Hi,
I have raised a bug with Sun support...

In the meanwhile, I hope even the NSS bug is resolved.. I can probably use
Tomcat as the web server instead of Apache (because JSSE works just fine)

Thanks for all the support guys :) I'll update this thread as soon as I hear
of anything...

On Tue, Aug 25, 2009 at 8:34 PM, <Gary.Morton at sun.com> wrote:

> Yes that looks like a firmware bug - the firmware is crashing on the
> request.  File a bug and please add as much detail as possible as far as how
> to create the problem.
>
> -gary
>
> On 08/25/09 06:50, Sandeep Cavale wrote:
>
>> The same problem still exists with mod_nss though :(
>>
>> Seems to be very much the same bug as:
>> https://bugzilla.mozilla.org/show_bug.cgi?id=434043
>>
>> <https://bugzilla.mozilla.org/show_bug.cgi?id=434043>The nss logs say
>> that it can find the certificate first time, but subsequently they fail to
>> find it... The /var/adm/messages seem to indicate the problem lies in the
>> keystore:
>>
>> Aug 25 15:21:09 crypto genunix: [ID 936769 kern.info <http://kern.info>]
>> pool0 is /pseudo/pool at 0
>> Aug 25 15:21:09 crypto ipf: [ID 774698 kern.info <http://kern.info>] IP
>> Filter: v4.1.9, running.
>> Aug 25 16:05:16 crypto genunix: [ID 246487 kern.notice] mca0: Halting
>> processor => Fatal error reported
>> Aug 25 16:05:16 crypto genunix: [ID 246487 kern.warning] WARNING: mca0:
>> Data Abort / TUE AUG 25 10:35:14 2009
>> Aug 25 16:05:16 crypto  exception raised in mca*OM*Cmd task
>>  ----------------------------> OM h/w slot is for key management
>> Aug 25 16:05:17 crypto genunix: [ID 246487 kern.warning] WARNING: mca0:
>> Fault interrupt received, halting device
>>
>> mca/0 dissapears from "cryptoadm list -v" and I have to resort to
>> rebooting the machine.. This problem is only with mod_nss on firmware
>> 1.1.2..
>>
>>
>> On Tue, Aug 25, 2009 at 10:45 AM, Sandeep Cavale <sandeepcavale at 
>> gmail.com<mailto:
>> sandeepcavale at gmail.com>> wrote:
>>
>>    Oh blimey!! Thanks Gary :)
>>
>>    Now the card displays firmware version as 1.1.2...
>>
>>    And one more thing.. I went back and tried configuring from the
>>    scratch, and I found that the issue is with openssl (6731839
>>    & 6725903 and a few others) So I added the Solaris patches with
>>    corrections for those bugs and Apache now works with mod_ssl!!
>>    RSA and AES are now offloaded to the card..
>>
>>    I still have some problems with mod_nss though and I imagine I may
>>    have to recompile nss again (mod_nss is derived from mod_ssl and
>>    hence I think it probably makes use of Openssl as well, right?). I
>>    shall try this and see if it works..
>>
>>
>>    On Mon, Aug 24, 2009 at 8:51 PM, <Gary.Morton at sun.com
>>    <mailto:Gary.Morton at sun.com>> wrote:
>>
>>        On 08/23/09 22:31, Sandeep Cavale wrote:
>>
>>
>>            Yes.. I did upgrade to firmware 1.1 update 2... And I also
>>            installed all the patches that came with that update.
>>
>>            This is what I get with "scadiag"
>>
>>            # scadiag -V mca0
>>            scadiag (Sun Crypto Accelerator 6000) 1.1
>>            Copyright 2006 Sun Microsystems, Inc.
>>            All rights reserved.
>>            Use is subject to license terms.
>>
>>            The board status as shown in scamgr show status is:
>>            Board Status
>>
>>  ----------------------------------------------------------------
>>            Device Info:
>>            * Hardware Version: 1.4.50
>>            * Bootrom Version : 1.0.4
>>            * Firmware Version: 1.1.0
>>
>>
>>
>>        You did not install the fw patch (the version would be 1.1.2).
