Christopher, > On 8/30/16 10:18 AM, Kreuser, Peter wrote: > > On 30/08/2016 10:23, Kreuser, Peter wrote: > > Hi all, > > I have compiled tcnative 1.2.8 with the new openssl 1.1.0 (ldd > proves that it is linked). I have set the cipher string to the > newly supported ciphers: > > ciphers="ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:EC > DHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128- > > GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE > - -RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA- > > AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RS > A-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:E > > CDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA > - -AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-EC > > DSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-G > CM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-S > > HA:AES256-SHA:DES-CBC3-SHA:!DSS" > > > However I cannot connect with eg. ECDHE-ECDSA-CHACHA20-POLY1305. > testssl.sh shows only the old ciphers from the plain openssl > 1.0.2. > > Tomcat Version 8.5.4 Java 1.8.0_102 > > Anything that I'm missing? > > Without seeing the full Connector config, don't know. > > Mark > > Mark, of course I should have done that: > > <Connector port="8843" > protocol="org.apache.coyote.http11.Http11Nio2Protocol" > sslImplementationName="org.apache.tomcat.util.net.openssl.OpenSSLImple > mentation" > > server="Apache Tomcat" > > allowTrace="false" maxThreads="150" SSLEnabled="true" > defaultSSLHostConfigName="xxx.xxx.net" > <UpgradeProtocol > className="org.apache.coyote.http2.Http2Protocol" /> <SSLHostConfig > honorCipherOrder="true" insecureRenegotiation="false" > hostName="xxx.xxx.net" protocols="TLSv1.1+TLSv1.2" > certificateVerification="false" disableCompression="true" > disableSessionTickets="false" > ciphers="ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECD > > HE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES25 > 6-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-R > SA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:E > CDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE > - -ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA > - -AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-S > HA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA: > AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-S > HA:AES256-SHA:DES-CBC3-SHA:!DSS"> > > > <Certificate certificateKeyFile="${catalina.base}/conf/ssl/xxx.key" > > certificateFile="${catalina.base}/conf/ssl/xxx.pem" type="RSA" /> > </SSLHostConfig> </Connector> > > > What client are you using? Hopefully openssl s_client with 1.1.0 or > later. You might want to double-check the client is capable. > > - -chris>
testssl.sh is running with an openssl 1.0.2 compiled with CHACHA20-support. I tried to manually access the website with this version and ECDHE-ECDSA-CHACHA20-POLY1305 without success. Peter --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org