Client sends the "Client Hello" msg with those ciphers included in the cipher suite.
Cipher Suite: TLS_RSA_WITH_AES_128_CBC_SHA (0x002f) Cipher Suite: TLS_RSA_WITH_AES_256_CBC_SHA (0x0035) Cipher Suite: TLS_RSA_WITH_RC4_128_SHA (0x0005) Cipher Suite: TLS_RSA_WITH_3DES_EDE_CBC_SHA (0x000a) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) Cipher Suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009) Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) Cipher Suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA (0x0032) Cipher Suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA (0x0038) Cipher Suite: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA (0x0013) Cipher Suite: TLS_RSA_WITH_RC4_128_MD5 (0x0004)
In the server.xml none of these ciphers appear. Here is the catalina entry:
Connector port="4443" SSLEnabled="true" acceptCount="20000" maxThreads="5000" allowTrace="false" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" keystoreFile="/usr/local/tomcat6/conf/Default-Cert.p12" keystoreType="PKCS12" keystorePass="uuuuuu" ciphers="..."
and the ciphers are
SSL_RSA_WITH_AES_128_CBC_SHA, SSL_RSA_WITH_AES_256_CBC_SHA, SSL_DHE_RSA_WITH_AES_128_CBC_SHA, SSL_DHE_RSA_WITH_AES_256_CBC_SHA, SSL_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
Server sends “Server Hello” selecting “TLS_RSA_WITH_AES_128_CBC_SHA 0x002f)” and after ~1,5 milliseconds Server sends a fatal alert (Handshake Failure (40)).
Can we explain the handshake failure? Is this due to the fact that TLS_RSA_WITH_AES_128_CBC_SHA is not included in the client cipher list?
TLS_EMPTY_RENEGOTIATION_INFO_SCSV
. The client is down level, and it should be upgraded for secure renegotiation. To test the server configuration, tryopenssl s_client -tls1 -connect <server>:<port> -servername <server>
.-tls1
and-servername
ensure SNI is used. – jwwTLS_RSA_WITH_RC4_128_MD5
is probably not a good choice. RC4 is still broken for use in SSL/TLS (unlike the padding oracles in block ciphers, which could be fixed). If you need a couple of SSLv3 cipher suites, trySSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
andSSL_RSA_WITH_3DES_EDE_CBC_SHA
.3DES_EDE
is 3-key Triple-DES, and it provides 112-bits of security. – jwwTLS_RSA_WITH_AES_128_CBC_SHA
is not included in the client cipher list" - it looks like it is included. – jwwSSL_RSA_WITH_AES_128_CBC_SHA
..." - you can test the server for this suite with$ openssl s_client -ssl3 -connect <server>:<port> -cipher "AES128-SHA"
and$ openssl s_client -tls1 -connect <server>:<port> -cipher "AES128-SHA"
– jww