I apologize for the poor grammar in my last response and extra email. The
site I have setup is internal only. I will not be able to test the site
using SSL Labs.

On Fri, Dec 22, 2017 at 9:37 AM, Thomas Delaney <tdelaney....@gmail.com>
wrote:

> The site is internal so I won't not be able to check via ssllabs
>
> On Thu, Dec 21, 2017 at 5:36 PM, George S. <geor...@mhsoftware.com> wrote:
>
>> On 12/21/2017 3:24 PM, Thomas Delaney wrote:
>>
>>> Thank you for the input so far!
>>>
>>> I have used both java versions jdk 1.7.0_79 and jdk1.8.0_152 and still
>>> receive the same result
>>>
>>> when running the openssl s_client command I recieved this as the Cipher
>>> and
>>> SSL version
>>> Protocol  : TLSv1.2
>>> Cipher    : DHE-RSA-AES256-GCM-SHA384
>>>
>>> I also get a message saying  "verify error:num=20:unable to get local
>>> issuer certificate"
>>> "Verify return code: 20 (unable to get local issuer certificate)"
>>>
>>
>> I second Chris Schultz's recommendation that you run the site through the
>> SSL Labs testing site and see what it points out. It's going to check a lot
>> more things right off the bat and display them in an easier format:
>>
>> https://www.ssllabs.com/ssltest/
>>
>>
>>
>>
>>
>>> On Thu, Dec 21, 2017 at 2:31 PM, Christopher Schultz <
>>> ch...@christopherschultz.net> wrote:
>>>
>>> -----BEGIN PGP SIGNED MESSAGE-----
>>>> Hash: SHA256
>>>>
>>>> Peter,
>>>>
>>>> On 12/21/17 2:38 AM, l...@kreuser.name wrote:
>>>>
>>>>> Hi Thomas,
>>>>>
>>>>> Am 21.12.2017 um 00:56 schrieb Thomas Delaney
>>>>>> <tdelaney....@gmail.com>:
>>>>>>
>>>>>> Greetings,
>>>>>>
>>>>>> I am having trouble regarding google chrome's behavior to Apache
>>>>>> Tomcat's SSL setup. I have been successful getting an ssl website
>>>>>> to work with Apache HTTP web server, but not Apache Tomcat 8.5.24
>>>>>> on google chrome. Mozilla Firefox brings me to my site with no
>>>>>> problem.
>>>>>>
>>>>>> When going to https://mydomain.com:8443 I recieve a message from
>>>>>> Google Chrome.
>>>>>>
>>>>>> Google Chrome Error - This site can’t provide a secure
>>>>>> connection mydomain.com uses an unsupported protocol.
>>>>>> ERR_SSL_VERSION_OR_CIPHER_MISMATCH
>>>>>>
>>>>>> Unsupported protocol The client and server don't support a common
>>>>>> SSL protocol version or cipher suite.
>>>>>>
>>>>>> When checking Google Chrome's Browser console in the security tab
>>>>>> I recieve: Page is not secure Valid certificate secure resources
>>>>>>
>>>>>> Here is the following background info I have for the
>>>>>> configuration I gave Apache Tomcat when setting up the 8443
>>>>>> connector
>>>>>>
>>>>>> Chrome Version 63.0.3239.108 (Official Build) (64-bit)
>>>>>>
>>>>>> Linux OS: SUSE Enterprise 12 sp1
>>>>>>
>>>>>> Packages installed:
>>>>>>
>>>>>> - OpenSSL 1.0.2n  7 Dec 2017 - jdk version 1.7.0_79
>>>>>>
>>>>> That may be the culprit.
>>>>>
>>>>> Apparently this (old) version of Java7 will not provide in the
