peter. The client is not doing anything other than a simple https connection to tomcat. The cipher sites used by the client is the default JRE 1.8 cipher suites. I have not configured or requesting for any particular cipher suite when connecting to Tomcat. During the

Re: Enforcing server preference for cipher suites

2017-10-09 Thread Peter Kreuser
on the internet, you could try ssllabs.com. The settings seem to be OK, unless I do not see an incorrect formatting on my phone. HTH, Peter > Let me know if i am missing anything or is my understanding is incorrect. > > id="orion.server.https" > a

Re: Enforcing server preference for cipher suites

2017-10-09 Thread Harish Krishnan
ltz.net> wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA256 > > Harish, > > On 10/9/17 12:31 PM, Harish Krishnan wrote: > > Need your expert input here. Not sure what I am doing wrong, but I > > cannot get this server preference cipher suites feature

Re: Enforcing server preference for cipher suites

2017-10-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Harish, On 10/9/17 12:31 PM, Harish Krishnan wrote: > Need your expert input here. Not sure what I am doing wrong, but I > cannot get this server preference cipher suites feature working. > > My setup: Latest tomcat 7.x build (wh

Enforcing server preference for cipher suites

2017-10-09 Thread Harish Krishnan
Hi All, Need your expert input here. Not sure what I am doing wrong, but I cannot get this server preference cipher suites feature working. My setup: Latest tomcat 7.x build (which supports useServerCipherSuitesOrder attribute) Latest Java 1.8 build. No matter what value I set to this

Re: [OT] Ability to set cipher suites for websocket connections

2017-01-17 Thread Christopher Schultz
t; Hi, >>>> >>>> There is a user property >>>> "org.apache.tomcat.websocket.SSL_PROTOCOLS" that you can use >>>> to provide the list of permitted SSL protocols when >>>> connecting to a websocket with WsWebSocketContainer. I was >&g

Re: [OT] Ability to set cipher suites for websocket connections

2017-01-17 Thread Mark Thomas
ot; that you can use to >>> provide the list of permitted SSL protocols when connecting to a >>> websocket with WsWebSocketContainer. I was expecting that there >>> would be a similar property to allow you to set the list of >>> permitted SSL cipher suites as well. >

Re: [OT] Ability to set cipher suites for websocket connections

2017-01-17 Thread Christopher Schultz
de the list of permitted SSL protocols when connecting to a >> websocket with WsWebSocketContainer. I was expecting that there >> would be a similar property to allow you to set the list of >> permitted SSL cipher suites as well. >> >> I've checked the code (for v

Re: Ability to set cipher suites for websocket connections

2017-01-17 Thread Michael Orr
hen >> connecting to a websocket with WsWebSocketContainer. I was expecting >> that there would be a similar property to allow you to set the list of >> permitted SSL cipher suites as well. >> >> I've checked the code (for version 7.0.73, and also 9.0.0.M15) and >> th

Re: Ability to set cipher suites for websocket connections

2017-01-17 Thread Mark Thomas
hat there would be a similar property to allow you to set the list of > permitted SSL cipher suites as well. > > I've checked the code (for version 7.0.73, and also 9.0.0.M15) and > there doesn't seem to be any mention of such an option. I can see it

Ability to set cipher suites for websocket connections

2017-01-17 Thread Michael Orr
mitted SSL cipher suites as well. I've checked the code (for version 7.0.73, and also 9.0.0.M15) and there doesn't seem to be any mention of such an option. I can see it calling SSLEngine.setEnabledProtocols() but not SSLEngine.setEnabledCipherSuites(). Is there a particular re

Re: [OT] ECDHE cipher suites missing on Amazon Linux / OpenJDK 7 and 8 ??

2016-10-06 Thread Rainer Jung
ity policy has these algorithms disabled: jdk.tls.disabledAlgorithms=SSLv3, RC4, MD5withRSA, DH keySize < 768 I'm okay with all those. I've installed the "Java Unlimited Strength Policy Files" which may or may not have been necessary (in general) but that doesn't enable the E

Re: [OT] ECDHE cipher suites missing on Amazon Linux / OpenJDK 7 and 8 ??

