[
https://issues.apache.org/jira/browse/KAFKA-3647?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15270467#comment-15270467
]
Elvar commented on KAFKA-3647:
------------------------------
Tried recreating the JKS's and this is how I did it
{code}
Generate the CA cert and key:
openssl req -new -x509 -keyout ca.key -out ca.cert -days 3650 -subj
"/C=IS/ST=Reykjavik/L=Reykjavik/O=M/OU=Mon/CN=kafka.local" -nodes
Import CA cert to server truststore:
keytool -keystore kafka.server.truststore.jks -alias CARoot -import -file
ca.cert -storepass pass -noprompt
Import CA cert to client truststore:
keytool -keystore kafka.client.truststore.jks -alias CARoot -import -file
ca.cert -storepass pass -noprompt
Create server keystore and key:
keytool -keystore kafka.server.keystore.jks -alias confluent-1 -validity 3650
-genkey -storepass pass -keypass pass -dname "CN=confluent-1, OU=Mon, O=M,
L=Reykjavik, S=Reykjavik, C=IS"
Create server CSR:
keytool -keystore kafka.server.keystore.jks -alias confluent-1 -certreq -file
server.csr -storepass pass
Sign server CSR with CA key:
openssl x509 -req -CA ca.cert -CAkey ca.key -in server.csr -out server.signed
-days 3650 -CAcreateserial -passin pass:pass
Import CA to the server keystore:
keytool -keystore kafka.server.keystore.jks -alias CARoot -import -file ca.cert
-storepass pass -noprompt
Import signed server cert to server keystore:
keytool -keystore kafka.server.keystore.jks -alias confluent-1 -import -file
server.signed -storepass pass -noprompt
Create client keystore and key:
keytool -keystore kafka.client.keystore.jks -alias workclient -validity 3650
-genkey -storepass pass -keypass pass -dname "CN=workclient, OU=Mon, O=M,
L=Reykjavik, S=Reykjavik, C=IS"
Create client CSR:
keytool -keystore kafka.client.keystore.jks -alias workclient -certreq -file
client.csr -storepass pass
Sign client CSR with CA key:
openssl x509 -req -CA ca.cert -CAkey ca.key -in client.csr -out client.signed
-days 3650 -CAcreateserial -passin pass:pass
Import CA cert to the client keystore:
keytool -keystore kafka.client.keystore.jks -alias CARoot -import -file ca.cert
-storepass pass -noprompt
Import signed client cert to client keystore:
keytool -keystore kafka.client.keystore.jks -alias workclient -import -file
client.signed -storepass pass -noprompt
{code}
sslscan still reports only DSS cyphers.
Using groovy and a simple command I am able to extract avialble ciphers in
detail
{code}
groovy:000>
java.security.Security.providers.each{p->p.getServices().each{s->println s}}
{code}
Here is my output
{code:collapse=true}
SUN: SecureRandom.NativePRNG -> sun.security.provider.NativePRNG
SUN: SecureRandom.SHA1PRNG -> sun.security.provider.SecureRandom
attributes: {ImplementedIn=Software}
SUN: Signature.SHA1withDSA -> sun.security.provider.DSA$SHA1withDSA
aliases: [DSA, DSS, SHA/DSA, SHA-1/DSA, SHA1/DSA, SHAwithDSA, DSAWithSHA1,
OID.1.2.840.10040.4.3, 1.2.840.10040.4.3, 1.3.14.3.2.13, 1.3.14.3.2.27]
attributes: {ImplementedIn=Software, KeySize=1024,
SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey}
SUN: Signature.NONEwithDSA -> sun.security.provider.DSA$RawDSA
aliases: [RawDSA]
attributes: {KeySize=1024,
SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey}
SUN: Signature.SHA224withDSA -> sun.security.provider.DSA$SHA224withDSA
aliases: [OID.2.16.840.1.101.3.4.3.1, 2.16.840.1.101.3.4.3.1]
attributes: {KeySize=2048,
SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey}
SUN: Signature.SHA256withDSA -> sun.security.provider.DSA$SHA256withDSA
aliases: [OID.2.16.840.1.101.3.4.3.2, 2.16.840.1.101.3.4.3.2]
attributes: {KeySize=2048,
SupportedKeyClasses=java.security.interfaces.DSAPublicKey|java.security.interfaces.DSAPrivateKey}
SUN: KeyPairGenerator.DSA -> sun.security.provider.DSAKeyPairGenerator
