Hello,

we get this warning

08:47:44.257 WRN> (main) (org.apache.tomcat.util.net.SSLUtilBase#getEnabled) 
Tomcat interprets the [ciphers] attribute in a manner consistent with the 
latest OpenSSL development branch. Some of the specified [ciphers] are not 
supported by the configured SSL engine for this connector (which may use JSSE 
or an older OpenSSL version) and have been skipped: 
[[TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256]]

Configuration is:

ciphers="TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256"/>

Should we just drop these or replace them with something else:

  *   TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
  *   TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
  *   TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
  *   TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256

https://ciphersuite.info/cs/TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256/
Cipher Block Chaining:
In 2013, researchers demonstrated a timing attack against several TLS 
implementations using the CBC encryption algorithm (see 
isg.rhul.ac.uk<http://www.isg.rhul.ac.uk/tls/Lucky13.html>). Additionally, the 
CBC mode is vulnerable to plain-text attacks in TLS 1.0, SSL 3.0 and lower. A 
fix has been introduced with TLS 1.2 in form of the GCM mode which is not 
vulnerable to the BEAST attack. GCM should be preferred over CBC.

I wonder if CBC versions should be removed at least?

https://ciphersuite.info/cs/TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256/
This GCM is also listed as weak, perhaps because of this:
 Non-ephemeral Key Exchange:
This key exchange algorithm does not support Perfect Forward Secrecy (PFS) 
which is recommended, so attackers cannot decrypt the complete communication 
stream.

-Harri

Reply via email to