2016-10-05 Thread Christopher Schultz
HA * >>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 >>> TLS_DH_anon_WITH_AES_128_CBC_SHA >>> TLS_DH_anon_WITH_AES_128_CBC_SHA256 >>> TLS_DH_anon_WITH_AES_256_CBC_SHA >>> TLS_DH_anon_WITH_AES_256_CBC_SHA256 * >>> TLS_EMPTY_RENEGOTIATION_INFO_SCSV >>> TLS

Re: [OT] ECDHE cipher suites missing on Amazon Linux / OpenJDK 7 and 8 ??

2016-10-05 Thread Christopher Schultz
gt; TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5 >> TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA >> TLS_KRB5_EXPORT_WITH_RC4_40_MD5 TLS_KRB5_EXPORT_WITH_RC4_40_SHA >> TLS_KRB5_WITH_3DES_EDE_CBC_MD5 TLS_KRB5_WITH_3DES_EDE_CBC_SHA >> TLS_KRB5_WITH_DES_CBC_MD5 TLS_KRB5_WITH_DES_CBC_SHA >> TLS_KRB5_WITH_RC4_128_MD

Re: [OT] ECDHE cipher suites missing on Amazon Linux / OpenJDK 7 and 8 ??

2016-10-05 Thread Rainer Jung
C_SHA * TLS_RSA_WITH_AES_128_CBC_SHA256 * TLS_RSA_WITH_AES_256_CBC_SHA * TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_NULL_SHA256 Note the complete lack of ECDH or ECDHE cipher suites. Now again with Java 8: $ java8 -showversion -classpath libs/chadis-tools-1.55.jar com.chadis.tools.securit

[OT] ECDHE cipher suites missing on Amazon Linux / OpenJDK 7 and 8 ??

2016-10-05 Thread Christopher Schultz
C_SHA256 * TLS_RSA_WITH_AES_256_CBC_SHA * TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_NULL_SHA256 Note the complete lack of ECDH or ECDHE cipher suites. Now again with Java 8: $ java8 -showversion -classpath libs/chadis-tools-1.55.jar com.chadis.tools.security.SSLInfo openjdk version "1.8.0_101" Op

Re: Can tomcat be configured for ECDHE and DHE cipher suites

2016-05-25 Thread Christopher Schultz
d with Java 8 only So >> is there a way (in java 7 and BIO and NIO support ) or another >> parameter we can use with "ciphers" to force client follow the >> order of ciphers. > > No. > >> The JSSE implementation guide documents that the client tells the >

Re: Can tomcat be configured for ECDHE and DHE cipher suites

2016-05-25 Thread Mark Thomas
with "ciphers" to force client follow the order of ciphers. No. > The JSSE implementation guide documents that the client tells the server > which cipher suites it has available, and the server chooses the best > mutually acceptable cipher suite. Then the JSSE implementation gu

Re: Can tomcat be configured for ECDHE and DHE cipher suites

2016-05-25 Thread Utkarsh Dave
The JSSE implementation guide documents that the client tells the server which cipher suites it has available, and the server chooses the best mutually acceptable cipher suite. I am facing an issue where TLS_RSA_WITH_AES_256_CBC_SHA is being chosen from all other available ECDHE and DHE suites. -Ut

Re: Can tomcat be configured for ECDHE and DHE cipher suites

2016-05-20 Thread Utkarsh Dave
mcat - 7.0.69 configured for SSL > >>>> Connector - APR > >>>> Java - jdk1.7.0_101 > >>>> > >>>> > >>>> On Fri, May 20, 2016 at 4:10 PM, Mark Thomas > wrote: > >>>> > >>>>> On 20/05/2016 11:37,

Re: Can tomcat be configured for ECDHE and DHE cipher suites

2016-05-20 Thread Mark Thomas
Thomas wrote: >>>> >>>>> On 20/05/2016 11:37, Utkarsh Dave wrote: >>>>>> Hi Users and Tomcat team, >>>>>> >>>>>> Port 8443 on my product is configured for Tomcat and accepts inbound >>>>>> traffic from 3rd partie

Re: Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Utkarsh Dave
nfigured for Tomcat and accepts inbound > >>>> traffic from 3rd parties. > >>>> In the TLS handshake, Tomcat chooses TLS_RSA_WITH_AES_256_CBC_SHA over > >>> some > >>>> of the more secure cipher options offered by the 3rd party. The >