aliases: [OID.1.2.840.10040.4.1, 1.2.840.10040.4.1, 1.3.14.3.2.12]
attributes: {ImplementedIn=Software, KeySize=2048}
SUN: MessageDigest.MD2 -> sun.security.provider.MD2
SUN: MessageDigest.MD5 -> sun.security.provider.MD5
attributes: {ImplementedIn=Software}
SUN: MessageDigest.SHA -> sun.security.provider.SHA
aliases: [SHA-1, SHA1, 1.3.14.3.2.26, OID.1.3.14.3.2.26]
attributes: {ImplementedIn=Software}
SUN: MessageDigest.SHA-224 -> sun.security.provider.SHA2$SHA224
aliases: [2.16.840.1.101.3.4.2.4, OID.2.16.840.1.101.3.4.2.4]
SUN: MessageDigest.SHA-256 -> sun.security.provider.SHA2$SHA256
aliases: [2.16.840.1.101.3.4.2.1, OID.2.16.840.1.101.3.4.2.1]
SUN: MessageDigest.SHA-384 -> sun.security.provider.SHA5$SHA384
aliases: [2.16.840.1.101.3.4.2.2, OID.2.16.840.1.101.3.4.2.2]
SUN: MessageDigest.SHA-512 -> sun.security.provider.SHA5$SHA512
aliases: [2.16.840.1.101.3.4.2.3, OID.2.16.840.1.101.3.4.2.3]
SUN: AlgorithmParameterGenerator.DSA ->
sun.security.provider.DSAParameterGenerator
attributes: {ImplementedIn=Software, KeySize=2048}
SUN: AlgorithmParameters.DSA -> sun.security.provider.DSAParameters
aliases: [OID.1.2.840.10040.4.1, 1.2.840.10040.4.1, 1.3.14.3.2.12]
attributes: {ImplementedIn=Software}
SUN: KeyFactory.DSA -> sun.security.provider.DSAKeyFactory
aliases: [OID.1.2.840.10040.4.1, 1.2.840.10040.4.1, 1.3.14.3.2.12]
attributes: {ImplementedIn=Software}
SUN: CertificateFactory.X.509 -> sun.security.provider.X509Factory
aliases: [X509]
attributes: {ImplementedIn=Software}
SUN: KeyStore.JKS -> sun.security.provider.JavaKeyStore$JKS
attributes: {ImplementedIn=Software}
SUN: KeyStore.CaseExactJKS -> sun.security.provider.JavaKeyStore$CaseExactJKS
SUN: Policy.JavaPolicy -> sun.security.provider.PolicySpiFile
SUN: Configuration.JavaLoginConfig -> sun.security.provider.ConfigSpiFile
SUN: CertPathBuilder.PKIX -> sun.security.provider.certpath.SunCertPathBuilder
attributes: {ValidationAlgorithm=RFC3280, ImplementedIn=Software}
SUN: CertPathValidator.PKIX ->
sun.security.provider.certpath.PKIXCertPathValidator
attributes: {ValidationAlgorithm=RFC3280, ImplementedIn=Software}
SUN: CertStore.LDAP -> sun.security.provider.certpath.ldap.LDAPCertStore
attributes: {ImplementedIn=Software, LDAPSchema=RFC2587}
SUN: CertStore.Collection -> sun.security.provider.certpath.CollectionCertStore
attributes: {ImplementedIn=Software}
SUN: CertStore.com.sun.security.IndexedCollection ->
sun.security.provider.certpath.IndexedCollectionCertStore
attributes: {ImplementedIn=Software}
SunRsaSign: Signature.SHA1withRSA -> sun.security.rsa.RSASignature$SHA1withRSA
aliases: [1.2.840.113549.1.1.5, OID.1.2.840.113549.1.1.5, 1.3.14.3.2.29]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunRsaSign: Signature.MD5withRSA -> sun.security.rsa.RSASignature$MD5withRSA
aliases: [1.2.840.113549.1.1.4, OID.1.2.840.113549.1.1.4]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunRsaSign: Signature.MD2withRSA -> sun.security.rsa.RSASignature$MD2withRSA
aliases: [1.2.840.113549.1.1.2, OID.1.2.840.113549.1.1.2]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunRsaSign: KeyFactory.RSA -> sun.security.rsa.RSAKeyFactory
aliases: [1.2.840.113549.1.1, OID.1.2.840.113549.1.1]
SunRsaSign: Signature.SHA256withRSA ->
sun.security.rsa.RSASignature$SHA256withRSA
aliases: [OID.1.2.840.113549.1.1.11, 1.2.840.113549.1.1.11]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunRsaSign: KeyPairGenerator.RSA -> sun.security.rsa.RSAKeyPairGenerator
aliases: [OID.1.2.840.113549.1.1, 1.2.840.113549.1.1]
SunRsaSign: Signature.SHA512withRSA ->
sun.security.rsa.RSASignature$SHA512withRSA
aliases: [1.2.840.113549.1.1.13, OID.1.2.840.113549.1.1.13]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunRsaSign: Signature.SHA384withRSA ->
