Enable the debug logging for SslContextFactory and you should see the list
of selected ciphers when your server starts up.

Joakim Erdfelt / [email protected]

On Thu, Apr 21, 2016 at 5:07 PM, Steve Sobol - Lobos Studios <
[email protected]> wrote:

> Oddly enough, SSLContextFactory doesn't have an addIncludeCipherSuites()
> method. I'm going to revert to 9.3.3 for now, until one of us comes up with
> an answer. Mine, if I was creating the server instance programmatically,
> would be to get the list of included ciphers, add those two, and call
> setIncludeCipherSuites(), but I'm not sure how to translate that to an XML
> config.
>
> On 4/21/2016 4:55 PM, Joakim Erdfelt wrote:
>
> These 2 should not have been excluded by Jetty, and should be the ones in
> common for IE 8-10
>
> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy128
> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy256
>
> Those are listed as a supported cipher suite for Java 7 and Java 8
>
> https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html
>
>
> Joakim Erdfelt / <[email protected]>[email protected]
>
> On Thu, Apr 21, 2016 at 4:15 PM, Greg Wilkins <[email protected]> wrote:
>
>> Steve,
>>
>> running stock jetty-9.3 in latest java8 gives me the following
>> protocols and ciphers:
>>
>> [TLSv1, TLSv1.1, TLSv1.2]
>> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
>> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
>> TLS_RSA_WITH_AES_128_CBC_SHA256
>> TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
>> TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
>> TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
>> TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
>> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
>> TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
>> TLS_DHE_DSS_WITH_AES_128_CBC_SHA
>> TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
>> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
>> TLS_RSA_WITH_AES_128_GCM_SHA256
>> TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
>> TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
>> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
>> TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
>> TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
>> TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
>> SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
>> TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
>> TLS_ECDH_ECDSA_WITH_RC4_128_SHA
>> TLS_EMPTY_RENEGOTIATION_INFO_SCSV
>>
>>
>> Following the link on ssllabs shows that IE 8-10 will only speak
>> SSL3.0 or TLS1.0.... so TLS1.0 it will have to be.  It has the
>> following ciphers:
>>
>> TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)128
>> TLS_RSA_WITH_AES_256_CBC_SHA (0x35)256
>> TLS_RSA_WITH_RC4_128_SHA (0x5)   WEAK128
>> TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)112
>> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)   Forward Secrecy128
>> TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)   Forward Secrecy256
>> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy128
>> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy256
>> TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x32)   Forward Secrecy2128
>> TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x38)   Forward Secrecy2256
>> TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x13)   Forward Secrecy2112
>> TLS_RSA_WITH_RC4_128_MD5 (0x4)   WEAK
>>
>>
>> So there are indeed no ciphers in common!
>>
>> You would think that TLS_RSA_WITH_AES_256_CBC_SHA (0x35)256  should be
>> acceptable to the server as it does accept
>> TLS_RSA_WITH_AES_128_CBC_SHA256 ?
>>
>> Let me investigate why that is not being offered....
>>
>>
>>
>>
>>
>>
>> On 22 April 2016 at 07:47, Steve Sobol - Lobos Studios
>> <[email protected]> wrote:
>> > Ok. This is not cool. After the upgrade to 9.3.8 and a modification of
>> my
>> > SSLContextFactory
>> >
>> > <?xml version="1.0"?>
>> > <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN"
>> > "http://www.eclipse.org/jetty/configure_9_3.dtd";>
>> >
>> > <!-- ============================================================= -->
>> > <!-- SSL ContextFactory configuration                              -->
>> > <!-- ============================================================= -->
>> > <Configure id="sslContextFactory"
>> > class="org.eclipse.jetty.util.ssl.SslContextFactory">
>> >   <Set name="KeyStorePath"><Property name="jetty.base" default="."
>> > />/keystores/www6-production-keystore.jks</Set>
>> >   <Set
>> >
>> name="KeyStorePassword">OBF:1m0j1zt11xtv1v9s1wfw1n4j1n6z1wg21v8u1xtn1zsp1lxn</Set>
>> >   <Set name="TrustStorePath"><Property name="jetty.base" default="."
>> > />/keystores/truststore.jks</Set>
>> >   <Set
>> >
>> name="TrustStorePassword">OBF:1m0j1zt11xtv1v9s1wfw1n4j1n6z1wg21v8u1xtn1zsp1lxn</Set>
>> >   <Set name="NeedClientAuth">false</Set>
>> >   <Set name="WantClientAuth">false</Set>
>> >   <Call name="addExcludeCipherSuites">
>> >     <Arg>
>> >       <Array type="String">
>> >         <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 </Item>
>> >         <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item>
>> >       </Array>
>> >     </Arg>
>> >   </Call>
>> >   <Set name="useCipherSuitesOrder"><Property
>> > name="jetty.sslContext.useCipherSuitesOrder" default="true"/></Set>
>> > </Configure>
>> >
>> > the weak cipher warnings are all gone, but the server only speaks TLS
>> 1.2
>> > now, and a the test's simulated IE 10 connection is failing. I'm OK not
>> > supporting Android browsers prior to 4.4; they're old. I'm fine not
>> > supporting IE 6, 7, 8 and Safari browsers that are three versions older
>> than
>> > the current version (those tests all failed). But I need to support IE
>> 9, 10
>> > and 11.
