Duh. Looking at your reply, again... I can just get the list, add the two required ciphers and use setIncludedCiphers.

Sorry, brain fart


On 4/21/2016 5:27 PM, Steve Sobol - Lobos Studios wrote:

Noted, but there's no way to add to the list of included ciphers like you add to the list of excluded ones.


On 4/21/2016 5:26 PM, Joakim Erdfelt wrote:
Enable the debug logging for SslContextFactory and you should see the list of selected ciphers when your server starts up.

Joakim Erdfelt / [email protected]

On Thu, Apr 21, 2016 at 5:07 PM, Steve Sobol - Lobos Studios <[email protected]> wrote:

    Oddly enough, SSLContextFactory doesn't have an
    addIncludeCipherSuites() method. I'm going to revert to 9.3.3 for
    now, until one of us comes up with an answer. Mine, if I was
    creating the server instance programmatically, would be to get
    the list of included ciphers, add those two, and call
    setIncludeCipherSuites(), but I'm not sure how to translate that
    to an XML config.


    On 4/21/2016 4:55 PM, Joakim Erdfelt wrote:
    These 2 should not have been excluded by Jetty, and should be
    the ones in common for IE 8-10

    TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward Secrecy128
    TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward Secrecy256

    Those are listed as a supported cipher suite for Java 7 and Java 8
    
https://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html


    Joakim Erdfelt / [email protected] <mailto:[email protected]>

    On Thu, Apr 21, 2016 at 4:15 PM, Greg Wilkins
    <[email protected]> wrote:

        Steve,

        running stock jetty-9.3 in latest java8 gives me the following
        protocols and ciphers:

        [TLSv1, TLSv1.1, TLSv1.2]
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
        TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
        TLS_RSA_WITH_AES_128_CBC_SHA256
        TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
        TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
        TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
        TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
        TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
        TLS_DHE_DSS_WITH_AES_128_CBC_SHA
        TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
        TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
        TLS_RSA_WITH_AES_128_GCM_SHA256
        TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
        TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
        TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
        TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
        TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
        TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
        SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
        TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
        TLS_ECDH_ECDSA_WITH_RC4_128_SHA
        TLS_EMPTY_RENEGOTIATION_INFO_SCSV


        Following the link on ssllabs shows that IE 8-10 will only speak
        SSL3.0 or TLS1.0.... so TLS1.0 it will have to be.  It has the
        following ciphers:

        TLS_RSA_WITH_AES_128_CBC_SHA (0x2f)128
        TLS_RSA_WITH_AES_256_CBC_SHA (0x35)256
        TLS_RSA_WITH_RC4_128_SHA (0x5)   WEAK128
        TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa)112
        TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013)  Forward Secrecy128
        TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014)  Forward Secrecy256
        TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)   Forward
        Secrecy128
        TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)   Forward
        Secrecy256
        TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x32)  Forward Secrecy2128
        TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x38)  Forward Secrecy2256
        TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x13)  Forward Secrecy2112
        TLS_RSA_WITH_RC4_128_MD5 (0x4)   WEAK


        So there are indeed no ciphers in common!

        You would think that TLS_RSA_WITH_AES_256_CBC_SHA (0x35)256
        should be
        acceptable to the server as it does accept
        TLS_RSA_WITH_AES_128_CBC_SHA256 ?

        Let me investigate why that is not being offered....






        On 22 April 2016 at 07:47, Steve Sobol - Lobos Studios
        <[email protected] <mailto:[email protected]>> wrote:
        > Ok. This is not cool. After the upgrade to 9.3.8 and a
        modification of my
        > SSLContextFactory
        >
        > <?xml version="1.0"?>
        > <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN"
        > "http://www.eclipse.org/jetty/configure_9_3.dtd";>
        >
        > <!--
        =============================================================
        -->
        > <!-- SSL ContextFactory configuration   -->
        > <!--
        =============================================================
        -->
        > <Configure id="sslContextFactory"
        > class="org.eclipse.jetty.util.ssl.SslContextFactory">
        >   <Set name="KeyStorePath"><Property name="jetty.base"
        default="."
        > />/keystores/www6-production-keystore.jks</Set>
        >   <Set
        >
        