Re: Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Mark Thomas
duct is configured for Tomcat and accepts inbound >>>> traffic from 3rd parties. >>>> In the TLS handshake, Tomcat chooses TLS_RSA_WITH_AES_256_CBC_SHA over >>> some >>>> of the more secure cipher options offered by the 3rd party. The >>>> 3rd party

Re: Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Utkarsh Dave
dshake, Tomcat chooses TLS_RSA_WITH_AES_256_CBC_SHA > over > > > some > > > > of the more secure cipher options offered by the 3rd party. The > > > > 3rd party offers a list of 66 cipher suites that include many > > > > ECDHE and DHE variants. Tomcat configu

Re: Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Jan Dosoudil
affic from 3rd parties. > > > In the TLS handshake, Tomcat chooses TLS_RSA_WITH_AES_256_CBC_SHA over > > some > > > of the more secure cipher options offered by the 3rd party. The > > > 3rd party offers a list of 66 cipher suites that include many > > > ECDHE and DHE var

Re: Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Utkarsh Dave
8443 on my product is configured for Tomcat and accepts inbound > > traffic from 3rd parties. > > In the TLS handshake, Tomcat chooses TLS_RSA_WITH_AES_256_CBC_SHA over > some > > of the more secure cipher options offered by the 3rd party. The > > 3rd party offers a list of 66 c

Re: Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Mark Thomas
options offered by the 3rd party. The > 3rd party offers a list of 66 cipher suites that include many > ECDHE and DHE variants. Tomcat configured on my product preferred cipher > suite is AES256-SHA. > Can The tomcat be configured for ECDHE and DHE suites must be > available and prefe

Can tomcat be configured for ECDHE and DHE cipher suites !

2016-05-20 Thread Utkarsh Dave
Hi Users and Tomcat team, Port 8443 on my product is configured for Tomcat and accepts inbound traffic from 3rd parties. In the TLS handshake, Tomcat chooses TLS_RSA_WITH_AES_256_CBC_SHA over some of the more secure cipher options offered by the 3rd party. The 3rd party offers a list of 66 cipher

Re: Problem specifying cipher suites in tomcat6

2015-06-01 Thread Konstantin Kolinko
2015-06-01 11:17 GMT+03:00 Ramon Pfeiffer : > Am 29.05.2015 um 23:31 schrieb Christopher Schultz: >> >> Lots of things have been fixed/added in more recent versions of Tomcat >> 6.0.x. Please give a quick test against Tomcat 6.0.latest: you don't >> even need to deploy your own web application on i

Re: Problem specifying cipher suites in tomcat6

2015-06-01 Thread Ramon Pfeiffer
, Charles R: From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] Subject: Problem specifying cipher suites in tomcat6 I'm currently trying to specify a list of cipher suites to be used by my connector in Tomcat 6.0.24. Anybody can shed some light on what I did wrong? Using a ve

RE: Problem specifying cipher suites in tomcat6

2015-05-29 Thread George Stanchev
more the better. George -Original Message- From: Christopher Schultz [mailto:ch...@christopherschultz.net] Sent: Friday, May 29, 2015 3:32 PM To: Tomcat Users List Subject: Re: Problem specifying cipher suites in tomcat6 -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ramon, On 5/29/15

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Christopher Schultz
R: >>>>> From: Ramon Pfeiffer >>>>> [mailto:ramon.pfeif...@uni-tuebingen.de] Subject: Problem >>>>> specifying cipher suites in tomcat6 >>>> >>>>> I'm currently trying to specify a list of cipher suites to >>>>>

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Ramon Pfeiffer
On 29.05.2015 21:12, Christopher Schultz wrote: > Ramon, > > On 5/29/15 3:32 AM, Ramon Pfeiffer wrote: >> Am 28.05.2015 um 18:56 schrieb Caldarale, Charles R: >>>> From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] >>>> Subject: Problem specifyin