>>         In the tar there's a directory
>>
>>        /Sun_Crypto_Acc_6000-1_1-u2-Solaris/Solaris/firmware/Patches
>>        sr1-ubrm-31> ls
>>        128364-02  128371-02
>>
>>        You need to install 128371-02 via patchadd.  After install you
>>        must install the firmware on to the card - the patchadd just
>>        places the files on the files system and not the card.
>>
>>        you can use scamgr to do the upgrade.
>>
>>         > load firmware /usr/lib/crypto/firmware/sca/sca6000fw
>>
>>        you must then reset the card.
>>
>>        -gary
>>
>>
>>
>>
>>
>>            I have also attached the /var/adm/messages
>>
>>            Again, we seem to have no problems running Tomcat web server
>>            (configured to use the  card via JSSE). We can see that
>>            aesbytes, aesjobs, casubmit, cbsubmit, dhderive, dhkeygen,
>>            rsaprivate, sha1bytes, sha1hmacbytes, sha1hmacjobs, sha1jobs
>>            are the counters that increase in kstat indicating that all
>>            these operations are being done on the card...
>>
>>            Only Apache(with mod_ssl or mod_nss) cannot access the
>>            hashing algorithms :(
>>            We would like the Apache web server to be able to make full
>>            use of the card just like Tomcat..
>>
>>            Kindly let us know if there is anything wrong with the
>>            configuration or if something is not properly initialised..
>>
>>
>>            On Fri, Aug 21, 2009 at 9:03 PM, <Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com> <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>>> wrote:
>>
>>               On 08/21/09 07:15, Sandeep Cavale wrote:
>>
>>                   Hi,
>>
>>                   I upgraded the firmware to 1.1..
>>
>>
>>               You pulled down 1.1 update 2, correct?  Did you install
>>            all of the
>>               patches  included in that download as well?  Can you send
>>            me the
>>               output from scadiag -v mca0
>>
>>
>>
>>                   The cryptoadm lists the HMAC algs:
>>                   mca/0:
>>
>> CKM_SHA_1,CKM_SHA512,CKM_DES_CBC,CKM_DES3_CBC,CKM_AES_CBC,CKM_AES_CTR,CKM_DES_CBC_PAD,CKM_DES3_CBC_PAD,CKM_AES_CBC_PAD,CKM_SHA_1_HMAC,CKM_SHA512_HMAC,CKM_SHA_1_HMAC_GENERAL,CKM_SHA512_HMAC_GENERAL,CKM_RSA_X_509,CKM_RSA_PKCS,CKM_DSA,CKM_DH_PKCS_KEY_PAIR_GEN,CKM_DH_PKCS_DERIVE,CKM_ECDSA_KEY_PAIR_GEN,CKM_ECDH1_DERIVE,CKM_ECDSA,CKM_RSA_PKCS_KEY_PAIR_GEN,CKM_DSA_KEY_PAIR_GEN,CKM_DES_KEY_GEN,CKM_DES2_KEY_GEN,CKM_DES3_KEY_GEN,CKM_AES_KEY_GEN,CKM_DES_CBC_PAD,CKM_DES3_CBC_PAD,CKM_AES_CBC_PAD,CKM_DES_CBC,CKM_DES3_CBC,CKM_AES_CBC,CKM_AES_CTR,CKM_RSA_X_509,CKM_RSA_PKCS,0x80004653
>>
>>
>>                   But now we seem to have stranger problems :(
>>
>>                   I tried 2 things with Apache
>>
>>                   i) When I used mod_nss, something funny seems to be
>>            happening
>>                   with the card. Here's what the nss logs say:
>>
>>                   [Fri Aug 21 17:17:19 2009] [info] Configuring server
>>            for SSL
>>                   protocol
>>                   [Fri Aug 21 17:17:19 2009] [info] In FIPS mode,
>>            enabling TLSv1
>>                   [Fri Aug 21 17:17:19 2009] [debug]
>>            nss_engine_init.c(765): FIPS
>>                   mode enabled, permitted SSL ciphers are:
>>
>> [+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]
>>                   [Fri Aug 21 17:17:19 2009] [debug]
>>            nss_engine_init.c(770):
>>                   Configuring permitted SSL ciphers
>>
>> [+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]
>>                   [Fri Aug 21 17:17:19 2009] [info] Using nickname
>>            ksfips:certfips.
