Re: [jetty-users] Keystore Problems

2020-05-26 Thread David C Fuhs

Thanks, Scott.

Using Scott's example command, but modified with our specifics, generates the 
PKCS12 keystore, but Jetty throws the same exception on startup:

2020-05-26 13:56:29,793 - INFO [org.eclipse.jetty.server.AbstractConnector:331] 
- Started ServerConnector@1fdf8aa4{HTTP/1.1, (http/1.1)}{127.0.0.1:8080}
2020-05-26 13:56:29,794 - WARN [org.eclipse.jetty.xml.XmlConfiguration:1938] -
java.security.PrivilegedActionException: null
at java.base/java.security.AccessController.doPrivileged(Native Method)
at 
org.eclipse.jetty.xml.XmlConfiguration.main(XmlConfiguration.java:1878)
Caused by: java.security.UnrecoverableKeyException: Get Key failed: Given final 
block not properly padded. Such issues can arise if a bad key is used during 
decryption.
at 
java.base/sun.security.pkcs12.PKCS12KeyStore.engineGetKey(PKCS12KeyStore.java:462)

keytool seems okay with the keystore.  Omitting all the details, but it shows 
the new SSL certificate, followed by the intermediate/CA certificates in the 
correct order:

/tmp:> keytool -list -keystore xyz.p12 -v
Enter keystore password:
Keystore type: PKCS12
Keystore provider: SUN

Your keystore contains 1 entry

Alias name: 1
Creation date: May 26, 2020
Entry type: PrivateKeyEntry
Certificate chain length: 4
Certificate[1]:

David Fuhs
Information Security Office
California State University, Chico
df...@csuchico.edu
530-898-4852



From: jetty-users-boun...@eclipse.org  on 
behalf of Cantor, Scott 
Sent: Tuesday, May 26, 2020 1:40 PM
To: JETTY user mailing list 
Subject: Re: [jetty-users] Keystore Problems

On 5/26/20, 4:34 PM, "jetty-users-boun...@eclipse.org on behalf of David C 
Fuhs"  wrote:

> What I really want is quite simple: a series of commands that will take as 
> input a private key, a new SSL certificate, and a
> series of intermediate/CA certificates and create a PKCS12 keystore that 
> Jetty can use.

openssl pkcs12 -export -out file.p12 -inkey private.key -in public.crt 
-certfile chain.crt

There are lot of varied ways to feed the certs in, but I've used a model where 
-in is just the EE cert and -certfile has the concat'd chain of the rest.

-- Scott


___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users
___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] Keystore Problems

2020-05-26 Thread Cantor, Scott
On 5/26/20, 4:34 PM, "jetty-users-boun...@eclipse.org on behalf of David C 
Fuhs"  wrote:

> What I really want is quite simple: a series of commands that will take as 
> input a private key, a new SSL certificate, and a
> series of intermediate/CA certificates and create a PKCS12 keystore that 
> Jetty can use.

openssl pkcs12 -export -out file.p12 -inkey private.key -in public.crt 
-certfile chain.crt

There are lot of varied ways to feed the certs in, but I've used a model where 
-in is just the EE cert and -certfile has the concat'd chain of the rest.

-- Scott


___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] Keystore Problems

2020-05-26 Thread David C Fuhs
Thanks Simone, I will give Keystore Explorer and try and report back.

What I really want is quite simple: a series of commands that will take as 
input a private key, a new SSL certificate, and a series of intermediate/CA 
certificates and create a PKCS12 keystore that Jetty can use.

All permutations, combinations, and attempts thus far over several days results 
in a keystore that throws the UnrecoverableKeyException.

Those attempts include: starting with a key that has/does not have a password, 
including/not including the key at the beginning of the file containing the SSL 
certificate and intermediate certificates, starting by creating a JKS keystore 
then converting it to PKCS12, starting by creating a PKCS12 keystore directly, 
adding/modifying a keystore password after creating the PKCS12 keystore, and 
probably several more I forgot.  This morning's attempts involved cutting and 
pasting example commands directly from the Jetty documentation, then modifying 
the specifics.

One would expect that even though I apparently got on a slow horse, I would 
eventually stumble into some combination that would work, but it seems quite 
elusive.