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Sean Dawson
gelog." Not intending to be antagonistic - just trying to give fair warning to OP. -Original Message- > From: André Warnier [mailto:a...@ice-sa.com] > Sent: Friday, May 29, 2015 12:12 PM > To: Tomcat Users List > Subject: Re: Problem specifying cipher suites in tomcat6 >

RE: Problem specifying cipher suites in tomcat6

2015-05-29 Thread George Stanchev
2:12 PM To: Tomcat Users List Subject: Re: Problem specifying cipher suites in tomcat6 Sean Dawson wrote: > I had significant problems trying to uncover a change in tomcat7 that > broke our app when upgrading from 42 to 57, for a couple weeks over > Christmas holidays. > > Turn

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Ramon, On 5/29/15 3:32 AM, Ramon Pfeiffer wrote: > Am 28.05.2015 um 18:56 schrieb Caldarale, Charles R: >>> From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] >>> Subject: Problem specifying cipher suites i

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread André Warnier
Sean Dawson wrote: I had significant problems trying to uncover a change in tomcat7 that broke our app when upgrading from 42 to 57, for a couple weeks over Christmas holidays. Turns out it was something we shouldn't have been doing - you mean, apart from top-posting here ? but it was defin

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Sean Dawson
I had significant problems trying to uncover a change in tomcat7 that broke our app when upgrading from 42 to 57, for a couple weeks over Christmas holidays. Turns out it was something we shouldn't have been doing - but it was definitely a change in tomcat (51 or so) that resulted in the issue(s).

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread George Sexton
On 5/29/2015 5:16 AM, David kerber wrote: On 5/29/2015 3:32 AM, Ramon Pfeiffer wrote: Sadly, it's a system I inherited last year and now have the pleasure to work with. I can't update Tomcat for I don't know what will break. There's a fair chance that you can update to the latest version of

RE: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Jeffrey Janner
> -Original Message- > From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] > Sent: Friday, May 29, 2015 2:33 AM > To: users@tomcat.apache.org > Subject: Re: Problem specifying cipher suites in tomcat6 > > Am 28.05.2015 um 18:56 schrieb Caldarale, Charle

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread David kerber
On 5/29/2015 3:32 AM, Ramon Pfeiffer wrote: Am 28.05.2015 um 18:56 schrieb Caldarale, Charles R: From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] Subject: Problem specifying cipher suites in tomcat6 I'm currently trying to specify a list of cipher suites to be used

Re: Problem specifying cipher suites in tomcat6

2015-05-29 Thread Ramon Pfeiffer
Am 28.05.2015 um 18:56 schrieb Caldarale, Charles R: From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] Subject: Problem specifying cipher suites in tomcat6 I'm currently trying to specify a list of cipher suites to be used by my connector in Tomcat 6.0.24. Anybody can shed

RE: Problem specifying cipher suites in tomcat6

2015-05-28 Thread Caldarale, Charles R
> From: Ramon Pfeiffer [mailto:ramon.pfeif...@uni-tuebingen.de] > Subject: Problem specifying cipher suites in tomcat6 > I'm currently trying to specify a list of cipher suites to be used by my > connector in Tomcat 6.0.24. > Anybody can shed some light on what I did wrong?

Problem specifying cipher suites in tomcat6

2015-05-28 Thread Ramon Pfeiffer
Hi all, I'm currently trying to specify a list of cipher suites to be used by my connector in Tomcat 6.0.24. However, when testing the connector with ssllabs.com, a bunch of ciphers I didn't specify show up. Here is the connector config: Just for the sake of the argument, I spec

Re: OpenSSL, Cipher-Suites, and Tomcat standalone vs. native vs. Tomcat behind apache-httpd

2015-05-21 Thread Christopher Schultz
;> >> On Wed, May 20, 2015 at 7:12 PM, Glen Peterson >> wrote: >>> I've been using Tomcat as a stand-alone web server for years. >>> Last year, I started testing my site here: >>> https://www.ssllabs.com/ssltest >>> >>> I notice th

Re: OpenSSL, Cipher-Suites, and Tomcat standalone vs. native vs. Tomcat behind apache-httpd

2015-05-21 Thread Konstantin Kolinko
eb server for years. Last >> year, I started testing my site here: >> https://www.ssllabs.com/ssltest >> >> I notice that there are only 3 fully secure cipher-suites left (there >> were 6 left 2 months ago). Also, I only get an A, not an A+ due to >> "TL