sun.security.rsa.RSASignature$SHA384withRSA
aliases: [OID.1.2.840.113549.1.1.12, 1.2.840.113549.1.1.12]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunRsaSign: Signature.SHA224withRSA ->
sun.security.rsa.RSASignature$SHA224withRSA
aliases: [1.2.840.113549.1.1.14, OID.1.2.840.113549.1.1.14]
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey}
SunEC: Signature.SHA224withECDSA -> sun.security.ec.ECDSASignature$SHA224
aliases: [OID.1.2.840.10045.4.3.1, 1.2.840.10045.4.3.1]
attributes: {ImplementedIn=Software,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunEC: Signature.SHA512withECDSA -> sun.security.ec.ECDSASignature$SHA512
aliases: [OID.1.2.840.10045.4.3.4, 1.2.840.10045.4.3.4]
attributes: {ImplementedIn=Software,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunEC: AlgorithmParameters.EC -> sun.security.ec.ECParameters
aliases: [EllipticCurve]
attributes: {ImplementedIn=Software,
SupportedCurves=[secp112r1,1.3.132.0.6]|[secp112r2,1.3.132.0.7]|[secp128r1,1.3.132.0.28]|[secp128r2,1.3.132.0.29]|[secp160k1,1.3.132.0.9]|[secp160r1,1.3.132.0.8]|[secp160r2,1.3.132.0.30]|[secp192k1,1.3.132.0.31]|[secp192r1,NIST
P-192,X9.62
prime192v1,1.2.840.10045.3.1.1]|[secp224k1,1.3.132.0.32]|[secp224r1,NIST P-224
,1.3.132.0.33]|[secp256k1,1.3.132.0.10]|[secp256r1,NIST P-256,X9.62
prime256v1,1.2.840.10045.3.1.7]|[secp384r1,NIST
P-384,1.3.132.0.34]|[secp521r1,NIST P-521,1.3.132.0.35]|[X9.62
prime192v2,1.2.840.10045.3.1.2]|[X9.62 prime192v3,1.2.840.10045.3.1.3]|[X9.62
prime239v1,1.2.840.10045.3.1.4]|[X9.62 prime239v2,1.2.840.10045.3.1.5]|[X9.62
prime239v3,1.2.840.100
45.3.1.6]|[sect113r1,1.3.132.0.4]|[sect113r2,1.3.132.0.5]|[sect131r1,1.3.132.0.22]|[sect131r2,1.3.132.0.23]|[sect163k1,NIST
K-163,1.3.132.0.1]|[sect163r1,1.3.132.0.2]|[sect163r2,NIST
B-163,1.3.132.0.15]|[sect193r1,1.3.132.0.24]|[sect193r2,1.3.132.0.25]|[sect233k1,NIST
K-233,1.3.132.0.26]|[sect233r1,NIST
B-233,1.3.132.0.27]|[sect239k1,1.3.132.0.3]|[sect283
k1,NIST K-283,1.3.132.0.16]|[sect283r1,NIST B-283,1.3.132.0.17]|[sect409k1,NIST
K-409,1.3.132.0.36]|[sect409r1,NIST B-409,1.3.132.0.37]|[sect571k1,NIST
K-571,1.3.132.0.38]|[sect571r1,NIST B-571,1.3.132.0.39]|[X9.62
c2tnb191v1,1.2.840.10045.3.0.5]|[X9.62 c2tnb191v2,1.2.840.10045.3.0.6]|[X9.62
c2tnb191v3,1.2.840.10045.3.0.7]|[X9.62 c2tnb239v1,1.2.840.10045.
3.0.11]|[X9.62 c2tnb239v2,1.2.840.10045.3.0.12]|[X9.62
c2tnb239v3,1.2.840.10045.3.0.13]|[X9.62 c2tnb359v1,1.2.840.10045.3.0.18]|[X9.62
c2tnb431r1,1.2.840.10045.3.0.20], KeySize=256}
SunEC: Signature.SHA384withECDSA -> sun.security.ec.ECDSASignature$SHA384
aliases: [OID.1.2.840.10045.4.3.3, 1.2.840.10045.4.3.3]
attributes: {ImplementedIn=Software,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunEC: KeyAgreement.ECDH -> sun.security.ec.ECDHKeyAgreement
attributes: {ImplementedIn=Software,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunEC: Signature.NONEwithECDSA -> sun.security.ec.ECDSASignature$Raw
attributes: {ImplementedIn=Software,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunEC: KeyPairGenerator.EC -> sun.security.ec.ECKeyPairGenerator
aliases: [EllipticCurve]
attributes: {ImplementedIn=Software, KeySize=256}
SunEC: Signature.SHA1withECDSA -> sun.security.ec.ECDSASignature$SHA1
aliases: [1.2.840.10045.4.1, OID.1.2.840.10045.4.1]
attributes: {ImplementedIn=Software, KeySize=256,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunEC: KeyFactory.EC -> sun.security.ec.ECKeyFactory
aliases: [EllipticCurve]
attributes: {ImplementedIn=Software}
SunEC: Signature.SHA256withECDSA -> sun.security.ec.ECDSASignature$SHA256
aliases: [OID.1.2.840.10045.4.3.2, 1.2.840.10045.4.3.2]
attributes: {ImplementedIn=Software,
SupportedKeyClasses=java.security.interfaces.ECPublicKey|java.security.interfaces.ECPrivateKey}