David Fuhs
Information Security Office
California State University, Chico
df...@csuchico.edu
530-898-4852


From: jetty-users-boun...@eclipse.org  on 
behalf of Simone Bordet 
Sent: Tuesday, May 26, 2020 11:18 AM
To: JETTY user mailing list 
Subject: Re: [jetty-users] Keystore Problems

Hi,

On Tue, May 26, 2020 at 8:07 PM David C Fuhs  wrote:
>
> To generate the private key:
> openssl genrsa 4096 > new_host.key
>
> To combine the SSL certificate plus CA certificates into one file:
> cat ssl_cert interm_certs > combined_certs
> Results in a file with the SSL certificate first, followed by the 
> intermediate certificates, with the root CA certificate last in the file.
>
> Stack traces follow, the first is using the JKS version of the keystore, the 
> second with the PKCS12 version of the keystore.

Can you open the keyStores using:

https://keystore-explorer.org/

If you cannot, then the keyStores are wrong.

There is no need to use the JKS format anymore, keep the keyStores in PKCS12.

Make sure that you are using a keyStore password only (not a
keyManager password), unless you really want to.
If you have a keyManager password, then you have to configure Jetty with it.

--
Simone Bordet

http://cometd.org
http://webtide.com
Developer advice, training, services and support
from the Jetty & CometD experts.
___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users
___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] Keystore Problems

2020-05-26 Thread Simone Bordet
Hi,

On Tue, May 26, 2020 at 8:07 PM David C Fuhs  wrote:
>
> To generate the private key:
> openssl genrsa 4096 > new_host.key
>
> To combine the SSL certificate plus CA certificates into one file:
> cat ssl_cert interm_certs > combined_certs
> Results in a file with the SSL certificate first, followed by the 
> intermediate certificates, with the root CA certificate last in the file.
>
> Stack traces follow, the first is using the JKS version of the keystore, the 
> second with the PKCS12 version of the keystore.

Can you open the keyStores using:

https://keystore-explorer.org/

If you cannot, then the keyStores are wrong.

There is no need to use the JKS format anymore, keep the keyStores in PKCS12.

Make sure that you are using a keyStore password only (not a
keyManager password), unless you really want to.
If you have a keyManager password, then you have to configure Jetty with it.

-- 
Simone Bordet

http://cometd.org
http://webtide.com
Developer advice, training, services and support
from the Jetty & CometD experts.
___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] Keystore Problems

2020-05-26 Thread David C Fuhs
at 
org.eclipse.jetty.util.ssl.SslContextFactory.doStart(SslContextFactory.java:245)
at 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
at 
org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:169)
at 
org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
at 
org.eclipse.jetty.server.SslConnectionFactory.doStart(SslConnectionFactory.java:97)
at 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
at 
org.eclipse.jetty.util.component.ContainerLifeCycle.start(ContainerLifeCycle.java:169)
at 
org.eclipse.jetty.util.component.ContainerLifeCycle.doStart(ContainerLifeCycle.java:117)
at 
org.eclipse.jetty.server.AbstractConnector.doStart(AbstractConnector.java:321)
at 
org.eclipse.jetty.server.AbstractNetworkConnector.doStart(AbstractNetworkConnector.java:81)
at 
org.eclipse.jetty.server.ServerConnector.doStart(ServerConnector.java:231)
at 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
at org.eclipse.jetty.server.Server.doStart(Server.java:385)
at 
org.eclipse.jetty.util.component.AbstractLifeCycle.start(AbstractLifeCycle.java:72)
at 
org.eclipse.jetty.xml.XmlConfiguration.lambda$main$1(XmlConfiguration.java:1929)
... 2 common frames omitted
Caused by: javax.crypto.BadPaddingException: Given final block not properly 
padded. Such issues can arise if a bad key is used during decryption.
at 
java.base/com.sun.crypto.provider.CipherCore.unpad(CipherCore.java:975)
at 
java.base/com.sun.crypto.provider.CipherCore.fillOutputBuffer(CipherCore.java:1056)
at 
java.base/com.sun.crypto.provider.CipherCore.doFinal(CipherCore.java:853)
at 
java.base/com.sun.crypto.provider.PKCS12PBECipherCore.implDoFinal(PKCS12PBECipherCore.java:408)
at 
java.base/com.sun.crypto.provider.PKCS12PBECipherCore$PBEWithSHA1AndDESede.engineDoFinal(PKCS12PBECipherCore.java:440)
at java.base/javax.crypto.Cipher.doFinal(Cipher.java:2202)
at 
java.base/sun.security.pkcs12.PKCS12KeyStore.lambda$engineGetKey$0(PKCS12KeyStore.java:406)
at 
java.base/sun.security.pkcs12.PKCS12KeyStore$RetryWithZero.run(PKCS12KeyStore.java:295)
at 
java.base/sun.security.pkcs12.PKCS12KeyStore.engineGetKey(PKCS12KeyStore.java:400)
... 25 common frames omitted
2020-05-26


