Am Sat, 23 May 2015 17:18:07 +0200 schrieb Bernd Eckenfels <e...@zusammenkunft.net>: > I searched the ClientHandshaker for usages of algorithmConstraints, > and it does not use it for the DHE part. It only question > KEY_AGREEMENT for cipher suite selection. (But I am not so famiiar > with the code, maybe you can point me to a place where the DHE size > would be validated).
I also run some connection test, it asks for the following permissions on the user set AC of SSLParameters: prim [KEY_AGREEMENT] TLSv1 with null prim [KEY_AGREEMENT] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA with null prim [KEY_AGREEMENT] TLSv1.1 with null prim [KEY_AGREEMENT] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA with null prim [KEY_AGREEMENT] TLSv1.2 with null prim [KEY_AGREEMENT] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_RSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 with null prim [KEY_AGREEMENT] TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 with null ... prim [KEY_AGREEMENT] SSL_RSA_WITH_RC4_128_MD5 with null prim [KEY_AGREEMENT] TLS_EMPTY_RENEGOTIATION_INFO_SCSV with null prim [SIGNATURE] SHA512withECDSA with null prim [SIGNATURE] SHA512withRSA with null ... prim [SIGNATURE] MD5withRSA with null prim [SIGNATURE] SHA384withRSA with null prim [SIGNATURE] Sun RSA public key, 4096 bits, modulus: 59... prim [SIGNATURE] SHA384withRSA with null prim [SIGNATURE] Sun RSA public key, 2048 bits prim [SIGNATURE] SHA384withRSA on Sun RSA public key prim [SIGNATURE] SHA256withRSA with prim [SIGNATURE] SHA256withRSA on Sun RSA Cipher used TLSv1.2 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 I do see some code which might be responsible for checking DHE restrictions, but I cant get it to work. Neither with above user algortihm constraints nor with the following disables line: jdk.tls.disabledAlgorithms=MD5, RC4, SSLv3, DSA, RSA keySize < 2048, DHE keySize < 1024, DiffieHellman keySize < 1024, DH keySize < 1024 So my guess, it cannot be controled currently. Gruss Bernd