SunJSSE: KeyFactory.RSA -> sun.security.rsa.RSAKeyFactory
aliases: [1.2.840.113549.1.1, OID.1.2.840.113549.1.1]
SunJSSE: KeyPairGenerator.RSA -> sun.security.rsa.RSAKeyPairGenerator
aliases: [1.2.840.113549.1.1, OID.1.2.840.113549.1.1]
SunJSSE: Signature.MD2withRSA -> sun.security.rsa.RSASignature$MD2withRSA
aliases: [1.2.840.113549.1.1.2, OID.1.2.840.113549.1.1.2]
SunJSSE: Signature.MD5withRSA -> sun.security.rsa.RSASignature$MD5withRSA
aliases: [1.2.840.113549.1.1.4, OID.1.2.840.113549.1.1.4]
SunJSSE: Signature.SHA1withRSA -> sun.security.rsa.RSASignature$SHA1withRSA
aliases: [1.2.840.113549.1.1.5, OID.1.2.840.113549.1.1.5, 1.3.14.3.2.29,
OID.1.3.14.3.2.29]
SunJSSE: Signature.MD5andSHA1withRSA -> sun.security.ssl.RSASignature
SunJSSE: KeyManagerFactory.SunX509 ->
sun.security.ssl.KeyManagerFactoryImpl$SunX509
SunJSSE: KeyManagerFactory.NewSunX509 ->
sun.security.ssl.KeyManagerFactoryImpl$X509
aliases: [PKIX]
SunJSSE: TrustManagerFactory.SunX509 ->
sun.security.ssl.TrustManagerFactoryImpl$SimpleFactory
SunJSSE: TrustManagerFactory.PKIX ->
sun.security.ssl.TrustManagerFactoryImpl$PKIXFactory
aliases: [SunPKIX, X509, X.509]
SunJSSE: SSLContext.TLSv1 -> sun.security.ssl.SSLContextImpl$TLS10Context
aliases: [TLS, SSL, SSLv3]
SunJSSE: SSLContext.TLSv1.1 -> sun.security.ssl.SSLContextImpl$TLS11Context
SunJSSE: SSLContext.TLSv1.2 -> sun.security.ssl.SSLContextImpl$TLS12Context
SunJSSE: SSLContext.Default -> sun.security.ssl.SSLContextImpl$DefaultSSLContext
SunJSSE: KeyStore.PKCS12 -> sun.security.pkcs12.PKCS12KeyStore
SunJCE: Cipher.RSA -> com.sun.crypto.provider.RSACipher
attributes:
{SupportedKeyClasses=java.security.interfaces.RSAPublicKey|java.security.interfaces.RSAPrivateKey,
SupportedPaddings=NOPADDING|PKCS1PADDING|OAEPWITHMD5ANDMGF1PADDING|OAEPWITHSHA1ANDMGF1PADDING|OAEPWITHSHA-1ANDMGF1PADDING|OAEPWITHSHA-224ANDMGF1PADDING|OAEPWITHSHA-256ANDMGF1PADDING|OAEPWITHSHA-384ANDMGF1PADDING|OAEPWITHSHA-512ANDMGF1PADDING,
S
upportedModes=ECB}
SunJCE: Cipher.DES -> com.sun.crypto.provider.DESCipher
attributes: {SupportedKeyFormats=RAW,
SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING,
SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64}
SunJCE: Cipher.DESede -> com.sun.crypto.provider.DESedeCipher
aliases: [TripleDES]
attributes: {SupportedKeyFormats=RAW,
SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING,
SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64}
SunJCE: Cipher.DESedeWrap -> com.sun.crypto.provider.DESedeWrapCipher
attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING,
SupportedModes=CBC}
SunJCE: Cipher.PBEWithMD5AndDES ->
com.sun.crypto.provider.PBEWithMD5AndDESCipher
aliases: [OID.1.2.840.113549.1.5.3, 1.2.840.113549.1.5.3]
SunJCE: Cipher.PBEWithMD5AndTripleDES ->
com.sun.crypto.provider.PBEWithMD5AndTripleDESCipher
SunJCE: Cipher.PBEWithSHA1AndRC2_40 ->
com.sun.crypto.provider.PKCS12PBECipherCore$PBEWithSHA1AndRC2_40
aliases: [OID.1.2.840.113549.1.12.1.6, 1.2.840.113549.1.12.1.6]
SunJCE: Cipher.PBEWithSHA1AndDESede ->
com.sun.crypto.provider.PKCS12PBECipherCore$PBEWithSHA1AndDESede
aliases: [OID.1.2.840.113549.1.12.1.3, 1.2.840.113549.1.12.1.3]
SunJCE: Cipher.Blowfish -> com.sun.crypto.provider.BlowfishCipher
attributes: {SupportedKeyFormats=RAW,
SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING,
SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64}
SunJCE: Cipher.AES -> com.sun.crypto.provider.AESCipher$General
aliases: [Rijndael]
attributes: {SupportedKeyFormats=RAW,
SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING,
SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64|CFB72|CFB80|CFB88|CFB96|CFB104|CFB112|CFB120|CFB128|OFB72|OFB80|OFB88|OFB96|OFB104|OFB112|OFB120|OFB128}
SunJCE: Cipher.AES_128/ECB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES128_ECB_NoPadding