David Fuhs
Information Security Office
California State University, Chico
df...@csuchico.edu
530-898-4852



From: jetty-users-boun...@eclipse.org  on 
behalf of Joakim Erdfelt 
Sent: Tuesday, May 26, 2020 10:49 AM
To: JETTY user mailing list 
Subject: Re: [jetty-users] Keystore Problems

How were new_host.key and combined_certs created?

Also, can you provide the complete stacktraces?

Joakim Erdfelt / joa...@webtide.com<mailto:joa...@webtide.com>


On Tue, May 26, 2020 at 12:44 PM David C Fuhs 
mailto:df...@csuchico.edu>> wrote:
Good morning all:

Red Hat Enterprise Linux Server release 7.8 (Maipo)
jetty-distribution-9.4.28.v20200408
java-11-openjdk-11.0.7.10-4.el7_8.x86_64
jetty.ssl.port=8443

Generated a new private key (without a password) using openssl.
Generated a certificate request.
Received new SSL certificate, plus intermediate and CA certificates.

The goal: create a new keystore (preferably PKCS12) that works with Jetty.

Following instructions at:
https://www.eclipse.org/jetty/documentation/current/configuring-ssl.html

Combined the new SSL certificate + intermediate certificates + root certificate 
in one file in that order (combined_certs).

openssl pkcs12 -export -inkey new_host.key -in combined_certs -out abc.pkcs12

Import into keystore:

keytool -importkeystore -srckeystore abc.pkcs12 -srckeystore PKCS12 
-destkeystore abc.jks

Followed recommendation to convert JKS to PKCS12:

keytool -importkeystore -srckeystore abc.jks -destkeystore abc.p12 
-deststoretype pkcs12

The commands above all complete successfully (prompts for passphrases and 
passphrase itself omitted).

At this point, we have two keystores, one JKS and one PCKS12:

However, Jetty fails to start correctly with either.

Startup error when using the JKS keystore:
PrivilegedActionException: null
Caused by: java.security.UnrecoverableKeyException: Cannot recover key

Startup error when using the PKCS12 keystore:
PrivilegedActionException: null
Caused by: java.security.UnrecoverableKeyException: Get Key failed: Given final 
block not properly padded.  Such issues arise if a bad key is used during 
decryption.

Also ran the same processes as above, but with the private key added first to 
the file containing the certificates, but with similar Jetty failures on 
startup.

What am I missing?

Exactly what steps are required to get from a valid RSA private key + SSL 
certificate + intermediate and CA certificates (generated by openssl) to a 
worki

Re: [jetty-users] Keystore Problems

2020-05-26 Thread Joakim Erdfelt
How were new_host.key and combined_certs created?

Also, can you provide the complete stacktraces?

Joakim Erdfelt / joa...@webtide.com


On Tue, May 26, 2020 at 12:44 PM David C Fuhs  wrote:

> Good morning all:
>
> Red Hat Enterprise Linux Server release 7.8 (Maipo)
> jetty-distribution-9.4.28.v20200408
> java-11-openjdk-11.0.7.10-4.el7_8.x86_64
> jetty.ssl.port=8443
>
> Generated a new private key (without a password) using openssl.
> Generated a certificate request.
> Received new SSL certificate, plus intermediate and CA certificates.
>
> The goal: create a new keystore (preferably PKCS12) that works with Jetty.
>
> Following instructions at:
> https://www.eclipse.org/jetty/documentation/current/configuring-ssl.html
>
> Combined the new SSL certificate + intermediate certificates + root
> certificate in one file in that order (combined_certs).
>
> openssl pkcs12 -export -inkey new_host.key -in combined_certs -out
> abc.pkcs12
>
> Import into keystore:
>
> keytool -importkeystore -srckeystore abc.pkcs12 -srckeystore PKCS12
> -destkeystore abc.jks
>
> Followed recommendation to convert JKS to PKCS12:
>
> keytool -importkeystore -srckeystore abc.jks -destkeystore abc.p12
> -deststoretype pkcs12
>
> The commands above all complete successfully (prompts for passphrases and
> passphrase itself omitted).
>
> At this point, we have two keystores, one JKS and one PCKS12:
>
> However, Jetty fails to start correctly with either.
>
> Startup error when using the JKS keystore:
> PrivilegedActionException: null
> Caused by: java.security.UnrecoverableKeyException: Cannot recover key
>
> Startup error when using the PKCS12 keystore:
> PrivilegedActionException: null
> Caused by: java.security.UnrecoverableKeyException: Get Key failed: Given
> final block not properly padded.  Such issues arise if a bad key is used
> during decryption.
>
> Also ran the same processes as above, but with the private key added first
> to the file containing the certificates, but with similar Jetty failures on
> startup.
>
> What am I missing?
>
> Exactly what steps are required to get from a valid RSA private key + SSL
> certificate + intermediate and CA certificates (generated by openssl) to a
> working PKCS12 keystore?
>
> Thanks in advance.
>
> David Fuhs
> Information Security Office
> California State University, Chico
> df...@csuchico.edu
> 530-898-4852
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To unsubscribe from this list, visit
> https://www.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users