Re: OpenSSL, Cipher-Suites, and Tomcat standalone vs. native vs. Tomcat behind apache-httpd

2015-05-20 Thread Glen Peterson
re: > https://www.ssllabs.com/ssltest > > I notice that there are only 3 fully secure cipher-suites left (there > were 6 left 2 months ago). Also, I only get an A, not an A+ due to > "TLS_­FALLBACK_­SCSV not supported." > > According to this: > https://bz.apache.org/b

OpenSSL, Cipher-Suites, and Tomcat standalone vs. native vs. Tomcat behind apache-httpd

2015-05-20 Thread Glen Peterson
I've been using Tomcat as a stand-alone web server for years. Last year, I started testing my site here: https://www.ssllabs.com/ssltest I notice that there are only 3 fully secure cipher-suites left (there were 6 left 2 months ago). Also, I only get an A, not an A+ due to "TLS_­FALL

RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-16 Thread Jason Jesso
z.net] Sent: Thursday, April 16, 2015 8:45 AM To: Tomcat Users List Subject: Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Jason, On 4/16/15 7:48 AM, Jason Jesso wrote: > My goal was to disable the EXPORT ciphers and not be able to > c

RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-16 Thread Jason Jesso
...@christopherschultz.net] Sent: Thursday, April 16, 2015 8:45 AM To: Tomcat Users List Subject: Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Jason, On 4/16/15 7:48 AM, Jason Jesso wrote: > My goal was to disable the EXPORT ciphers

Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-16 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Jason, On 4/16/15 7:48 AM, Jason Jesso wrote: > My goal was to disable the EXPORT ciphers and not be able to > connect with: > > openssl s_client -cipher EXPORT -connect localhost:443 < /dev/null > 2>/dev/null I think your goal was pretty clear.

RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-16 Thread Jason Jesso
d for us. Thanks for your help! From: Christopher Schultz [ch...@christopherschultz.net] Sent: Thursday, April 16, 2015 1:01 AM To: Tomcat Users List Subject: Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) -BEGIN PGP SIGNED MESSAGE- Hash:

Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread Christopher Schultz
ECDHE_RSA_WITH_AES_128_CBC_SHA, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384, > TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, > TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, > TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA" > > > We are failing our PCI scan for "RSA_EXPORT

Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread David kerber
, you have exhausted my knowledge of the subject. Somebody else is going to need to chime in here. From: David kerber [dcker...@verizon.net] Sent: Wednesday, April 15, 2015 1:34 PM To: Tomcat Users List Subject: Re: TLS Server Accepts RSA_EXPORT Cip

RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread Jason Jesso
rom: David kerber [dcker...@verizon.net] Sent: Wednesday, April 15, 2015 1:34 PM To: Tomcat Users List Subject: Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) On 4/15/2015 1:17 PM, Jason Jesso wrote: > I am using Java 1.6 on AIX plaform. > > /usr/java6/bin/java -version > java ver

Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread David kerber
To: Tomcat Users List Subject: Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) On 4/15/2015 12:05 PM, Jason Jesso wrote: I have Tomcat 6.0.41 connector set-up with: SSLProtocol="TLSv1.1,TLSv1.2" ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,

RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread Jason Jesso
I also have Java 7 on the same host and got the same result. From: Jason Jesso [jje...@global-matrix.com] Sent: Wednesday, April 15, 2015 1:17 PM To: Tomcat Users List Subject: RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) I am using Java 1.6

RE: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread Jason Jesso
TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK) On 4/15/2015 12:05 PM, Jason Jesso wrote: > I have Tomcat 6.0.41 connector set-up with: > > > SSLProtocol="TLSv1.1,TLSv1.2" > ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, >

Re: TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread David kerber
_256_CBC_SHA384, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA" We are failing our PCI scan for "RSA_EXPORT Cipher Suites (FREAK)". I also test my server

TLS Server Accepts RSA_EXPORT Cipher Suites (FREAK)

2015-04-15 Thread Jason Jesso
AES_256_CBC_SHA, TLS_RSA_WITH_AES_128_CBC_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA" We are failing our PCI scan for "RSA_EXPORT Cipher Suites (FREAK)". I also test my server using openssl like: openssl s_client -cipher

Re: java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled.

