limbonicat commented on issue #13734:
URL: https://github.com/apache/pulsar/issues/13734#issuecomment-1019767256


   > Certificates signed with SHA-1 are not trusted in TLSv1.3 at all. It is 
common that many clients reject certificates signed with SHA-1 also for older 
TLS protocol versions.
   > 
   > @limbonicat Can you check what certification signing algorithm do you 
have? Is the certificate valid and trusted by the client?
   > 
   > /cc @nodece @codelipenghui
   
   @lhotari thanks for reply
   1. I think my issue is not quite same as "line/armeria#2403"(his problem is 
more complicated),  the exception  
**OPENSSL_internal:SSLV3_ALERT_CERTIFICATE_UNKNOWN** whick means client certs 
auth failure or something related to  TLSv1.3 (not been supported ),   and this 
problem is not my conern; 
      On the other hand ,my problem is "**OPENSSL_internal:NO_SHARED_CIPHER**"  
which means client and server dont agree with cipher in handshake procedure if 
im correct
   
   > Hi! It means there are no common cipher suites between the client and the 
server, which usually means one of them has an old or misconfigured SSL/TLS 
setup. HTTP/2 requires both clients and servers support a minimum set of cipher 
suites. Please make sure to enable those cipher suites.
   
   2. If it's certs problem, why using same client on WIN10 done pretty well 
with no exceptions?
      By the way ,my self-signed certs is created by following Pulsar DOCs : 
[create-tls-certificates](https://pulsar.apache.org/docs/en/security-tls-transport/#create-tls-certificates)
   3. After @nodece fix(change TLS provider to JDK), the exception is gone and 
i think that means the different TLS providers(Conscrypto and JDK)  which 
support different ciphers makes difference; and i grab traffic data shows 
clearly in server hello: 
   
   -   client and server finally agree with cipher "Cipher Suite: 
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027)"
   
![image](https://user-images.githubusercontent.com/43157664/150730118-ffea8664-a0da-480f-95a5-fc787fc22b5f.png)
     by the way **"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 " is supported by JDK 
but not supported by Conscrypto**
    according to Conscrypto capabilities( and Conscrypto support 
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA" why? i think CBC_SHA256 is more secure 
than SHA-1)
   
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


Reply via email to