aliases: [2.16.840.1.101.3.4.1.1, OID.2.16.840.1.101.3.4.1.1]
SunJCE: Cipher.AES_128/CBC/NoPadding ->
com.sun.crypto.provider.AESCipher$AES128_CBC_NoPadding
aliases: [2.16.840.1.101.3.4.1.2, OID.2.16.840.1.101.3.4.1.2]
SunJCE: Cipher.AES_128/OFB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES128_OFB_NoPadding
aliases: [2.16.840.1.101.3.4.1.3, OID.2.16.840.1.101.3.4.1.3]
SunJCE: Cipher.AES_128/CFB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES128_CFB_NoPadding
aliases: [2.16.840.1.101.3.4.1.4, OID.2.16.840.1.101.3.4.1.4]
SunJCE: Cipher.AES_192/ECB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES192_ECB_NoPadding
aliases: [2.16.840.1.101.3.4.1.21, OID.2.16.840.1.101.3.4.1.21]
SunJCE: Cipher.AES_192/CBC/NoPadding ->
com.sun.crypto.provider.AESCipher$AES192_CBC_NoPadding
aliases: [2.16.840.1.101.3.4.1.22, OID.2.16.840.1.101.3.4.1.22]
SunJCE: Cipher.AES_192/OFB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES192_OFB_NoPadding
aliases: [2.16.840.1.101.3.4.1.23, OID.2.16.840.1.101.3.4.1.23]
SunJCE: Cipher.AES_192/CFB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES192_CFB_NoPadding
aliases: [2.16.840.1.101.3.4.1.24, OID.2.16.840.1.101.3.4.1.24]
SunJCE: Cipher.AES_256/ECB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES256_ECB_NoPadding
aliases: [2.16.840.1.101.3.4.1.41, OID.2.16.840.1.101.3.4.1.41]
SunJCE: Cipher.AES_256/CBC/NoPadding ->
com.sun.crypto.provider.AESCipher$AES256_CBC_NoPadding
aliases: [2.16.840.1.101.3.4.1.42, OID.2.16.840.1.101.3.4.1.42]
SunJCE: Cipher.AES_256/OFB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES256_OFB_NoPadding
aliases: [2.16.840.1.101.3.4.1.43, OID.2.16.840.1.101.3.4.1.43]
SunJCE: Cipher.AES_256/CFB/NoPadding ->
com.sun.crypto.provider.AESCipher$AES256_CFB_NoPadding
aliases: [2.16.840.1.101.3.4.1.44, OID.2.16.840.1.101.3.4.1.44]
SunJCE: Cipher.AESWrap -> com.sun.crypto.provider.AESWrapCipher$General
attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING,
SupportedModes=ECB}
SunJCE: Cipher.AESWrap_128 -> com.sun.crypto.provider.AESWrapCipher$AES128
aliases: [2.16.840.1.101.3.4.1.5, OID.2.16.840.1.101.3.4.1.5]
SunJCE: Cipher.AESWrap_192 -> com.sun.crypto.provider.AESWrapCipher$AES192
aliases: [2.16.840.1.101.3.4.1.25, OID.2.16.840.1.101.3.4.1.25]
SunJCE: Cipher.AESWrap_256 -> com.sun.crypto.provider.AESWrapCipher$AES256
aliases: [2.16.840.1.101.3.4.1.45, OID.2.16.840.1.101.3.4.1.45]
SunJCE: Cipher.RC2 -> com.sun.crypto.provider.RC2Cipher
attributes: {SupportedKeyFormats=RAW,
SupportedPaddings=NOPADDING|PKCS5PADDING|ISO10126PADDING,
SupportedModes=ECB|CBC|PCBC|CTR|CTS|CFB|OFB|CFB8|CFB16|CFB24|CFB32|CFB40|CFB48|CFB56|CFB64|OFB8|OFB16|OFB24|OFB32|OFB40|OFB48|OFB56|OFB64}
SunJCE: Cipher.ARCFOUR -> com.sun.crypto.provider.ARCFOURCipher
aliases: [RC4]
attributes: {SupportedKeyFormats=RAW, SupportedPaddings=NOPADDING,
SupportedModes=ECB}
SunJCE: KeyGenerator.DES -> com.sun.crypto.provider.DESKeyGenerator
SunJCE: KeyGenerator.DESede -> com.sun.crypto.provider.DESedeKeyGenerator
aliases: [TripleDES]
SunJCE: KeyGenerator.Blowfish -> com.sun.crypto.provider.BlowfishKeyGenerator
SunJCE: KeyGenerator.AES -> com.sun.crypto.provider.AESKeyGenerator
aliases: [Rijndael]
SunJCE: KeyGenerator.RC2 ->
com.sun.crypto.provider.KeyGeneratorCore$RC2KeyGenerator
SunJCE: KeyGenerator.ARCFOUR ->
com.sun.crypto.provider.KeyGeneratorCore$ARCFOURKeyGenerator
aliases: [RC4]
SunJCE: KeyGenerator.HmacMD5 -> com.sun.crypto.provider.HmacMD5KeyGenerator
SunJCE: KeyGenerator.HmacSHA1 -> com.sun.crypto.provider.HmacSHA1KeyGenerator
aliases: [OID.1.2.840.113549.2.7, 1.2.840.113549.2.7]
SunJCE: KeyGenerator.HmacSHA224 ->
com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA224
aliases: [OID.1.2.840.113549.2.8, 1.2.840.113549.2.8]
