-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Peter and James,

On 5/30/19 01:22, Peter Kreuser wrote:
> James,
> 
> Outbound SSL is usually handled by the underlying Java VM.

Yep. Tomcat doesn't have any code to make outgoing TLS connections.

>> Am 29.05.2019 um 20:57 schrieb James H. H. Lampert
>> <jam...@touchtonecorp.com>:
>> 
>> We have a customer that is running our Tomcat-based webapp, and
>> it is apparently having trouble accessing a Google web service.
>> 
>> The error message they're getting is:
>> 
>>> Unable to find acceptable protocols. isFallback=false, 
>>> modes=[ConnectionSpec(cipherSuites=[TLS_ECDHE_ECDSA_WITH_AES_128_GCM
_SHA256,
>>>
>>> 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
>>> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, 
>>> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 
>>> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 
>>> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 
>>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
>>> TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 
>>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
>>> TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA,
>>> TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA],
>>> tlsVersions=[TLS_1_2, TLS_1_1, TLS_1_0],
>>> supportsTlsExtensions=true), 
>>> ConnectionSpec(cipherSuites=[TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
,
>>>
>>> 
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
>>> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, 
>>> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, 
>>> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, 
>>> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, 
>>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,
>>> TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 
>>> TLS_DHE_RSA_WITH_AES_256_CBC_SHA,
>>> TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA,
>>> TLS_RSA_WITH_AES_256_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA],
>>> tlsVersions=[TLS_1_0], supportsTlsExtensions=true),
>>> ConnectionSpec()], supported protocols=[TLSv1]
> 
> These are the ciphers and protocols requested. Are these two
> different services?  If that is from server and client the ciphers
> are OK and protocols also overlap.

I don't think that's a list of the server, client supported protocols.
There is also an empty one at the end (TLSv1, no cipher suites).

> What strikes me though is the difference in TLS versions and
> supported protocols.
> 
>> Is this something that could be caused by a Tomcat configuration
>> issue?
> 
> Not really Tomcat. Java. Unless you set specific values on the
> connection. Or on the commandline.
> 
> Could you please let us know the Java version and maybe the
> Connection settings? JAVA_OPTS?

It would also be a good idea to run good 'ole SSLLabs server test
against the service. If it's an internal service or one that can't be
scanned by Qualys, then you can try this tool which is roughly equivalen
t:

https://github.com/ChristopherSchultz/ssltest

Then check the capabilities of the client you are working with.

- -chris
-----BEGIN PGP SIGNATURE-----
Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/
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=Xqgz
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to