Ezsra,

On 6/15/21 17:43, Ezsra McDonald wrote:
Sorry for the delay.

I was finally able to track down the location of the BouncyCastle library.
It is located in the individual application libraries and cannot be
disabled. There are newer versions of BC available and I have asked the
software developers to consider upgrading the applications.

Disabling RSASSA-PSS alone did not work. I had to also disable TLSv1.3. I
tried only disabling TLSv1.3 but the instance continued to show the same
issues. So, I had to disable both.

The error occurred across all browsers. There was some earlier confusion
when I had the HTTPS connector configured incorrectly. Now the connector
works for all browsers initially until one of the apps loads the
BouncyCastle library. At that point the SSL handshake begins to fail for
any browser. Disabling the RSASSA-PSS and TLSv1.3 protocols and ciphers is
a temporary work around. It is my hope that upgrading the BC jar will
resolve the conflicts.

I am open to any other suggestions but for now my instances have stabilized
and I am in a holding pattern waiting for the software developers to
upgrade BC in the individual applications.

Thanks to everyone who assisted me with this issue. I will keep you posted
on results of the BC upgrade.

Sounds good.

I don't see any place in Tomcat to specify the JSSE provider. Perhaps we should expose that to the administrator in some way.

-chris

On Thu, May 27, 2021 at 11:23 AM Mysore, Raghunath <rmys...@visa.com.invalid>
wrote:

Hi Ezsra,
                  I concur with suggestions from  Chris Schultz.
Would you clarify the following items ?
The current focus is to understand the prevailing environment
configuration, in context of the stack trace you shared earlier.

(1) To go back,  did you check  for ".jar"  files with names like "bouncy"
?
The point here is - to understand where BC is configured (to assess if it
can be commented)
(2) Apart from considering to turnoff BC,  have you tried disabling
RSASSA-PSS algorithm ?
(3) When you test using a Safari browser - is the application on a happy
path (meaning SSL works all fine) ?
And you have the issue only when testing from a  Chrome browser ?

Thanks,
  -Raghu

-----Original Message-----
From: Ezsra McDonald <ezsra.mcdon...@gmail.com>
Sent: Thursday, May 27, 2021 8:56 AM
To: Tomcat Users List <users@tomcat.apache.org>
Subject: Re: Tomcat SSL stops working after an undetermined amount of time

Thanks for the responses,

So, I need to understand a little more about Bouncycastle. I inherited the
tomcat environment so I do not know how or why BC came to be installed in
the containers. I will do some research on BC so I understand it better. My
assumption from the responses is that BC is not a standard part of Tomcat
or Java install.

If the BC is part of an application running in the container and comes
from a war file, can it be causing this issue? Or is BC most likely loaded
when the container starts?

--Ez

On Thu, May 27, 2021 at 8:37 AM Christopher Schultz <
ch...@christopherschultz.net> wrote:

Raghunath,

On 5/26/21 19:08, Mysore, Raghunath wrote:
To track if BC is configured in your environment, you may want to
assess if BC is listed as a "security.provider"  in the following
"java.security" file



File :  ..../jre/lib/security/java.security

Check for record (example below) :

security.provider.10=org.bouncycastle.jce.provider.BouncyCastleProvi
der




Note the Number 10, above may be something different in your
environment's "java.security" file (presuming BC is configured here)

Well, the error being encountered is definite within BC, so I'd
venture a guess that BC is indeed being used.

