These 2 should not have been excluded by Jetty, and should be the ones in
common for IE 8-10

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy128
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy256

Those are listed as a supported cipher suite for Java 7 and Java 8
https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html


Joakim Erdfelt / [email protected]

On Thu, Apr 21, 2016 at 4:15 PM, Greg Wilkins <[email protected]> wrote:

> Steve,
>
> running stock jetty-9.3 in latest java8 gives me the following
> protocols and ciphers:
>
> [TLSv1, TLSv1.1, TLSv1.2]
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
> TLS_RSA_WITH_AES_128_CBC_SHA256
> TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
> TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
> TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
> TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
> TLS_DHE_DSS_WITH_AES_128_CBC_SHA
> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
> TLS_RSA_WITH_AES_128_GCM_SHA256
> TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
> TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
> TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
> TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
> TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
> SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
> TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
> TLS_ECDH_ECDSA_WITH_RC4_128_SHA
> TLS_EMPTY_RENEGOTIATION_INFO_SCSV
>
>
> Following the link on ssllabs shows that IE 8-10 will only speak
> SSL3.0 or TLS1.0.... so TLS1.0 it will have to be.  It has the
> following ciphers:
>
> TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)128
> TLS_RSA_WITH_AES_256_CBC_SHA (0x35)256
> TLS_RSA_WITH_RC4_128_SHA (0x5)   WEAK128
> TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)112
> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)   Forward Secrecy128
> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)   Forward Secrecy256
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy128
> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy256
> TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x32)   Forward Secrecy2128
> TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x38)   Forward Secrecy2256
> TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x13)   Forward Secrecy2112
> TLS_RSA_WITH_RC4_128_MD5 (0x4)   WEAK
>
>
> So there are indeed no ciphers in common!
>
> You would think that TLS_RSA_WITH_AES_256_CBC_SHA (0x35)256  should be
> acceptable to the server as it does accept
> TLS_RSA_WITH_AES_128_CBC_SHA256 ?
>
> Let me investigate why that is not being offered....
>
>
>
>
>
>
> On 22 April 2016 at 07:47, Steve Sobol - Lobos Studios
> <[email protected]> wrote:
> > Ok. This is not cool. After the upgrade to 9.3.8 and a modification of my
> > SSLContextFactory
> >
> > <?xml version="1.0"?>
> > <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN"
> > "http://www.eclipse.org/jetty/configure_9_3.dtd";>
> >
> > <!-- ============================================================= -->
> > <!-- SSL ContextFactory configuration                              -->
> > <!-- ============================================================= -->
> > <Configure id="sslContextFactory"
> > class="org.eclipse.jetty.util.ssl.SslContextFactory">
> >   <Set name="KeyStorePath"><Property name="jetty.base" default="."
> > />/keystores/www6-production-keystore.jks</Set>
> >   <Set
> >
> name="KeyStorePassword">OBF:1m0j1zt11xtv1v9s1wfw1n4j1n6z1wg21v8u1xtn1zsp1lxn</Set>
> >   <Set name="TrustStorePath"><Property name="jetty.base" default="."
> > />/keystores/truststore.jks</Set>
> >   <Set
> >
> name="TrustStorePassword">OBF:1m0j1zt11xtv1v9s1wfw1n4j1n6z1wg21v8u1xtn1zsp1lxn</Set>
> >   <Set name="NeedClientAuth">false</Set>
> >   <Set name="WantClientAuth">false</Set>
> >   <Call name="addExcludeCipherSuites">
> >     <Arg>
> >       <Array type="String">
> >         <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 </Item>