[jetty-users] Keystore Problems

2020-05-26 Thread David C Fuhs
Good morning all:

Red Hat Enterprise Linux Server release 7.8 (Maipo)
jetty-distribution-9.4.28.v20200408
java-11-openjdk-11.0.7.10-4.el7_8.x86_64
jetty.ssl.port=8443

Generated a new private key (without a password) using openssl.
Generated a certificate request.
Received new SSL certificate, plus intermediate and CA certificates.

The goal: create a new keystore (preferably PKCS12) that works with Jetty.

Following instructions at:
https://www.eclipse.org/jetty/documentation/current/configuring-ssl.html

Combined the new SSL certificate + intermediate certificates + root certificate 
in one file in that order (combined_certs).

openssl pkcs12 -export -inkey new_host.key -in combined_certs -out abc.pkcs12

Import into keystore:

keytool -importkeystore -srckeystore abc.pkcs12 -srckeystore PKCS12 
-destkeystore abc.jks

Followed recommendation to convert JKS to PKCS12:

keytool -importkeystore -srckeystore abc.jks -destkeystore abc.p12 
-deststoretype pkcs12

The commands above all complete successfully (prompts for passphrases and 
passphrase itself omitted).

At this point, we have two keystores, one JKS and one PCKS12:

However, Jetty fails to start correctly with either.

Startup error when using the JKS keystore:
PrivilegedActionException: null
Caused by: java.security.UnrecoverableKeyException: Cannot recover key

Startup error when using the PKCS12 keystore:
PrivilegedActionException: null
Caused by: java.security.UnrecoverableKeyException: Get Key failed: Given final 
block not properly padded.  Such issues arise if a bad key is used during 
decryption.

Also ran the same processes as above, but with the private key added first to 
the file containing the certificates, but with similar Jetty failures on 
startup.

What am I missing?

Exactly what steps are required to get from a valid RSA private key + SSL 
certificate + intermediate and CA certificates (generated by openssl) to a 
working PKCS12 keystore?

Thanks in advance.

David Fuhs
Information Security Office
California State University, Chico
df...@csuchico.edu
530-898-4852

___
jetty-users mailing list
jetty-users@eclipse.org
To unsubscribe from this list, visit 
https://www.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] keystore

2018-03-14 Thread Jesse McConnell
fair enough, congrats at least  :)

--
jesse mcconnell
jesse.mcconn...@gmail.com

On Wed, Mar 14, 2018 at 2:15 PM, Lou DeGenaro 
wrote:

> Unfortunately no.  I could only supply an IP address (which it seems is
> not allowed) and is only accessible internally anyway.
>
> Lou.
>
> On Wed, Mar 14, 2018 at 3:04 PM, Jesse McConnell <
> jesse.mcconn...@gmail.com> wrote:
>
>> That is an interesting nugget Lou, any chance you can report results from
>> here: https://www.ssllabs.com/ssltest/ ?
>>
>>
>>
>> --
>> jesse mcconnell
>> jesse.mcconn...@gmail.com
>>
>> On Wed, Mar 14, 2018 at 1:53 PM, Lou DeGenaro 
>> wrote:
>>
>>> Looking here: https://www.ibm.com/support/kn
>>> owledgecenter/en/SSYKE2_8.0.0/com.ibm.java.security.componen
>>> t.80.doc/security-component/jsse2Docs/matchsslcontext_tls.html
>>>
>>> I added -Dcom.ibm.jsse2.overrideDefaultTLS=true to the launch of my
>>> Jetty server and much joy resulted.
>>>
>>> Lou.
>>>
>>> On Wed, Mar 14, 2018 at 2:45 PM, Lothar Kimmeringer 
>>> wrote:
>>>