-chris

-----Original Message----- From: Christopher Schultz
<ch...@christopherschultz.net> Sent: Wednesday, May 26, 2021 4:35 PM
To: users@tomcat.apache.org Subject: Re: Tomcat SSL stops working
after an undetermined amount of time



Ezsra,



On 5/26/21 18:11, Ezsra McDonald wrote:

Well, I still have issues. I think it is the same thing hit by
these guys:

https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fj
ira


.atlassian.com
%2Fbrowse%2FBAM-21157&amp;data=04%7C01%7Crmysore%40visa.


com%7C0235cf7ab3c7461705ba08d9209694da%7C38305e12e15d4ee888b9c4db1c
477


d76%7C0%7C0%7C637576653404214193%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC
4wL


jAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sd
ata


=QnzOhDNvEy%2FVBRmUz0B2F0iqOlH9gpBUJBwqNzHwz%2F4%3D&amp;reserved=0

https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fs
tac


koverflow.com%2Fquestions%2F65691480%2Fnullpointerexception-at-org-
bou


ncycastle-crypto-signers-psssigner-generatesignat&amp;data=04%7C01%
7Cr


mysore%40visa.com%7C0235cf7ab3c7461705ba08d9209694da%7C38305e12e15d
4ee


888b9c4db1c477d76%7C0%7C0%7C637576653404214193%7CUnknown%7CTWFpbGZs
b3d


8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D
%7C


1000&amp;sdata=PtS%2BltOexMX3CmAFTFc11Gt%2B57LoHvUgPu2k0nxJQ2M%3D&a
mp;

  reserved=0



I'll try their fix. My main concern is that I do not want to
disable

TLSv1.3.



If you don't want to disable TLSv1.3, then you want:



<Connector ....

protocols="TLSv1.2,TLSv1.3"

/>



If BC is failing you, I'd want to find out if you really need BC.



That first link above seems to suggest that when using Tomcat you
MUST disable TLSv1.3. That seems odd. What version of BC are you
using?

Search for .jar files with names like "bouncy".



Do you have the option to downgrade Java?



Have you tried disabling the RSASSA-PSS algorithm as per their
instructions? It seems ... far-fetched that would fix the problem,
but ... okay.



Note that at some time in the past, Java 1.8 did not support TLSv1.3
and lots of people who were stuck on Java 1.8 decided to switch to
BC which did have TLSv1.3 support. With that version of Java 1.8
(_281), you should have native JDK support for TLSv1.3. Perhaps BC
is not necessary at all.



-chris



On Tue, May 25, 2021 at 11:09 AM Ezsra McDonald

<ezsra.mcdon...@gmail.com<mailto:ezsra.mcdon...@gmail.com>>

wrote:



Lots of good information was provided.



This afternoon I plan to test the "sslProtocol"  to "protocols"

change in our lower environments. I will reply back with any
findings.



Thank you everyone for your responses.



regards,



-- Ez



On Tue, May 25, 2021 at 10:48 AM Mysore, Raghunath

<rmys...@visa.com.invalid<mailto:rmys...@visa.com.invalid>>
wrote:



Hi Chris,



-----Original Message-----

From: Christopher Schultz
<ch...@christopherschultz.net<mailto:ch...@christopherschultz.net


  Sent: Tuesday, May 25, 2021 9:10 AM

To: users@tomcat.apache.org<mailto:users@tomcat.apache.org>

Subject: Re: Tomcat SSL stops working after an undetermined
amount

of time



Ronald,



On 5/25/21 09:31, Roskens, Ronald wrote:



-----Original Message-----

From: Christopher Schultz
<ch...@christopherschultz.net<mailto:chris@christopherschultz.n
et>>

  Sent: Monday, May 24, 2021 1:56 PM

To:
users@tomcat.apache.org<mailto:users@tomcat.apache.org>

Subject: [EXTERNAL] Re: Tomcat SSL stops working after an

undetermined amount of time



CAUTION: This email originated from outside of the
organization.

DO NOT CLICK on links or open attachments unless you recognize
the

sender and know the content is safe.



Ezsra,



On 5/24/21 10:30, Ezsra McDonald wrote:

I am enabling SSL debugging this morning. I did catch this in
the

log for an instance that started erroring out this morning.
Seems

like it may be too generic to help solve my problem. Here it
is:



24-May-2021 09:25:44.609 SEVERE [catalina-exec-51]

org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun

  java.lang.NullPointerException

at

org.bouncycastle.crypto.signers.PSSSigner.generateSignature(Un
kno

  wn

Source)

at
org.bouncycastle.jce.provider.JDKPSSSigner.engineSign(Unknown

  Source)



Oh. You are using BouncyCastle. I've never tried to do that.
I'm

not sure how well BC will work with Tomcat. We don't officially

support that configuration, but that doesn't mean we won't try
to help.



