[openssl-users] Problem in connecting to Java (Tomcat) server with ECDHE ciphers
Andrew_Porter at bmc.com
Mon Jun 5 17:44:41 UTC 2017
Running sslscan against Tomcat 8.0.43 / Oracle Java 8u121 and a Tomcat server.xml containing
shows the strongest cipher is
Installing the Java unlimited strength policy files increases this to
sslscan did not report any ECDSA ciphers from tomcat even when I changed the ciphers in server.xml to include them, even though a test Java program that enumerates supported ciphers did list (unlimited strength policy files)
So your openssl connect line below always failed for me.
From: openssl-users [mailto:openssl-users-bounces at openssl.org] On Behalf Of Pravesh Rai
Sent: Saturday, June 03, 2017 22:02
To: openssl-dev at openssl.org
Cc: openssl-users at openssl.org
Subject: [openssl-users] Problem in connecting to Java (Tomcat) server with ECDHE ciphers
Even though I've disabled SSLvX protocols on both - client (openssl-1.0.2k) & server (Java 1.8 with Tomcat), still getting following handshake error, while executing:
"openssl s_client -connect a.b.c.d:<port> -msg -debug -cipher ECDHE-ECDSA-AES256-GCM-SHA384"
read from 0x213f50 [0x21c410] (7 bytes => 7 (0x7))
0000 - 15 03 03 00 02 02 28 ......(
<<< TLS 1.2 [length 0005]
15 03 03 00 02
<<< TLS 1.2 Alert [length 0002], fatal handshake_failure
14756:error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure:.\ssl\s23_clnt.c:769:
And, such error happens, only when ECDHE ciphers are selected during the connection.
Any clue on this?
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the openssl-users