> -----Original Message-----
> From: Christopher Schultz [mailto:ch...@christopherschultz.net]
> Sent: Tuesday, April 08, 2014 6:27 PM
> To: Tomcat Users List
> Subject: Re: Windows tcnative openssl ciphers question
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA256
> 
> Jeffrey,
> 
> On 4/7/14, 4:07 PM, Jeffrey Janner wrote:
> > Ok, this is a question for the native libs builders (or whoever knows
> > the answer). Environment:  Windows Server 2008 R2, Tomcat
> > 7.0.50 w/APR 1.1.29, Java 1.7.0_51  (all 64-bit) I'm trying to set up
> > a ciphers list that will get me an "A" rating on Qualys' SSL testing
> > tool.
> 
> Did you read their guide? Certain factors limit your rating to B no
> matter what else happens. Lots of those factors are quite common in
> real-world deployments.
> 
I actually managed to earn an A- rating, since I was only missing the ECDHE 
support to get Forward Secrecy to work on the IE browser family.
At least I had one until the Heartbleed bug raised its ugly head.  Now I'm back 
to "F".

> > I'm using the latest list suggested by MozillaWiki:
> > ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-
> AE
> > S256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-
> SHA25
> > 6:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-
> SHA256:ECDHE-
> > ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-
> SHA:ECDHE-
> > RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-
> SHA:ECDHE
> > -ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-
> AES
> > 128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-
> SHA
> > :AES128-GCM-SHA256:AES256-GCM-SHA384:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-
> RC4
> > -SHA:AES128:AES256:RC4-
> SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:
> > !PSK
> >
> >  However, when I run the test tool, it reports that the server is
> only
> > supporting the following list:
> > TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
> > TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
> > TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
> > TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
> > TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA
> > TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_128_GCM_SHA256
> > TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA
> > TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA
> > TLS_RSA_WITH_RC4_128_SHA TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
> > TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
> > TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
> > TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
> >
> > Notice, none of the ECDHE-based ciphers are showing up in the list.
> > This is apparently what is keeping me from getting that perfect
> > score, as IE wants those ciphers for Forward Security.   It ends up
> > taking one of the lower ciphers on the list. Does anyone know, is
> > there a setting that needs to be made to enable those ciphers?
> > Were they turned off in the dev stage?  Is it related to my
> > certificate? Running the openssl.exe that comes with the APR binary
> > download shows the ECDHE ciphers in the list. Any help appreciated.
> 
> Did you set-up the Elliptic-curve parameters? If not, you can't use
> those ciphers.
> 

Per someone (Mladen?) the capability wasn't enabled at build.
Last notice I received is he's addressing that in the next release.
Jeff

Reply via email to