>> >
>> >
>> https://www.ssllabs.com/ssltest/analyze.html?d=admin.bamidbarconnect.com
>> >
>> > Also, does ANYONE know how to fix the allegedly broken certificate
>> chain?
>> >
>> > Thanks
>> >
>> >
>> >
>> > On 4/21/2016 12:59 PM, Steve Sobol - Lobos Studios wrote:
>> >
>> > So in the future, if I need to update the list and am not able to
>> > immediately upgrade Jetty for whatever reason, I'm thinking I should use
>> >
>> > addExcludeCipherSuites()
>> >
>> > instead, yes?
>> >
>> >
>> > On 4/21/2016 12:57 PM, Joakim Erdfelt wrote:
>> >
>> > When you used <Set name="ExcludeCipherSuites">
>> >
>> > You undid the existing exclusions in Jetty 9.3.3
>> >
>> >
>> https://github.com/eclipse/jetty.project/blob/jetty-9.3.3.v20150827/jetty-util/src/main/java/org/eclipse/jetty/util/ssl/SslContextFactory.java#L252-L259
>> >
>> >     public SslContextFactory(boolean trustAll)
>> >     {
>> >         setTrustAll(trustAll);
>> >         addExcludeProtocols("SSL", "SSLv2", "SSLv2Hello", "SSLv3");
>> >         setExcludeCipherSuites(
>> >                 "SSL_RSA_WITH_DES_CBC_SHA",
>> >                 "SSL_DHE_RSA_WITH_DES_CBC_SHA",
>> >                 "SSL_DHE_DSS_WITH_DES_CBC_SHA",
>> >                 "SSL_RSA_EXPORT_WITH_RC4_40_MD5",
>> >                 "SSL_RSA_EXPORT_WITH_DES40_CBC_SHA",
>> >                 "SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA",
>> >                 "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA");
>> >    }
>> >
>> > If you use Jetty 9.3.8, you'll find the exclusion list is more strict
>> ...
>> >
>> >
>> https://github.com/eclipse/jetty.project/blob/jetty-9.3.8.v20160314/jetty-util/src/main/java/org/eclipse/jetty/util/ssl/SslContextFactory.java#L252-L255
>> >
>> >     public SslContextFactory(boolean trustAll)
>> >     {
>> >         setTrustAll(trustAll);
>> >         addExcludeProtocols("SSL", "SSLv2", "SSLv2Hello", "SSLv3");
>> >         setExcludeCipherSuites(
>> >                 "^.*_RSA_.*_(MD5|SHA|SHA1)$",
>> >                 "SSL_DHE_DSS_WITH_DES_CBC_SHA",
>> >                 "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA");
>> >     }
>> >
>> >
>> > Joakim Erdfelt / [email protected]
>> >
>> > On Thu, Apr 21, 2016 at 10:28 AM, Steve Sobol - Lobos Studios
>> > <[email protected]> wrote:
>> >>
>> >> Jetty 9.3.3.v20150827
>> >>
>> >> I have two problems the Qualys SSL Test is reporting with one of my
>> >> Jetty-hosted websites and I'm not sure how to fix them.
>> >>
>> >> Both are preventing this website from getting an "A" rating. I'm at a
>> "B"
>> >> now.
>> >>
>> >> First: "This server supports weak Diffie-Hellman (DH) key exchange
>> >> parameters."
>> >> There were a half-dozen weak ciphers I was able to disable. Only one is
>> >> still being reported active:
>> >> TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
>> >>
>> >> But I am doing this:
>> >> <?xml version="1.0"?>
>> >> <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN"
>> >> "http://www.eclipse.org/jetty/configure_9_3.dtd";>
>> >>
>> >> <!-- ============================================================= -->
>> >> <!-- SSL ContextFactory configuration                              -->
>> >> <!-- ============================================================= -->
>> >> <Configure id="sslContextFactory"
>> >> class="org.eclipse.jetty.util.ssl.SslContextFactory">
>> >>   <Set name="KeyStorePath"><Property name="jetty.base" default="."
>> >> />/path/to/keystore.jks</Set>
>> >>   <Set name="KeyStorePassword">OBF:NoneYoBizness</Set>
>> >>   <Set name="TrustStorePath"><Property name="jetty.base" default="."
