:)
IHS is IBM HTTP Server.

Thank you,


-----Original Message-----
From: André Warnier (tomcat) [mailto:a...@ice-sa.com] 
Sent: Thursday, October 12, 2017 9:32 AM
To: users@tomcat.apache.org
Subject: Re: FW: [error] SSL0266E: Handshake Failed, Could not establish SSL 
proxy connection

And for the rest of us dummies trying to follow this conversation, what might 
"IHS" be ?
Whatever Google returns doesn't seem really relevant.

On 12.10.2017 15:25, Gali, Vamsi A wrote:
> Igor,
> Thank you for suggesting me to turn on the ssl dubug. We are using Java 1.8 
> which by default uses TLS1.2. Looks like both IHS & Tomcat are using tls1.2 
> but there is a cipher mismatch. We have Tam directly connecting to Tomcat and 
> the connectivity works w/o any SSL handshake errors. Hence, I'm suspecting 
> IHS and will be trying by adding same tls1.2 ciphers that Tomcat/java 
> supports.
>
> Thank you,
> Vamsi Gali
>
>
> -----Original Message-----
> From: Igor Cicimov [mailto:icici...@gmail.com]
> Sent: Wednesday, October 11, 2017 7:33 PM
> To: Tomcat Users List
> Subject: Re: FW: [error] SSL0266E: Handshake Failed, Could not 
> establish SSL proxy connection
>
> On Thu, Oct 12, 2017 at 9:17 AM, Igor Cicimov <icici...@gmail.com> wrote:
>
>> On 12 Oct 2017 8:25 am, "Gali, Vamsi A"
>> <vamsi_a_g...@keybank.com.invalid>
>> wrote:
>>
>> The debug log produced following & it's evident that handshake is 
>> failing due to no ciphers suites in common.
>>
>> Allow unsafe renegotiation: false
>> Allow legacy hello messages: true
>> Is initial handshake: true
>> Is secure renegotiation: false
>> http-bio-xxxx-Acceptor-0, setSoTimeout(60000) called Ignoring 
>> unsupported cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
>> for TLSv1
>> Ignoring unsupported cipher suite:
>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
>> for TLSv1
>> Ignoring unsupported cipher suite:
>> TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
>> for TLSv1
>> Ignoring unsupported cipher suite:
>> TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
>> for TLSv1
>> Ignoring unsupported cipher suite: 
>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
>> for TLSv1
>> Ignoring unsupported cipher suite: 
>> TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
>> for TLSv1
>> Ignoring unsupported cipher suite:
>> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
>> for TLSv1.1
>> Ignoring unsupported cipher suite:
>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
>> for TLSv1.1
>> Ignoring unsupported cipher suite:
>> TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
>> for TLSv1.1
>> Ignoring unsupported cipher suite:
>> TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
>> for TLSv1.1
>> Ignoring unsupported cipher suite: 
>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
>> for TLSv1.1
>> Ignoring unsupported cipher suite: 
>> TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
>> for TLSv1.1
>> http-bio-xxxx-exec-2, READ: TLSv1.2 Handshake, length = 57
>> *** ClientHello, TLSv1.2
>> RandomCookie:  GMT: -2042962343 <(204)%20296-2343> bytes = { 199, 95, 
>> 13, 144, 113, 194, 145, 53, 176, 117, 165, 93, 196, 76, 17, 104, 214, 
>> 95, 96, 238, 97, 6, 240, 239, 53, 188, 180, 41 } Session ID:  {} 
>> Cipher Suites: [TLS_EMPTY_RENEGOTIATION_INFO_SCSV, Unknown 0x56:0x0, 
>> SSL_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_AES_128_CBC_SHA, 
>> TLS_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, 
>> SSL_RSA_WITH_RC4_128_MD5] Compression Methods:  { 0 }
>> ***
>> %% Initialized:  [Session-13, SSL_NULL_WITH_NULL_NULL] %% Invalidated:
>> [Session-13, SSL_NULL_WITH_NULL_NULL] http-bio-xxxx-exec-2, SEND
>> TLSv1.2 ALERT:  fatal, description = handshake_failure 
>> http-bio-xxxx-exec-2, WRITE: TLSv1.2 Alert, length = 2 
>> http-bio-xxxx-exec-2, called closeSocket()
>>
>>
>>
>> http-bio-xxxx-exec-2, handling exception: 
>> javax.net.ssl.SSLHandshakeException:
>> no cipher suites in common
>> http-bio-xxxx-exec-2, IOException in getSession():
>> javax.net.ssl.SSLHandshakeException: no cipher suites in common
>>
>>
>> There you go, no comment needed.
>>
>> Also, since you are using JSSE in your tomcat connector, you never
> mentioned the Java version you are using? From the logs looks like IHS offers 
> TLSv1.2 ciphers but tomcat does not support them so maybe you are running an 
> outdated version of Java, maybe 1.6?
>
> There some tools out there you can use to find the default SSL/TLS cipher 
> suits that JVM will use (and I think I've seen one from Christopher Schultz). 
> The tool should provide you with output like this:
>
> $ java Ciphers
> Default    Cipher
>       SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
> *    SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
>       SSL_DHE_DSS_WITH_DES_CBC_SHA
>       SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
> *    SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
>       SSL_DHE_RSA_WITH_DES_CBC_SHA
>       SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
>       SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
>       SSL_DH_anon_WITH_DES_CBC_SHA
>       SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
> *    SSL_RSA_WITH_3DES_EDE_CBC_SHA
>       SSL_RSA_WITH_DES_CBC_SHA
>       SSL_RSA_WITH_NULL_MD5
>       SSL_RSA_WITH_NULL_SHA
> *    TLS_DHE_DSS_WITH_AES_128_CBC_SHA
> *    TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
> *    TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
> *    TLS_DHE_RSA_WITH_AES_128_CBC_SHA
> *    TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
> *    TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
>       TLS_DH_anon_WITH_AES_128_CBC_SHA
>       TLS_DH_anon_WITH_AES_128_CBC_SHA256
>       TLS_DH_anon_WITH_AES_128_GCM_SHA256
> ...
>
> then pick up one of the supported default ciphers (marked with star) and use 
> it in IHS (as it is or translated in IHS way, no idea about that) so you get 
> a match. I know nothing about IHS so can't help there.
>
> If that doesn't work then I would say IHS does some funky stuff with the 
> cipher suites in a way that tomcat can't understand them.
>
> Igor
>
>
> This communication may contain privileged and/or confidential information. It 
> is intended solely for the use of the addressee. If you are not the intended 
> recipient, you are strictly prohibited from disclosing, copying, distributing 
> or using any of this information. If you received this communication in 
> error, please contact the sender immediately and destroy the material in its 
> entirety, whether electronic or hard copy. This communication may contain 
> nonpublic personal information about consumers subject to the restrictions of 
> the Gramm-Leach-Bliley Act. You may not directly or indirectly reuse or 
> redisclose such information for any purpose other than to provide the 
> services for which you are receiving the information.
>
> 127 Public Square, Cleveland, OH 44114 If you prefer not to receive 
> future e-mail offers for products or services from Key send an e-mail 
> to mailto:dnereque...@key.com with 'No Promotional E-mails' in the 
> SUBJECT line.
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to