> >         <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item>
> >       </Array>
> >     </Arg>
> >   </Call>
> >   <Set name="useCipherSuitesOrder"><Property
> > name="jetty.sslContext.useCipherSuitesOrder" default="true"/></Set>
> > </Configure>
> >
> > the weak cipher warnings are all gone, but the server only speaks TLS 1.2
> > now, and a the test's simulated IE 10 connection is failing. I'm OK not
> > supporting Android browsers prior to 4.4; they're old. I'm fine not
> > supporting IE 6, 7, 8 and Safari browsers that are three versions older
> than
> > the current version (those tests all failed). But I need to support IE
> 9, 10
> > and 11.
> >
> > https://www.ssllabs.com/ssltest/analyze.html?d=admin.bamidbarconnect.com
> >
> > Also, does ANYONE know how to fix the allegedly broken certificate chain?
> >
> > Thanks
> >
> >
> >
> > On 4/21/2016 12:59 PM, Steve Sobol - Lobos Studios wrote:
> >
> > So in the future, if I need to update the list and am not able to
> > immediately upgrade Jetty for whatever reason, I'm thinking I should use
> >
> > addExcludeCipherSuites()
> >
> > instead, yes?
> >
> >
> > On 4/21/2016 12:57 PM, Joakim Erdfelt wrote:
> >
> > When you used <Set name="ExcludeCipherSuites">
> >
> > You undid the existing exclusions in Jetty 9.3.3
> >
> >
> https://github.com/eclipse/jetty.project/blob/jetty-9.3.3.v20150827/jetty-util/src/main/java/org/eclipse/jetty/util/ssl/SslContextFactory.java#L252-L259
> >
> >     public SslContextFactory(boolean trustAll)
> >     {
> >         setTrustAll(trustAll);
> >         addExcludeProtocols("SSL", "SSLv2", "SSLv2Hello", "SSLv3");
> >         setExcludeCipherSuites(
> >                 "SSL_RSA_WITH_DES_CBC_SHA",
> >                 "SSL_DHE_RSA_WITH_DES_CBC_SHA",
> >                 "SSL_DHE_DSS_WITH_DES_CBC_SHA",
> >                 "SSL_RSA_EXPORT_WITH_RC4_40_MD5",
> >                 "SSL_RSA_EXPORT_WITH_DES40_CBC_SHA",
> >                 "SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA",
> >                 "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA");
> >    }
> >
> > If you use Jetty 9.3.8, you'll find the exclusion list is more strict ...
> >
> >
> https://github.com/eclipse/jetty.project/blob/jetty-9.3.8.v20160314/jetty-util/src/main/java/org/eclipse/jetty/util/ssl/SslContextFactory.java#L252-L255
> >
> >     public SslContextFactory(boolean trustAll)
> >     {
> >         setTrustAll(trustAll);
> >         addExcludeProtocols("SSL", "SSLv2", "SSLv2Hello", "SSLv3");
> >         setExcludeCipherSuites(
> >                 "^.*_RSA_.*_(MD5|SHA|SHA1)$",
> >                 "SSL_DHE_DSS_WITH_DES_CBC_SHA",
> >                 "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA");
> >     }
> >
> >
> > Joakim Erdfelt / [email protected]
> >
> > On Thu, Apr 21, 2016 at 10:28 AM, Steve Sobol - Lobos Studios
> > <[email protected]> wrote:
> >>
> >> Jetty 9.3.3.v20150827
> >>
> >> I have two problems the Qualys SSL Test is reporting with one of my
> >> Jetty-hosted websites and I'm not sure how to fix them.
> >>
> >> Both are preventing this website from getting an "A" rating. I'm at a
> "B"
> >> now.
> >>
> >> First: "This server supports weak Diffie-Hellman (DH) key exchange
> >> parameters."
> >> There were a half-dozen weak ciphers I was able to disable. Only one is
> >> still being reported active:
> >> TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
> >>
> >> But I am doing this:
> >> <?xml version="1.0"?>
> >> <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN"
> >> "http://www.eclipse.org/jetty/configure_9_3.dtd";>
> >>
> >> <!-- ============================================================= -->
> >> <!-- SSL ContextFactory configuration                              -->
> >> <!-- ============================================================= -->
> >> <Configure id="sslContextFactory"
> >> class="org.eclipse.jetty.util.ssl.SslContextFactory">
> >>   <Set name="KeyStorePath"><Property name="jetty.base" default="."
> >> />/path/to/keystore.jks</Set>
