Harri,

On 10/29/25 6:25 AM, Harri Pesonen wrote:
08:47:44.257 WRN> (main) (org.apache.tomcat.util.net.SSLUtilBase#getEnabled) 
Tomcat interprets the [ciphers] attribute in a manner consistent with the latest 
OpenSSL development branch. Some of the specified [ciphers] are not supported by 
the configured SSL engine for this connector (which may use JSSE or an older 
OpenSSL version) and have been skipped: [[TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256, 
TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256, 
TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256]]

Configuration is:

ciphers="TLS_DHE_DSS_WITH_AES_128_CBC_SHA256,TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_128_GCM_SHA256"/>

Should we just drop these or replace them with something else:

This is largely a matter of taste -- in general -- but for your environment it looks like they will not be used no matter what. So, in your case, removing these will remove the warning and not otherwise change the behavior.

I am interested in the underlying TLS engine you are using. I don't know of any engines which have removed support from those cipher suites.

   *   TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
   *   TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
   *   TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
   *   TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256

None of the above cipher suites feature "forward security" which is one reason why they are potential candidates for removal from your set of supported ciphers.

The CBC-based cipher suites have a bit of an issue, but with these cipher suites enabled (note the use of ECDHE and not ECDH):

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

Qualys's SSL labs is still willing to give your site an A+ rating. So take that for what you will. Also, for what it's worth, all of the following companies still allow CBC-based cipher suites on their sites:

- Facebook
- Google
- Microsoft
- Qualys

So take that for what you will, too.

It looks like you are already (successfully) supporting the ECDHE versions of these cipher suites. So if I were you, I think I'd just remove them from my configuration if I were you.

-chris


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to