I didn't have DH parameters, added those, but it's still not working yet.
Is there any way to check with openssl why it isn't working?

On Tue, Dec 9, 2014 at 12:11 AM, Vivek Malik <[email protected]> wrote:

> Are you putting in DH parameters in mycert.pem?
>
> PFS depends on using DH algorithm to exchange and create a secret for
> the connection.
>
> openssl dhparam 2048 >> mycert.pem should add the DH parameters to the
> cert file.
>
> Regards,
> Vivek
>
> On Mon, Dec 8, 2014 at 4:44 PM, Sander Rijken <[email protected]>
> wrote:
> > System is Ubuntu 12.04 LTS server, with openssl 1.0.1 and haproxy 1.5.9
> >
> >     OpenSSL> version
> >     OpenSSL 1.0.1 14 Mar 2012
> >
> >
> > I'm currently using the following, started with the suggested
> [stanzas][1]
> > (formatted for readability, it is one long line in my config):
> >
> >     bind 0.0.0.0:443 ssl crt mycert.pem no-tls-tickets ciphers \
> >         ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384: \
> >
> > ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA384: \
> >
> > ECDHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256: \
> >         AES128-SHA:AES256-SHA256:AES256-SHA no-sslv3
> >
> > [1]: https://gist.github.com/rnewson/8384304
> >
> > ssllabs.com indicates FS is not used. When I disable all algorithms
> except
> > the ECDHE ones, I get SSL connection error (ERR_SSL_PROTOCOL_ERROR), so
> > something on the system doesn't support FS.
> >
> > Any ideas?
> >
> >
> > --
> > Sander Rijken
> >
>

Reply via email to