name="KeyStorePassword">OBF:1m0j1zt11xtv1v9s1wfw1n4j1n6z1wg21v8u1xtn1zsp1lxn</Set>
        >   <Set name="TrustStorePath"><Property name="jetty.base"
        default="."
        > />/keystores/truststore.jks</Set>
        >   <Set
        >
        
name="TrustStorePassword">OBF:1m0j1zt11xtv1v9s1wfw1n4j1n6z1wg21v8u1xtn1zsp1lxn</Set>
        >   <Set name="NeedClientAuth">false</Set>
        >   <Set name="WantClientAuth">false</Set>
        >   <Call name="addExcludeCipherSuites">
        >     <Arg>
        >       <Array type="String">
        >  <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 </Item>
        >  <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item>
        >       </Array>
        >     </Arg>
        >   </Call>
        >   <Set name="useCipherSuitesOrder"><Property
        > name="jetty.sslContext.useCipherSuitesOrder"
        default="true"/></Set>
        > </Configure>
        >
        > the weak cipher warnings are all gone, but the server only
        speaks TLS 1.2
        > now, and a the test's simulated IE 10 connection is
        failing. I'm OK not
        > supporting Android browsers prior to 4.4; they're old. I'm
        fine not
        > supporting IE 6, 7, 8 and Safari browsers that are three
        versions older than
        > the current version (those tests all failed). But I need
        to support IE 9, 10
        > and 11.
        >
        >
        https://www.ssllabs.com/ssltest/analyze.html?d=admin.bamidbarconnect.com
        >
        > Also, does ANYONE know how to fix the allegedly broken
        certificate chain?
        >
        > Thanks
        >
        >
        >
        > On 4/21/2016 12:59 PM, Steve Sobol - Lobos Studios wrote:
        >
        > So in the future, if I need to update the list and am not
        able to
        > immediately upgrade Jetty for whatever reason, I'm
        thinking I should use
        >
        > addExcludeCipherSuites()
        >
        > instead, yes?
        >
        >
        > On 4/21/2016 12:57 PM, Joakim Erdfelt wrote:
        >
        > When you used <Set name="ExcludeCipherSuites">
        >
        > You undid the existing exclusions in Jetty 9.3.3
        >
        >
        
https://github.com/eclipse/jetty.project/blob/jetty-9.3.3.v20150827/jetty-util/src/main/java/org/eclipse/jetty/util/ssl/SslContextFactory.java#L252-L259
        >
        >     public SslContextFactory(boolean trustAll)
        >     {
        >         setTrustAll(trustAll);
        >         addExcludeProtocols("SSL", "SSLv2", "SSLv2Hello",
        "SSLv3");
        >         setExcludeCipherSuites(
        >  "SSL_RSA_WITH_DES_CBC_SHA",
        >  "SSL_DHE_RSA_WITH_DES_CBC_SHA",
        >  "SSL_DHE_DSS_WITH_DES_CBC_SHA",
        >  "SSL_RSA_EXPORT_WITH_RC4_40_MD5",
        >  "SSL_RSA_EXPORT_WITH_DES40_CBC_SHA",
        >  "SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA",
        >  "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA");
        >    }
        >
        > If you use Jetty 9.3.8, you'll find the exclusion list is
        more strict ...
        >
        >
        