>>                   [Fri Aug 21 17:17:19 2009] [error] Certificate not
>>            verified:
>>                   'ksfips:certfips'
>>
>> ------------------------------------------------------------------------->
>>                   Note certificate is found but not verified
>>                   [Fri Aug 21 17:17:19 2009] [error] SSL Library Error:
>>            -8156
>>                   Issuer certificate is invalid
>>                   [Fri Aug 21 17:17:23 2009] [info] Configuring server
>>            for SSL
>>                   protocol
>>                   [Fri Aug 21 17:17:23 2009] [info] In FIPS mode,
>>            enabling TLSv1
>>                   [Fri Aug 21 17:17:23 2009] [debug]
>>            nss_engine_init.c(765): FIPS
>>                   mode enabled, permitted SSL ciphers are:
>>
>> [+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]
>>                   [Fri Aug 21 17:17:23 2009] [debug]
>>            nss_engine_init.c(770):
>>                   Configuring permitted SSL ciphers
>>
>> [+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]
>>                   [Fri Aug 21 17:17:23 2009] [info] Using nickname
>>            ksfips:certfips.
>>                   [Fri Aug 21 17:17:23 2009] [error] Certificate not
>> found:
>>                   'ksfips:certfips'
>>
>>  ------------------------------------------------------------------------->
>>                   Cannot find it anymore!!
>>                   [Fri Aug 21 17:17:23 2009] [info] Configuring server
>>            for SSL
>>                   protocol
>>                   [Fri Aug 21 17:17:23 2009] [info] In FIPS mode,
>>            enabling TLSv1
>>                   [Fri Aug 21 17:17:23 2009] [debug]
>>            nss_engine_init.c(765): FIPS
>>                   mode enabled, permitted SSL ciphers are:
>>
>> [+rsa_3des_sha,+fips_3des_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]
>>                   [Fri Aug 21 17:17:23 2009] [debug]
>>            nss_engine_init.c(770):
>>                   Configuring permitted SSL ciphers
>>
>> [+rsa_3des_sha,-rsa_des_sha,-rsa_rc4_40_md5,-rsa_rc2_40_md5,-rsa_null_md5,-rsa_null_sha,+fips_3des_sha,-fips_des_sha,-fortezza,-fortezza_rc4_128_sha,-fortezza_null,-rsa_des_56_sha,-rsa_rc4_56_sha,+rsa_aes_128_sha,+rsa_aes_256_sha]
>>                   [Fri Aug 21 17:17:23 2009] [info] Using nickname
>>            ksfips:certfips.
>>                   [Fri Aug 21 17:17:23 2009] [error] Certificate not
>> found:
>>                   'ksfips:certfips'
>>                   [Fri Aug 21 17:17:23 2009] [info] Configuring server
>>            for SSL
>>                   protocol
>>
>>
>>                   If I try listing using "cryptoadm list -v", the hardware
>>                   providers which earlier listed mca/0 is now empty!!!
>>
>>
>>               That would indicate the card has unregistered/crashed.
>>             Can you send
>>               o/p from /var/adm/messages.  There are some important bug
>>            fixes in
>>               the patches in that update 2 download so lets make sure
>>            they are
>>               installed.