 Am 14.03.2018 um 17:53 schrieb Silvio Bierman:

> Those are ciphers for the SSL protocol instead of TLS. You do not want
> to use those...
>

 I'm not defending IBM here for their decision to follow the
 NIH-principle.
 The ciphers are for TLS, the session where this trace came from was an
 OFTP2-connection that is restricted to TLS and was using TLSv1.2 for the
 handshake:

 OFTP TLS-ReceiveThread2 (Thread nr. 6, for server-socket listening on
 address /x.x.x.x on port 6619), READ: TLSv1.2 Handshake, length = 181
 JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
 JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
 JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
 JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
 *** ClientHello, TLSv1.2
 RandomCookie:  GMT: 1491538846 bytes = { 239, 0, 205, 234, 239, 135,
 27, 62, 91, 187, 205, 216, 254, 230, 62, 170, 127, 69, 1, 60, 88, 75, 88,
 14, 181, 116, 137, 40 }
 Session ID:  {}
 Cipher Suites:
 [...]

 The corresponding Wireshark trace showed the cipher-list with the names
 you're used to, so there really are no SSL-ciphers here, "just" a
 different naming scheme.



 Cheers, Lothar
 ___
 jetty-users mailing list
 jetty-users@eclipse.org
 To change your delivery options, retrieve your password, or unsubscribe
 from this list, visit
 https://dev.eclipse.org/mailman/listinfo/jetty-users

>>>
>>>
>>> ___
>>> jetty-users mailing list
>>> jetty-users@eclipse.org
>>> To change your delivery options, retrieve your password, or unsubscribe
>>> from this list, visit
>>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>>
>>
>>
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Lou DeGenaro
Unfortunately no.  I could only supply an IP address (which it seems is not
allowed) and is only accessible internally anyway.

Lou.

On Wed, Mar 14, 2018 at 3:04 PM, Jesse McConnell 
wrote:

> That is an interesting nugget Lou, any chance you can report results from
> here: https://www.ssllabs.com/ssltest/ ?
>
>
>
> --
> jesse mcconnell
> jesse.mcconn...@gmail.com
>
> On Wed, Mar 14, 2018 at 1:53 PM, Lou DeGenaro 
> wrote:
>
>> Looking here: https://www.ibm.com/support/kn
>> owledgecenter/en/SSYKE2_8.0.0/com.ibm.java.security.componen
>> t.80.doc/security-component/jsse2Docs/matchsslcontext_tls.html
>>
>> I added -Dcom.ibm.jsse2.overrideDefaultTLS=true to the launch of my
>> Jetty server and much joy resulted.
>>
>> Lou.
>>
>> On Wed, Mar 14, 2018 at 2:45 PM, Lothar Kimmeringer 
>> wrote:
>>
>>>
>>>
>>> Am 14.03.2018 um 17:53 schrieb Silvio Bierman:
>>>
 Those are ciphers for the SSL protocol instead of TLS. You do not want
 to use those...

>>>
>>> I'm not defending IBM here for their decision to follow the
>>> NIH-principle.
>>> The ciphers are for TLS, the session where this trace came from was an
>>> OFTP2-connection that is restricted to TLS and was using TLSv1.2 for the
>>> handshake:
>>>
>>> OFTP TLS-ReceiveThread2 (Thread nr. 6, for server-socket listening on
>>> address /x.x.x.x on port 6619), READ: TLSv1.2 Handshake, length = 181
>>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>>> *** ClientHello, TLSv1.2
>>> RandomCookie:  GMT: 1491538846 bytes = { 239, 0, 205, 234, 239, 135, 27,
>>> 62, 91, 187, 205, 216, 254, 230, 62, 170, 127, 69, 1, 60, 88, 75, 88, 14,
>>> 181, 116, 137, 40 }
>>> Session ID:  {}
>>> Cipher Suites:
>>> [...]
>>>
>>> The corresponding Wireshark trace showed the cipher-list with the names
>>> you're used to, so there really are no SSL-ciphers here, "just" a
>>> different naming scheme.
>>>
>>>
>>>
>>> Cheers, Lothar
>>> ___
>>> jetty-users mailing list
>>> jetty-users@eclipse.org
>>> To change your delivery options, retrieve your password, or unsubscribe
>>> from this list, visit
>>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>>
>>
>>
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Jesse McConnell
That is an interesting nugget Lou, any chance you can report results from
here: https://www.ssllabs.com/ssltest/ ?