https://github.com/eclipse/jetty.project/blob/jetty-9.3.8.v20160314/jetty-util/src/main/java/org/eclipse/jetty/util/ssl/SslContextFactory.java#L252-L255
        >
        >     public SslContextFactory(boolean trustAll)
        >     {
        >         setTrustAll(trustAll);
        >         addExcludeProtocols("SSL", "SSLv2", "SSLv2Hello",
        "SSLv3");
        >         setExcludeCipherSuites(
        >  "^.*_RSA_.*_(MD5|SHA|SHA1)$",
        >  "SSL_DHE_DSS_WITH_DES_CBC_SHA",
        >  "SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA");
        >     }
        >
        >
        > Joakim Erdfelt / [email protected]
        >
        > On Thu, Apr 21, 2016 at 10:28 AM, Steve Sobol - Lobos Studios
        > <[email protected] <mailto:[email protected]>>
        wrote:
        >>
        >> Jetty 9.3.3.v20150827
        >>
        >> I have two problems the Qualys SSL Test is reporting with
        one of my
        >> Jetty-hosted websites and I'm not sure how to fix them.
        >>
        >> Both are preventing this website from getting an "A"
        rating. I'm at a "B"
        >> now.
        >>
        >> First: "This server supports weak Diffie-Hellman (DH) key
        exchange
        >> parameters."
        >> There were a half-dozen weak ciphers I was able to
        disable. Only one is
        >> still being reported active:
        >> TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA
        >>
        >> But I am doing this:
        >> <?xml version="1.0"?>
        >> <!DOCTYPE Configure PUBLIC "-//Jetty//Configure//EN"
        >> "http://www.eclipse.org/jetty/configure_9_3.dtd";>
        >>
        >> <!--
        =============================================================
        -->
        >> <!-- SSL ContextFactory configuration   -->
        >> <!--
        =============================================================
        -->
        >> <Configure id="sslContextFactory"
        >> class="org.eclipse.jetty.util.ssl.SslContextFactory">
        >>   <Set name="KeyStorePath"><Property name="jetty.base"
        default="."
        >> />/path/to/keystore.jks</Set>
        >>   <Set name="KeyStorePassword">OBF:NoneYoBizness</Set>
        >>   <Set name="TrustStorePath"><Property name="jetty.base"
        default="."
        >> />/path/to/keystore.jks</Set>
        >>   <Set name="TrustStorePassword">OBF:NoneYoBizness</Set>
        >>   <Set name="NeedClientAuth">false</Set>
        >>   <Set name="WantClientAuth">false</Set>
        >>   <Set name="ExcludeCipherSuites">
        >>   <Array type="String">
        >>  <Item>SSL_RSA_WITH_DES_CBC_SHA</Item>
        >>  <Item>SSL_DHE_RSA_WITH_DES_CBC_SHA</Item>
        >>  <Item>SSL_DHE_DSS_WITH_DES_CBC_SHA</Item>
        >>  <Item>SSL_RSA_EXPORT_WITH_RC4_40_MD5</Item>
        >>  <Item>SSL_RSA_EXPORT_WITH_DES40_CBC_SHA</Item>
        >>  <Item>SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</Item>
        >>  <Item>SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</Item>
        >>  <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</Item>
        >>  <Item>TLS_DHE_RSA_WITH_AES_128_CBC_SHA</Item>
        >>  <Item>TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</Item>
        >>  <Item>TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</Item>
        >>   </Array>
        >>   </Set>
        >>   <Set name="useCipherSuitesOrder"><Property
        >> name="jetty.sslContext.useCipherSuitesOrder"
        default="true"/></Set>
        >> </Configure>
        >>
        >> I specifically exclude the cipher SSL Labs is complaining
        about.
        >>
        >> The other problem: The SSL Labs test says that my
        certificate chain is
        >> incomplete. But I have the Comodo certificate for the
        website in the
        >> server's keystore, and I have all three intermediate
        certificates in the
        >> truststore.
        >>
        >> Any ideas?
        >>
        >> Thanks.
        >>
        >>
        >>
        >>
        >> --
        >> Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
        >> Facebook.com/LobosStudios | @LobosStudios
        >> Web Development - Mobile Development - Helpdesk/Tech
        Support - Computer
        >> Sales & Service
        >> Acer Authorized Reseller - Computers, Windows and Android
        Tablets,
        >> Accessories
        >>
        >> Steve Sobol - CEO, Senior Developer and Server Jockey
        >> [email protected] <mailto:[email protected]>
        >>
        >> _______________________________________________
        >> jetty-users mailing list
        >> [email protected] <mailto:[email protected]>
        >> To change your delivery options, retrieve your password,
        or unsubscribe
        >> from this list, visit
        >> https://dev.eclipse.org/mailman/listinfo/jetty-users
        >
        >
        >
        >
        > _______________________________________________
        > jetty-users mailing list
        > [email protected] <mailto:[email protected]>
        > To change your delivery options, retrieve your password,
        or unsubscribe from
        > this list, visit
        > https://dev.eclipse.org/mailman/listinfo/jetty-users
        >
        >
        > --
        > Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
        > Facebook.com/LobosStudios | @LobosStudios
        > Web Development - Mobile Development - Helpdesk/Tech
        Support - Computer
        > Sales & Service
        > Acer Authorized Reseller - Computers, Windows and Android
        Tablets,
        > Accessories
        >
        > Steve Sobol - CEO, Senior Developer and Server Jockey
        > [email protected] <mailto:[email protected]>
        >
        >
        > --
        > Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com |
        > Facebook.com/LobosStudios | @LobosStudios
        > Web Development - Mobile Development - Helpdesk/Tech
        Support - Computer
        > Sales & Service
        > Acer Authorized Reseller - Computers, Windows and Android
        Tablets,
        > Accessories
        >
        > Steve Sobol - CEO, Senior Developer and Server Jockey
        > [email protected] <mailto:[email protected]>
        >
        >
        > _______________________________________________
        > jetty-users mailing list
        > [email protected] <mailto:[email protected]>
        > To change your delivery options, retrieve your password,
        or unsubscribe from
        > this list, visit
        > https://dev.eclipse.org/mailman/listinfo/jetty-users