>> >> />/path/to/keystore.jks</Set>
>> >>   <Set name="TrustStorePassword">OBF:NoneYoBizness</Set>
>> >>   <Set name="NeedClientAuth">false</Set>
>> >>   <Set name="WantClientAuth">false</Set>
>> >>   <Set name="ExcludeCipherSuites">
>> >>   <Array type="String">
>> >>     <Item>SSL_RSA_WITH_DES_CBC_SHA</Item>
>> >>     <Item>SSL_DHE_RSA_WITH_DES_CBC_SHA</Item>
>> >>     <Item>SSL_DHE_DSS_WITH_DES_CBC_SHA</Item>
>> >>     <Item>SSL_RSA_EXPORT_WITH_RC4_40_MD5</Item>
>> >>     <Item>SSL_RSA_EXPORT_WITH_DES40_CBC_SHA</Item>
>> >>     <Item>SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</Item>
>> >>     <Item>SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</Item>
>> >>     <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</Item>
>> >>     <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</Item>
>> >>     <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item>
>> >>     <Item>TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</Item>
>> >>   </Array>
>> >>   </Set>
>> >>   <Set name="useCipherSuitesOrder"><Property
>> >> name="jetty.sslContext.useCipherSuitesOrder" default="true"/></Set>
>> >> </Configure>
>> >>
>> >> I specifically exclude the cipher SSL Labs is complaining about.
>> >>
>> >> The other problem: The SSL Labs test says that my certificate chain is
>> >> incomplete. But I have the Comodo certificate for the website in the
>> >> server's keystore, and I have all three intermediate certificates in
>> the
>> >> truststore.
>> >>
>> >> Any ideas?
>> >>
>> >> Thanks.
>> >>
>> >>
>> >>
>> >>
>> >> --
>> >> Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
>> >> Facebook.com/LobosStudios | @LobosStudios
>> >> Web Development - Mobile Development - Helpdesk/Tech Support - Computer
>> >> Sales & Service
>> >> Acer Authorized Reseller - Computers, Windows and Android Tablets,
>> >> Accessories
>> >>
>> >> Steve Sobol - CEO, Senior Developer and Server Jockey
>> >> [email protected]
>> >>
>> >> _______________________________________________
>> >> jetty-users mailing list
>> >> [email protected]
>> >> To change your delivery options, retrieve your password, or unsubscribe
>> >> from this list, visit
>> >> https://dev.eclipse.org/mailman/listinfo/jetty-users
>> >
>> >
>> >
>> >
>> > _______________________________________________
>> > jetty-users mailing list
>> > [email protected]
>> > To change your delivery options, retrieve your password, or unsubscribe
>> from
>> > this list, visit
>> > https://dev.eclipse.org/mailman/listinfo/jetty-users
>> >
>> >
>> > --
>> > Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
>> > Facebook.com/LobosStudios | @LobosStudios
>> > Web Development - Mobile Development - Helpdesk/Tech Support - Computer
>> > Sales & Service
>> > Acer Authorized Reseller - Computers, Windows and Android Tablets,
>> > Accessories
>> >
>> > Steve Sobol - CEO, Senior Developer and Server Jockey
>> > [email protected]
>> >
>> >
>> > --
>> > Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
>> > Facebook.com/LobosStudios | @LobosStudios
>> > Web Development - Mobile Development - Helpdesk/Tech Support - Computer
>> > Sales & Service
>> > Acer Authorized Reseller - Computers, Windows and Android Tablets,
>> > Accessories
>> >
>> > Steve Sobol - CEO, Senior Developer and Server Jockey
>> > [email protected]
>> >
>> >
>> > _______________________________________________
>> > jetty-users mailing list
>> > [email protected]
>> > To change your delivery options, retrieve your password, or unsubscribe
>> from
>> > this list, visit
>> > https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>>
>>
>> --
>> Greg Wilkins <[email protected]> CTO http://webtide.com
>> _______________________________________________
>> jetty-users mailing list
>> [email protected]
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
>
> _______________________________________________
> jetty-users mailing [email protected]
> To change your delivery options, retrieve your password, or unsubscribe from 
> this list, visithttps://dev.eclipse.org/mailman/listinfo/jetty-users
>
>
> --
> Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com | 
> Facebook.com/LobosStudios | @LobosStudios
> Web Development - Mobile Development - Helpdesk/Tech Support - Computer Sales 
> & Service
> Acer Authorized Reseller - Computers, Windows and Android Tablets, Accessories
>
> Steve Sobol - CEO, Senior Developer and Server [email protected]
>
>
> _______________________________________________
> jetty-users mailing list
> [email protected]
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
_______________________________________________
jetty-users mailing list
[email protected]
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Reply via email to