>>
>>               -gary
>>
>>
>>                   This seems to be similar to these bugs:
>>                   https://bugzilla.redhat.com/show_bug.cgi?id=446851 and
>>                   https://bugzilla.mozilla.org/show_bug.cgi?id=434043
>>            though I use
>>                   the latest NSS 3.12.3
>>
>>
>>                   ii) Secondly I replaced mod_nss with mod_ssl
>>
>>                   I still get the "same bad mac errror" but
>>            surprisingly if I
>>                   disable the HMAC algs (which I really do not want to
>>            do) Apache
>>                   starts working. This was pointed to me by this
>>            discussion:
>>
>> http://mail.opensolaris.org/pipermail/crypto-discuss/2007-December/000442.html
>>                              <
>> http://mail.opensolaris.org/pipermail/crypto-discuss/2007-December/000442.html
>> >
>>
>>
>>                   Only that with kstat I observe except rsaprivate, all
>>            other
>>                   operations are not offloaded to the card at all (I'd
>>            like to
>>                   have all operations especially RSA, AES offloaded to
>>            the card)
>>
>>                   I have also verified that the case is the same with
>>            firmware 1.0
>>                   for mod_ssl
>>
>>                   The above problem seems to be a bug
>>                             (
>> http://bugs.opensolaris.org/view_bug.do?bug_id=6606361) and my
>>                   Solaris machine has the patch 127128-11 which is
>>            having this
>>                   correction. I am not sure why I still have to use the
>>            workaround
>>                   mentioned inspite of having the fix
>>
>>                   I know my posts are really getting lengthy , but any
>>            guidance
>>                   will be truly appreciated :)
>>
>>
>>
>>
>>                   On Fri, Aug 21, 2009 at 1:48 AM, <Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>
>>                   <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>> <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>
>>                   <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>>>> wrote:
>>
>>
>>                      You should download the 1.1 code - the 1.0 code
>>            does not
>>                   support this.
>>
>>
>> http://www.sun.com/products/networking/downloads.html
>>
>>
>>                      -gary
>>
>>
>>                      On 08/20/09 11:22, Sandeep Cavale wrote:
>>
>>                          Thanks Gary..
>>                           The guide seems to be 1.1 but the firmware we
>>            have is 1.0..
>>                           Anyway I shall give it a try, not sure if it
>>            would work
>>                   with 1.0
>>                           Is there any other way to get the HMAC
>>            algorithms accessible
>>                          from NSS/mod_nss/cryptoadm without firmware
>>            upgrade to 1.1 ?
>>                          Because JSSE/JCE can access them with existing
>>            firmware..
>>
>>
>>                           On Thu, Aug 20, 2009 at 8:29 PM,
>>            <Gary.Morton at sun.com <mailto:Gary.Morton at sun.com>
>>                   <mailto:Gary.Morton at sun.com <mailto:Gary.Morton at 
>> sun.com
>> >>
>>                          <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com> <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>>>
>>                   <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com> <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>>
>>
>>                          <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>
>>                   <mailto:Gary.Morton at sun.com
>>            <mailto:Gary.Morton at sun.com>>>>> wrote:
>>
>>                             If you are going to use the sca 6000 for
>>            hmac you will
>>                   need to
>>                             enable some options in the mca.conf driver
>>            config file:
>>
>>                             take a look at the user's guide for details
>>            - you will
>>                   need
>>                          to add
>>                             entries for
>>
>>                             enable-hmac=1;
>>
>>                             and then assuming you are running the card
>>            in FIPS
>>                   mode (only
>>                          sha1
>>                             is available in FIPS mode)
>>
>>                             enable-multipart-sha1=1;
>>
>>                             You need to reboot for the config changes
>>            to take effect.
>>
>>                             -gary
>>
>>
>>                             On 08/20/09 07:38, Sandeep Cavale wrote:
>>
>>                                 Hi,
>>
>>                                 We have a problem with running Apache
>>            mod_nss with
>>                   SCA6000 in
>>                                 FIPS mode..