        --
        Greg Wilkins <[email protected] <mailto:[email protected]>>
        CTO http://webtide.com
        _______________________________________________
        jetty-users mailing list
        [email protected] <mailto:[email protected]>
        To change your delivery options, retrieve your password, or
        unsubscribe from this list, visit
        https://dev.eclipse.org/mailman/listinfo/jetty-users




    _______________________________________________
    jetty-users mailing list
    [email protected] <mailto:[email protected]>
    To change your delivery options, retrieve your password, or unsubscribe 
from this list, visit
    https://dev.eclipse.org/mailman/listinfo/jetty-users

-- Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com | Facebook.com/LobosStudios | @LobosStudios
    Web Development - Mobile Development - Helpdesk/Tech Support - Computer Sales 
& Service
    Acer Authorized Reseller - Computers, Windows and Android Tablets, 
Accessories

    Steve Sobol - CEO, Senior Developer and Server Jockey
    [email protected] <mailto:[email protected]>


    _______________________________________________
    jetty-users mailing list
    [email protected] <mailto:[email protected]>
    To change your delivery options, retrieve your password, or
    unsubscribe from this list, visit
    https://dev.eclipse.org/mailman/listinfo/jetty-users




_______________________________________________
jetty-users mailing list
[email protected]
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

--
Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com | 
Facebook.com/LobosStudios | @LobosStudios
Web Development - Mobile Development - Helpdesk/Tech Support - Computer Sales & 
Service
Acer Authorized Reseller - Computers, Windows and Android Tablets, Accessories

Steve Sobol - CEO, Senior Developer and Server Jockey
[email protected]

--
Lobos Studios | Phone: 877.919.4WEB | LobosStudios.com | 
Facebook.com/LobosStudios | @LobosStudios
Web Development - Mobile Development - Helpdesk/Tech Support - Computer Sales & 
Service
Acer Authorized Reseller - Computers, Windows and Android Tablets, Accessories

Steve Sobol - CEO, Senior Developer and Server Jockey
[email protected]

_______________________________________________
jetty-users mailing list
[email protected]
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Reply via email to