SunJCE: KeyGenerator.HmacSHA256 ->
com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA256
aliases: [OID.1.2.840.113549.2.9, 1.2.840.113549.2.9]
SunJCE: KeyGenerator.HmacSHA384 ->
com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA384
aliases: [OID.1.2.840.113549.2.10, 1.2.840.113549.2.10]
SunJCE: KeyGenerator.HmacSHA512 ->
com.sun.crypto.provider.KeyGeneratorCore$HmacSHA2KG$SHA512
aliases: [OID.1.2.840.113549.2.11, 1.2.840.113549.2.11]
SunJCE: KeyPairGenerator.DiffieHellman ->
com.sun.crypto.provider.DHKeyPairGenerator
aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1]
SunJCE: AlgorithmParameterGenerator.DiffieHellman ->
com.sun.crypto.provider.DHParameterGenerator
aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1]
SunJCE: KeyAgreement.DiffieHellman -> com.sun.crypto.provider.DHKeyAgreement
aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1]
attributes:
{SupportedKeyClasses=javax.crypto.interfaces.DHPublicKey|javax.crypto.interfaces.DHPrivateKey}
SunJCE: AlgorithmParameters.DiffieHellman ->
com.sun.crypto.provider.DHParameters
aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1]
SunJCE: AlgorithmParameters.DES -> com.sun.crypto.provider.DESParameters
SunJCE: AlgorithmParameters.DESede -> com.sun.crypto.provider.DESedeParameters
aliases: [TripleDES]
SunJCE: AlgorithmParameters.PBE -> com.sun.crypto.provider.PBEParameters
SunJCE: AlgorithmParameters.PBEWithMD5AndDES ->
com.sun.crypto.provider.PBEParameters
aliases: [OID.1.2.840.113549.1.5.3, 1.2.840.113549.1.5.3]
SunJCE: AlgorithmParameters.PBEWithMD5AndTripleDES ->
com.sun.crypto.provider.PBEParameters
SunJCE: AlgorithmParameters.PBEWithSHA1AndDESede ->
com.sun.crypto.provider.PBEParameters
aliases: [OID.1.2.840.113549.1.12.1.3, 1.2.840.113549.1.12.1.3]
SunJCE: AlgorithmParameters.PBEWithSHA1AndRC2_40 ->
com.sun.crypto.provider.PBEParameters
aliases: [OID.1.2.840.113549.1.12.1.6, 1.2.840.113549.1.12.1.6]
SunJCE: AlgorithmParameters.Blowfish ->
com.sun.crypto.provider.BlowfishParameters
SunJCE: AlgorithmParameters.AES -> com.sun.crypto.provider.AESParameters
aliases: [Rijndael]
SunJCE: AlgorithmParameters.RC2 -> com.sun.crypto.provider.RC2Parameters
SunJCE: AlgorithmParameters.OAEP -> com.sun.crypto.provider.OAEPParameters
SunJCE: KeyFactory.DiffieHellman -> com.sun.crypto.provider.DHKeyFactory
aliases: [DH, OID.1.2.840.113549.1.3.1, 1.2.840.113549.1.3.1]
SunJCE: SecretKeyFactory.DES -> com.sun.crypto.provider.DESKeyFactory
SunJCE: SecretKeyFactory.DESede -> com.sun.crypto.provider.DESedeKeyFactory
aliases: [TripleDES]
SunJCE: SecretKeyFactory.PBEWithMD5AndDES ->
com.sun.crypto.provider.PBEKeyFactory$PBEWithMD5AndDES
aliases: [OID.1.2.840.113549.1.5.3, 1.2.840.113549.1.5.3, PBE]
SunJCE: SecretKeyFactory.PBEWithMD5AndTripleDES ->
com.sun.crypto.provider.PBEKeyFactory$PBEWithMD5AndTripleDES
SunJCE: SecretKeyFactory.PBEWithSHA1AndDESede ->
com.sun.crypto.provider.PBEKeyFactory$PBEWithSHA1AndDESede
aliases: [OID.1.2.840.113549.1.12.1.3, 1.2.840.113549.1.12.1.3]
SunJCE: SecretKeyFactory.PBEWithSHA1AndRC2_40 ->
com.sun.crypto.provider.PBEKeyFactory$PBEWithSHA1AndRC2_40
aliases: [OID.1.2.840.113549.1.12.1.6, 1.2.840.113549.1.12.1.6]
SunJCE: SecretKeyFactory.PBKDF2WithHmacSHA1 ->
com.sun.crypto.provider.PBKDF2HmacSHA1Factory
aliases: [OID.1.2.840.113549.1.5.12, 1.2.840.113549.1.5.12]
SunJCE: Mac.HmacMD5 -> com.sun.crypto.provider.HmacMD5
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.HmacSHA1 -> com.sun.crypto.provider.HmacSHA1
aliases: [OID.1.2.840.113549.2.7, 1.2.840.113549.2.7]
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.HmacSHA224 -> com.sun.crypto.provider.HmacCore$HmacSHA224
aliases: [OID.1.2.840.113549.2.8, 1.2.840.113549.2.8]
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.HmacSHA256 -> com.sun.crypto.provider.HmacCore$HmacSHA256