> >>   <Set name="KeyStorePassword">OBF:NoneYoBizness</Set>
> >>   <Set name="TrustStorePath"><Property name="jetty.base" default="."
> >> />/path/to/keystore.jks</Set>
> >>   <Set name="TrustStorePassword">OBF:NoneYoBizness</Set>
> >>   <Set name="NeedClientAuth">false</Set>
> >>   <Set name="WantClientAuth">false</Set>
> >>   <Set name="ExcludeCipherSuites">
> >>   <Array type="String">
> >>     <Item>SSL_RSA_WITH_DES_CBC_SHA</Item>
> >>     <Item>SSL_DHE_RSA_WITH_DES_CBC_SHA</Item>
> >>     <Item>SSL_DHE_DSS_WITH_DES_CBC_SHA</Item>
> >>     <Item>SSL_RSA_EXPORT_WITH_RC4_40_MD5</Item>
> >>     <Item>SSL_RSA_EXPORT_WITH_DES40_CBC_SHA</Item>
> >>     <Item>SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</Item>
> >>     <Item>SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</Item>
> >>     <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</Item>
> >>     <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</Item>
> >>     <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item>
> >>     <Item>TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</Item>
> >>   </Array>
> >>   </Set>
> >>   <Set name="useCipherSuitesOrder"><Property
> >> name="jetty.sslContext.useCipherSuitesOrder" default="true"/></Set>
> >> </Configure>
> >>
> >> I specifically exclude the cipher SSL Labs is complaining about.
> >>
> >> The other problem: The SSL Labs test says that my certificate chain is
> >> incomplete. But I have the Comodo certificate for the website in the
> >> server's keystore, and I have all three intermediate certificates in the
> >> truststore.
> >>
> >> Any ideas?
> >>
> >> Thanks.
> >>
> >>
> >>
> >>
> >> --
> >> Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
> >> Facebook.com/LobosStudios | @LobosStudios
> >> Web Development - Mobile Development - Helpdesk/Tech Support - Computer
> >> Sales & Service
> >> Acer Authorized Reseller - Computers, Windows and Android Tablets,
> >> Accessories
> >>
> >> Steve Sobol - CEO, Senior Developer and Server Jockey
> >> [email protected]
> >>
> >> _______________________________________________
> >> jetty-users mailing list
> >> [email protected]
> >> To change your delivery options, retrieve your password, or unsubscribe
> >> from this list, visit
> >> https://dev.eclipse.org/mailman/listinfo/jetty-users
> >
> >
> >
> >
> > _______________________________________________
> > jetty-users mailing list
> > [email protected]
> > To change your delivery options, retrieve your password, or unsubscribe
> from
> > this list, visit
> > https://dev.eclipse.org/mailman/listinfo/jetty-users
> >
> >
> > --
> > Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
> > Facebook.com/LobosStudios | @LobosStudios
> > Web Development - Mobile Development - Helpdesk/Tech Support - Computer
> > Sales & Service
> > Acer Authorized Reseller - Computers, Windows and Android Tablets,
> > Accessories
> >
> > Steve Sobol - CEO, Senior Developer and Server Jockey
> > [email protected]
> >
> >
> > --
> > Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
> > Facebook.com/LobosStudios | @LobosStudios
> > Web Development - Mobile Development - Helpdesk/Tech Support - Computer
> > Sales & Service
> > Acer Authorized Reseller - Computers, Windows and Android Tablets,
> > Accessories
> >
> > Steve Sobol - CEO, Senior Developer and Server Jockey
> > [email protected]
> >
> >
> > _______________________________________________
> > jetty-users mailing list
> > [email protected]
> > To change your delivery options, retrieve your password, or unsubscribe
> from
> > this list, visit
> > https://dev.eclipse.org/mailman/listinfo/jetty-users
>
>
>
> --
> Greg Wilkins <[email protected]> CTO http://webtide.com
> _______________________________________________
> jetty-users mailing list
> [email protected]
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
_______________________________________________
jetty-users mailing list
[email protected]
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Reply via email to