>>                                 When we disable the "Sun Metaslot", so
>>            that nss
>>                   can use
>>                          only the
>>                                 Hardware token completely, we get the
>>            following
>>                   error when we
>>                                 try to connect to our server from openssl:
>>
>>                                 # openssl s_client -connect
>>            localhost:443 -tls1 -state
>>                                 CONNECTED(00000005)
>>                                 SSL_connect:before/connect initialization
>>                                 SSL_connect:SSLv3 write client hello A
>>                                 SSL_connect:SSLv3 read server hello A
>>                                 depth=0 /C=US/ST=California/L=Santa
>>                          Clara/O=Sun/OU=Org/CN=nobody
>>                                 verify error:num=18:self signed
>> certificate
>>                                 verify return:1
>>                                 depth=0 /C=US/ST=California/L=Santa
>>                          Clara/O=Sun/OU=Org/CN=nobody
>>                                 verify return:1
>>                                 SSL_connect:SSLv3 read server certificate
>> A
>>                                 SSL_connect:SSLv3 read server done A
>>                                 SSL_connect:SSLv3 write client key
>>            exchange A
>>                                 SSL_connect:SSLv3 write change cipher
>>            spec A
>>                                 SSL_connect:SSLv3 write finished A
>>                                 SSL_connect:SSLv3 flush data
>>                                 *SSL3 alert read:fatal:bad record mac
>>
>> ---------------------------------------------------------------*>
>>                                 The fatal error!!
>>                                 SSL_connect:failed in SSLv3 read finished
>> A
>>                                 1723:error:140943FC:SSL
>>            routines:SSL3_READ_BYTES:sslv3
>>                          alert bad
>>                                 record
>>                   mac:../../../../common/openssl/ssl/s3_pkt.c:1052:SSL
>>                                 alert number 20
>>                                 1723:error:1409E0E5:SSL
>>            routines:SSL3_WRITE_BYTES:ssl
>>                          handshake
>>
>> failure:../../../../common/openssl/ssl/s3_pkt.c:529:
>>
>>
>>                                 According to a thread on Opensolaris forum
>>                                                       (
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>
>>                                          <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>>
>>                                                       <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>
>>                                          <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>>>
>>                                                       <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>
>>                                          <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>>
>>                                                       <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>>
>>                                          <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120>
>>                             <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>>            <
>> http://jp.opensolaris.org/jive/thread.jspa?threadID=64742&tstart=120
>> >>>>>)
>>
>>
>>                                 "By default, the SCA 6000 does not
>>            export any hash
>>                          algorithm to
>>                                 user space apps because the hw can not
>>            support
>>                   multi-part
>>                                 operations"
>>
>>                                 Output of cryptoadm confirms this:
>>                                 bash-3.00# cryptoadm list -m
>> provider=mca/0
>>                                 *mca/0*:
>>
>>  *---------------------------------------------------------------*>
>>                                 our Sun Crypto Accelerator
>>
>> CKM_SHA_1,CKM_DES_CBC,CKM_DES3_CBC,CKM_AES_CBC,CKM_AES_CTR,CKM_DES_CBC_PAD,CKM_DES3_CBC_PAD,CKM_AES_CBC_PAD,CKM_RSA_X_509,CKM_RSA_PKCS,CKM_DSA,CKM_DH_PKCS_KEY_PAIR_GEN,CKM_DH_PKCS_DERIVE,CKM_RSA_PKCS_KEY_PAIR_GEN,CKM_DSA_KEY_PAIR_GEN,CKM_DES_KEY_GEN,CKM_DES2_KEY_GEN,CKM_DES3_KEY_GEN,CKM_AES_KEY_GEN,CKM_DES_CBC_PAD,CKM_DES3_CBC_PAD,CKM_AES_CBC_PAD,CKM_DES_CBC,CKM_DES3_CBC,CKM_AES_CBC,CKM_AES_CTR,CKM_RSA_X_509,CKM_RSA_PKCS,0x80004653
>>
>>                                 (CKM_SHA_1 is the only hashing
>>            algorithm we see)
>>                                 This probably means that since I am
>>            forcing the NSS to
>>                          use only
>>                                 hardware token (by disabling Sun
>>            Metaslot), even
>>                   the HMAC
>>                                 hashing algorithm is being looked for
>>            in the SCA6000
>>                          card. But
>>                                 since it does not expose any hashing
>>            algorithm it
>>                   fails to
>>                                 decode the hash client sends after
>>            change cipher spec
>>                          msg, right?