aliases: [OID.1.2.840.113549.2.9, 1.2.840.113549.2.9]
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.HmacSHA384 -> com.sun.crypto.provider.HmacCore$HmacSHA384
aliases: [OID.1.2.840.113549.2.10, 1.2.840.113549.2.10]
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.HmacSHA512 -> com.sun.crypto.provider.HmacCore$HmacSHA512
aliases: [OID.1.2.840.113549.2.11, 1.2.840.113549.2.11]
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.HmacPBESHA1 -> com.sun.crypto.provider.HmacPKCS12PBESHA1
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.SslMacMD5 -> com.sun.crypto.provider.SslMacCore$SslMacMD5
attributes: {SupportedKeyFormats=RAW}
SunJCE: Mac.SslMacSHA1 -> com.sun.crypto.provider.SslMacCore$SslMacSHA1
attributes: {SupportedKeyFormats=RAW}
SunJCE: KeyStore.JCEKS -> com.sun.crypto.provider.JceKeyStore
SunJCE: KeyGenerator.SunTlsPrf -> com.sun.crypto.provider.TlsPrfGenerator$V10
SunJCE: KeyGenerator.SunTls12Prf -> com.sun.crypto.provider.TlsPrfGenerator$V12
SunJCE: KeyGenerator.SunTlsMasterSecret ->
com.sun.crypto.provider.TlsMasterSecretGenerator
aliases: [SunTls12MasterSecret]
SunJCE: KeyGenerator.SunTlsKeyMaterial ->
com.sun.crypto.provider.TlsKeyMaterialGenerator
aliases: [SunTls12KeyMaterial]
SunJCE: KeyGenerator.SunTlsRsaPremasterSecret ->
com.sun.crypto.provider.TlsRsaPremasterSecretGenerator
aliases: [SunTls12RsaPremasterSecret]
SunJGSS: GssApiMechanism.1.2.840.113554.1.2.2 ->
sun.security.jgss.krb5.Krb5MechFactory
SunJGSS: GssApiMechanism.1.3.6.1.5.5.2 ->
sun.security.jgss.spnego.SpNegoMechFactory
SunSASL: SaslClientFactory.DIGEST-MD5 ->
com.sun.security.sasl.digest.FactoryImpl
SunSASL: SaslClientFactory.NTLM -> com.sun.security.sasl.ntlm.FactoryImpl
SunSASL: SaslClientFactory.GSSAPI -> com.sun.security.sasl.gsskerb.FactoryImpl
SunSASL: SaslClientFactory.EXTERNAL -> com.sun.security.sasl.ClientFactoryImpl
SunSASL: SaslClientFactory.PLAIN -> com.sun.security.sasl.ClientFactoryImpl
SunSASL: SaslClientFactory.CRAM-MD5 -> com.sun.security.sasl.ClientFactoryImpl
SunSASL: SaslServerFactory.CRAM-MD5 -> com.sun.security.sasl.ServerFactoryImpl
SunSASL: SaslServerFactory.GSSAPI -> com.sun.security.sasl.gsskerb.FactoryImpl
SunSASL: SaslServerFactory.DIGEST-MD5 ->
com.sun.security.sasl.digest.FactoryImpl
SunSASL: SaslServerFactory.NTLM -> com.sun.security.sasl.ntlm.FactoryImpl
XMLDSig: TransformService.http://www.w3.org/2002/06/xmldsig-filter2 ->
org.jcp.xml.dsig.internal.dom.DOMXPathFilter2Transform
aliases: [XPATH2]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/2000/09/xmldsig#enveloped-signature
-> org.jcp.xml.dsig.internal.dom.DOMEnvelopedTransform
aliases: [ENVELOPED]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/2001/10/xml-exc-c14n#WithComments
-> org.jcp.xml.dsig.internal.dom.DOMExcC14NMethod
aliases: [EXCLUSIVE_WITH_COMMENTS]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/2001/10/xml-exc-c14n# ->
org.jcp.xml.dsig.internal.dom.DOMExcC14NMethod
aliases: [EXCLUSIVE]
attributes: {MechanismType=DOM}
XMLDSig:
TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments
-> org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14NMethod
aliases: [INCLUSIVE_WITH_COMMENTS]
attributes: {MechanismType=DOM}
XMLDSig: XMLSignatureFactory.DOM ->
org.jcp.xml.dsig.internal.dom.DOMXMLSignatureFactory
XMLDSig: TransformService.http://www.w3.org/2006/12/xml-c14n11 ->
org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14N11Method
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/2000/09/xmldsig#base64 ->
org.jcp.xml.dsig.internal.dom.DOMBase64Transform
aliases: [BASE64]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/TR/2001/REC-xml-c14n-20010315 ->
org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14NMethod