This isn't a Tomcat issue but an interoperability issue between

BouncyCastle & OpenJDK.



*

https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%
2Fg

  ith

ub.com%2Fbcgit%2Fbc-java%2Fissues%2F633&amp;data=04%7C01%7Crmyso
re%

  40v

isa.com%7C29de4f3283544be589d508d91f8f4728%7C38305e12e15d4ee888b
9c4

  db1

c477d76%7C0%7C0%7C637575522499773346%7CUnknown%7CTWFpbGZsb3d8eyJ
WIj

  oiM

C4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000
&am

  p;s

data=VvFC5V57Cy3iWAqlqBwuXjbQOSpMN2EK9nbangoytsc%3D&amp;reserved
=0

  *

https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%
2Fb

  ugs

.openjdk.java.net%2Fbrowse%2FJDK-8216039&amp;data=04%7C01%7Crmys
ore

  %40

visa.com%7C29de4f3283544be589d508d91f8f4728%7C38305e12e15d4ee888
b9c

  4db

1c477d76%7C0%7C0%7C637575522499773346%7CUnknown%7CTWFpbGZsb3d8ey
JWI

  joi

MC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C100
0&a

  mp;

sdata=rqFmFJWSb5zJDkd52jV0PU9FP9%2FNt0k1MInH6pcfBGk%3D&amp;reser
ved

  =0



Oh, great. Looks like a BC upgrade will fix the NPE. But possibly

something downstream will still fail...



Just to add my 2 cents here :



Per the problem posed in the very first email, we see the SSL/TLS

issue between Oracle JDK 8 and Tomcat 8.5

Environment:

OS: CentOS 7

Apache: apache-tomcat-8.5.65

Java: jdk1.8.0_281



Note that the following link - talks about issues between OpenJDK
11

and BC.


https://nam10.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugs
.openjdk.java.net%2Fbrowse%2FJDK-8216039&amp;data=04%7C01%7Crmysore%40
visa.com%7Cd2f44778194f48b3ae6408d9211f942f%7C38305e12e15d4ee888b9c4db
1c477d76%7C0%7C0%7C637577242212420591%7CUnknown%7CTWFpbGZsb3d8eyJWIjoi
MC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;
sdata=tiSMVu4GwqWFR%2F%2FE9PuidwM69irnSVtC5RP3qQA4YCI%3D&amp;reserved=
0
.




This morning's suggestion (about changing from "sslProtocol"
to

"protocols" )  from Christopher Schultz, sounds  promising, in
that

the interaction between the Browser-clients and Tomcat 8.5.x
server,

will be limited only to TLS1.2 Making this change, will preclude

other old protocols - like TLS 1, TLS

11 etc  in communication between the clients and the Tomcat
server.

We will need tests after making the change to "protocols"
attribute

in the HTTPS connector block.

In context of the above mentioned change -we may not need any

editing of "java.security" file contents (discussed last
evening).



Thanks,

-Raghu





-----------------------------------------------------------------
---

  - To unsubscribe, e-mail:
users-unsubscr...@tomcat.apache.org<mailto:
users-unsubscr...@tomcat.apache.org>

  For additional commands, e-mail:
users-h...@tomcat.apache.org<mailto:users-h...@tomcat.apache.org>










--------------------------------------------------------------------
-

  To unsubscribe, e-mail:
users-unsubscr...@tomcat.apache.org<mailto:
users-unsubscr...@tomcat.apache.org>

  For additional commands, e-mail:
users-h...@tomcat.apache.org<mailto:users-h...@tomcat.apache.org>




---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org



---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org




---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to