2010-08-12 Thread Estanislao Gonzalez
___ From: Estanislao Gonzalez To: Tomcat Users List Sent: Wed, August 11, 2010 7:59:07 AM Subject: Re: java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled. Hi, Just in case this is als

Re: java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled.

2010-08-11 Thread Jing Chen
: Tomcat Users List Sent: Wed, August 11, 2010 7:59:07 AM Subject: Re: java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled. Hi, Just in case this is also related to my problem that

Re: java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled.

2010-08-11 Thread Estanislao Gonzalez
: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled. After getting a new SSL certificate from GeoTrust, I keep getting the following error after starting JBoss 4.0.5: java.net.SocketException: SSL handshake e

RE: java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled.

2010-08-11 Thread Richard G Curry
errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled. After getting a new SSL certificate from GeoTrust, I keep getting the following error after starting JBoss 4.0.5: java.net.SocketException: SSL handshake errorj avax.net.ssl.SSLException: No available

java.net.SocketException: SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled.

2010-08-10 Thread Jing Chen
After getting a new SSL certificate from GeoTrust, I keep getting the following error after starting JBoss 4.0.5: java.net.SocketException: SSL handshake errorj avax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled. I first imported

Re: SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled

2009-10-02 Thread Joe Hansen
ass="changeit" /> > > Now, when I restart the web server, the websites seem to be working > fine, but the tomcat logs are inundated with the following error > message: > 2009 Oct 02 / 15:18:29 ERROR - > [org.apache.tomcat.util.net.PoolTcpEndpoint] : Endpoint [SSL: > ServerSo

SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled

2009-10-02 Thread Joe Hansen
Exception: SSL handshake error javax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled. Can a Tomcat/SSL guru please guide me in solving this issue. Thank you! Joe - To unsub

Re: No available certificate or key corresponds to the SSL cipher suites which are enabled

2008-08-08 Thread Bruno Harbulot
Hi, [EMAIL PROTECTED] wrote: I am trying to configure SSL on a tomcat 6.0.13. I began by creating a default keystore (using keytool) in the user's directory where the apache tomcat server is installed. From this keystore I generated a server cert request. Once I received the server cert, I

Re: No available certificate or key corresponds to the SSL cipher suites which are enabled

2008-08-08 Thread Mark Thomas
d and started tomcat the log file "catalina.out" gets filled with: SEVER: Socket Accept Failed java.net.SocketException:SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are

No available certificate or key corresponds to the SSL cipher suites which are enabled

2008-08-08 Thread paulsnodgrass
file "catalina.out" gets filled with: SEVER: Socket Accept Failed java.net.SocketException:SSL handshake errorjavax.net.ssl.SSLException: No available certificate or key corresponds to the SSL cipher suites which are enabled at org.apache.tomcat.util.net.jsse.JSSESocketFacto

Tomcat 6 cipher suites / Nessus

2008-06-04 Thread tomcat question
Hi everybody, I am having trouble configuring Tomcat right... The machine I'm using is a Win2003 server with Tomcat 6.0.14 installed. In general everything works fine, but for security reasons, I need the server to pass a Nessus security scan. With Nessus, I receive the following message about the

Re: Cipher suites

2007-06-07 Thread Thiago Silva
I am not using spaces in the real file. It is just a mistake when I copied and pasted. Is this the the only way to force the use of an specific cipher suite? Has anybody ever done this before? On 6/7/07, Christopher Schultz <[EMAIL PROTECTED]> wrote: -BEGIN PGP SIGNED MESSAGE- Hash:

Re: Cipher suites

2007-06-07 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Thiago, Thiago Silva wrote: > I have tried to use the tag "ciphers" in the following part of the > Server.xml, but it did not used the specific cipher suite that I have set. > > code: > -- > > http://enigmail.mozdev.org

Re: Cipher suites

2007-06-06 Thread Bill Barker
"Thiago Silva" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED] > Hello, > > I was wondering if is there any way to force the use of a specific cipher > suite. I need to do some analyses in many cipher suites, that is why I > need > to do tha

  1   2   >