aliases: [INCLUSIVE]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/TR/1999/REC-xpath-19991116 ->
org.jcp.xml.dsig.internal.dom.DOMXPathTransform
aliases: [XPATH]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/TR/1999/REC-xslt-19991116 ->
org.jcp.xml.dsig.internal.dom.DOMXSLTTransform
aliases: [XSLT]
attributes: {MechanismType=DOM}
XMLDSig: TransformService.http://www.w3.org/2006/12/xml-c14n11#WithComments ->
org.jcp.xml.dsig.internal.dom.DOMCanonicalXMLC14N11Method
attributes: {MechanismType=DOM}
XMLDSig: KeyInfoFactory.DOM -> org.jcp.xml.dsig.internal.dom.DOMKeyInfoFactory
SunPCSC: TerminalFactory.PC/SC -> sun.security.smartcardio.SunPCSC$Factory
{code}
> Unable to set a ssl provider
> ----------------------------
>
> Key: KAFKA-3647
> URL: https://issues.apache.org/jira/browse/KAFKA-3647
> Project: Kafka
> Issue Type: Bug
> Components: security
> Affects Versions: 0.9.0.1
> Environment: Centos, OracleJRE 8, Vagrant
> Reporter: Elvar
>
> When defining a ssl provider Kafka does not start because the provider was
> not found.
> {code}
> [2016-05-02 13:48:48,252] FATAL [Kafka Server 11], Fatal error during
> KafkaServer startup. Prepare to shutdown (kafka.server.KafkaServer)
> org.apache.kafka.common.KafkaException:
> org.apache.kafka.common.KafkaException:
> java.security.NoSuchProviderException: no such provider: sun.security.ec.SunEC
> at
> org.apache.kafka.common.network.SslChannelBuilder.configure(SslChannelBuilder.java:44)
> {code}
> To test
> {code}
> /bin/kafka-server-start /etc/kafka/server.properties --override
> ssl.provider=sun.security.ec.SunEC
> {code}
> This is stopping us from talking to Kafka with SSL from Go programs because
> no common cipher suites are available.
> Using sslscan this is available from Kafka
> {code}
> Supported Server Cipher(s):
> Accepted TLSv1 256 bits DHE-DSS-AES256-SHA
> Accepted TLSv1 128 bits DHE-DSS-AES128-SHA
> Accepted TLSv1 128 bits EDH-DSS-DES-CBC3-SHA
> Accepted TLS11 256 bits DHE-DSS-AES256-SHA
> Accepted TLS11 128 bits DHE-DSS-AES128-SHA
> Accepted TLS11 128 bits EDH-DSS-DES-CBC3-SHA
> Accepted TLS12 256 bits DHE-DSS-AES256-GCM-SHA384
> Accepted TLS12 256 bits DHE-DSS-AES256-SHA256
> Accepted TLS12 256 bits DHE-DSS-AES256-SHA
> Accepted TLS12 128 bits DHE-DSS-AES128-GCM-SHA256
> Accepted TLS12 128 bits DHE-DSS-AES128-SHA256
> Accepted TLS12 128 bits DHE-DSS-AES128-SHA
> Accepted TLS12 128 bits EDH-DSS-DES-CBC3-SHA
> Preferred Server Cipher(s):
> SSLv2 0 bits (NONE)
> TLSv1 256 bits DHE-DSS-AES256-SHA
> TLS11 256 bits DHE-DSS-AES256-SHA
> TLS12 256 bits DHE-DSS-AES256-GCM-SHA384
> {code}
> From the Golang documentation these are avilable there
> {code}
> TLS_RSA_WITH_RC4_128_SHA uint16 = 0x0005
> TLS_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0x000a
> TLS_RSA_WITH_AES_128_CBC_SHA uint16 = 0x002f
> TLS_RSA_WITH_AES_256_CBC_SHA uint16 = 0x0035
> TLS_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0x009c
> TLS_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0x009d
> TLS_ECDHE_ECDSA_WITH_RC4_128_SHA uint16 = 0xc007
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA uint16 = 0xc009
> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA uint16 = 0xc00a
> TLS_ECDHE_RSA_WITH_RC4_128_SHA uint16 = 0xc011
> TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA uint16 = 0xc012
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA uint16 = 0xc013
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA uint16 = 0xc014
> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02f
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 uint16 = 0xc02b
> TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc030
> TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 uint16 = 0xc02c
> {code}
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)