>>>>> default modern ciphers that Chrome requires. And the config is
>>>>> using the JSSE SSL implementation. But as you have TC Native and
>>>>> openssl 1.0.2 you should switch to openssl.
>>>>>
>>>> This probably isn't the problem since Thomas is using the APR
>>>> connector. TLS cipher suite support (or lack thereof) from Java 1.7 is
>>>> not relevant.
>>>>
>>>> - tomcat version -> apache-tomcat-8.5.24 - apr-1.6.3 -
>>>>>> tomcat-native-1.2.16-src
>>>>>>
>>>>>> Server.xml apr connector (Certificates are signed from GoDaddy
>>>>>> and are placed in the conf directory of Apache Tomcat):
>>>>>>
>>>>>> <Connector port="8443"
>>>>>> protocol="org.apache.coyote.http11.Http11AprProtocol"
>>>>>> maxThreads="150" SSLEnabled="true" defaultSSLHostConfigName="
>>>>>> mydomain.com" > <SSLHostConfig hostName="mydomain.com"
>>>>>> protocols="TLSv1,TLSv1.1,TLSv1.2"> <Certificate
>>>>>> certificateKeyFile="conf/server.key"
>>>>>> certificateFile="conf/server.crt"
>>>>>> certificateChainFile="conf/CA_server_bundle.crt" type="RSA" />
>>>>>> </SSLHostConfig> </Connector>
>>>>>>
>>>>> This looks okay to me. If you start Tomcat and then use "openssl
>>>> s_client -connect <hostname>:<port>", does openssl connect? It should
>>>> report the protocol and cipher suite being used to connect.
>>>>
>>>> If you server is externally-accessible, consider using an external TLS
>>>> capabilities scanner such as that from Qualys,
>>>> https://www.ssllabs.com/ssltest/
>>>>
>>>> - -chris
>>>> -----BEGIN PGP SIGNATURE-----
>>>> Comment: GPGTools - http://gpgtools.org
>>>> Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
>>>>
>>>> iQJRBAEBCAA7FiEEMmKgYcQvxMe7tcJcHPApP6U8pFgFAlo8C/0dHGNocmlzQGNo
>>>> cmlzdG9waGVyc2NodWx0ei5uZXQACgkQHPApP6U8pFiayA//Ugc6nwLR2yddEvDc
>>>> eqwBYhDib1AZlx2m2iju1tBngWu8Wr/x+MsHTZq+tTzKqPXrvXeTqd3AiBVZhBFf
>>>> 8mwGZdf7dmcXZeCYgAVk+p7QxWpPt0hM27KJPeSXNCclrkG3REAPf5XkQBJx6Spr
>>>> W7/JbejXooYl27D6+iHg+SsaMNnMuq1nPm0kCP1UyEN40bHzWqHfZbtgfi+wrKB+
>>>> ldJ/fRzMdUO+FMWosuCteHL5CoDotTUSuztWtjGA/raXgX2UJg1LvKxmhYU8mcA1
>>>> noMdpbQX6wYP/XtcKvIplHUJj8UUgZbe5bndDLw7HV2Im3wdN/659GpdAbEBN9EY
>>>> O1gQRLVIyvO0XuY7RpDP7RNjbw8Sp7H1Y2Ptou3yJ3dezRQz9vi9M8i78OeEEfMp
>>>> 5ZfxaN+bZoT0WteHpbR243DcFzO+HbShPEiSL0zKlltR2qzWBMXd+9XjjkIU8JeF
>>>> mfqxdN6HBS5YXOT0IJcd6+uw3FTh2vPEf64K5r4hpIsWxvpmbkYqNIf4GQGuqS7c
>>>> nm6gsOP6Wd/PiL67mVClJ6cN9LEPEqxs2QivK2/zzBcmYunXQK0GAbi25C5tG9Ha
>>>> 4zB5VuRo0IjPmEKnRuqfZ2KcOVCQaJFbWgV0dJ9UWb7vO5662hYvSssX7jS6or5e
>>>> /aq7VBV+GiEaWzZweAi8/k4R3wk=
>>>> =DEHk
>>>> -----END PGP SIGNATURE-----
>>>>
>>>> ---------------------------------------------------------------------
>>>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>>>> For additional commands, e-mail: users-h...@tomcat.apache.org
>>>>
>>>>
>>>>
>> --
>> George S.
>> *MH Software, Inc.*
>>
>> Voice: 303 438 9585
>> http://www.mhsoftware.com
>>
>
>

Reply via email to