>>
>>                                 However if using JCE I list out all the
>>            supported
>>                          algorithms of
>>                                 SCA6000, I see even these hashing algs
>>            amongst
>>                   them:                      Mac.HmacSHA384
>>                                        Mac.HmacSHA512
>>                                        Mac.HmacMD5
>>                                        Mac.SslMacMD5
>>                                        Mac.HmacSHA1
>>                                        Mac.SslMacSHA1
>>                                        Mac.HmacSHA256
>>
>>                                 So, I tried configuring Tomcat to use
>>            the SCA6000
>>                   as its JSSE
>>                                 provider, and as I had guessed this
>>            worked without a
>>                          glitch (by
>>                                 this I mean connecting with openssl)
>>            !!! I believe
>>                   that's
>>                                 because for JSSE the above hashing algs
>> are
>>                   visible. To
>>                          confirm
>>                                 this, I disabled these hashing
>>            algorithms in the
>>                   sca6000.cfg
>>                                 file used by the JSSE provider and
>>            trying with
>>                   openssl I
>>                          get an
>>                                 error similar to Apache web server:
>>
>>                                 # openssl s_client -connect
>>            localhost:443 -tls1 -state
>>                                 CONNECTED(00000005)
>>                                 SSL_connect:before/connect initialization
>>                                 SSL_connect:SSLv3 write client hello A
>>                                 SSL_connect:SSLv3 read server hello A
>>                                 depth=0 /C=US/ST=California/L=Santa
>>                          Clara/O=Sun/OU=Org/CN=nobody
>>                                 verify error:num=18:self signed
>> certificate
>>                                 verify return:1
>>                                 depth=0 /C=US/ST=California/L=Santa
>>                          Clara/O=Sun/OU=Org/CN=nobody
>>                                 verify return:1
>>                                 SSL_connect:SSLv3 read server certificate
>> A
>>                                 SSL_connect:SSLv3 read server key
>>            exchange A
>>                                 SSL_connect:SSLv3 read server done A
>>                                 SSL_connect:SSLv3 write client key
>>            exchange A
>>                                 SSL_connect:SSLv3 write change cipher
>>            spec A
>>                                 SSL_connect:SSLv3 write finished A
>>                                 SSL_connect:SSLv3 flush data
>>                                 *SSL3 alert
>>            read:fatal:unexpected_message*
>>
>>  
>> ---------------------------------------------------------------------------------------->
>>                                 Again after client's change cipher spec
>>                                 SSL_connect:failed in SSLv3 read finished
>> A
>>                                 2089:error:140943F2:SSL
>>                   routines:SSL3_READ_BYTES:sslv3 alert
>>                                 unexpected
>>
>> message:../../../../common/openssl/ssl/s3_pkt.c:1052:SSL
>>                          alert
>>                                 number 10
>>                                 2089:error:1409E0E5:SSL
>>            routines:SSL3_WRITE_BYTES:ssl
>>                          handshake
>>
>> failure:../../../../common/openssl/ssl/s3_pkt.c:529:
>>
>>
>>                                 So the question is, how is JSSE able to
>>            access the
>>                   hashing
>>                                 algorithms while NSS cannot?? Our SCA
>>            card and web
>>                          servers have
>>                                 to be running in FIPS mode too...
>>                                 Any help is greatly appreciated..
>>
>>
>>
>> ------------------------------------------------------------------------
>>
>>
>> _______________________________________________
>>                                 crypto-discuss mailing list
>>                                 crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>
>>                   <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>>
>>                          <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>
>>                   <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>>>
>>                                 <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>
>>                   <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>>
>>                          <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>
>>                   <mailto:crypto-discuss at opensolaris.org
>>            <mailto:crypto-discuss at opensolaris.org>>>>
>>
>>
>> http://mail.opensolaris.org/mailman/listinfo/crypto-discuss
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.opensolaris.org/pipermail/crypto-discuss/attachments/20090902/ee147a5c/attachment-0001.html>

Reply via email to