--
jesse mcconnell
jesse.mcconn...@gmail.com

On Wed, Mar 14, 2018 at 1:53 PM, Lou DeGenaro 
wrote:

> Looking here: https://www.ibm.com/support/knowledgecenter/en/SSYKE2_8.0.
> 0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/
> matchsslcontext_tls.html
>
> I added -Dcom.ibm.jsse2.overrideDefaultTLS=true to the launch of my Jetty
> server and much joy resulted.
>
> Lou.
>
> On Wed, Mar 14, 2018 at 2:45 PM, Lothar Kimmeringer 
> wrote:
>
>>
>>
>> Am 14.03.2018 um 17:53 schrieb Silvio Bierman:
>>
>>> Those are ciphers for the SSL protocol instead of TLS. You do not want
>>> to use those...
>>>
>>
>> I'm not defending IBM here for their decision to follow the NIH-principle.
>> The ciphers are for TLS, the session where this trace came from was an
>> OFTP2-connection that is restricted to TLS and was using TLSv1.2 for the
>> handshake:
>>
>> OFTP TLS-ReceiveThread2 (Thread nr. 6, for server-socket listening on
>> address /x.x.x.x on port 6619), READ: TLSv1.2 Handshake, length = 181
>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
>> *** ClientHello, TLSv1.2
>> RandomCookie:  GMT: 1491538846 bytes = { 239, 0, 205, 234, 239, 135, 27,
>> 62, 91, 187, 205, 216, 254, 230, 62, 170, 127, 69, 1, 60, 88, 75, 88, 14,
>> 181, 116, 137, 40 }
>> Session ID:  {}
>> Cipher Suites:
>> [...]
>>
>> The corresponding Wireshark trace showed the cipher-list with the names
>> you're used to, so there really are no SSL-ciphers here, "just" a
>> different naming scheme.
>>
>>
>>
>> Cheers, Lothar
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Lou DeGenaro
Looking here:
https://www.ibm.com/support/knowledgecenter/en/SSYKE2_8.0.0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/matchsslcontext_tls.html

I added -Dcom.ibm.jsse2.overrideDefaultTLS=true to the launch of my Jetty
server and much joy resulted.

Lou.

On Wed, Mar 14, 2018 at 2:45 PM, Lothar Kimmeringer 
wrote:

>
>
> Am 14.03.2018 um 17:53 schrieb Silvio Bierman:
>
>> Those are ciphers for the SSL protocol instead of TLS. You do not want to
>> use those...
>>
>
> I'm not defending IBM here for their decision to follow the NIH-principle.
> The ciphers are for TLS, the session where this trace came from was an
> OFTP2-connection that is restricted to TLS and was using TLSv1.2 for the
> handshake:
>
> OFTP TLS-ReceiveThread2 (Thread nr. 6, for server-socket listening on
> address /x.x.x.x on port 6619), READ: TLSv1.2 Handshake, length = 181
> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
> JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
> *** ClientHello, TLSv1.2
> RandomCookie:  GMT: 1491538846 bytes = { 239, 0, 205, 234, 239, 135, 27,
> 62, 91, 187, 205, 216, 254, 230, 62, 170, 127, 69, 1, 60, 88, 75, 88, 14,
> 181, 116, 137, 40 }
> Session ID:  {}
> Cipher Suites:
> [...]
>
> The corresponding Wireshark trace showed the cipher-list with the names
> you're used to, so there really are no SSL-ciphers here, "just" a
> different naming scheme.
>
>
>
> Cheers, Lothar
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Lothar Kimmeringer



Am 14.03.2018 um 17:53 schrieb Silvio Bierman:

Those are ciphers for the SSL protocol instead of TLS. You do not want to use 
those...


I'm not defending IBM here for their decision to follow the NIH-principle.
The ciphers are for TLS, the session where this trace came from was an
OFTP2-connection that is restricted to TLS and was using TLSv1.2 for the
handshake:

OFTP TLS-ReceiveThread2 (Thread nr. 6, for server-socket listening on address 
/x.x.x.x on port 6619), READ: TLSv1.2 Handshake, length = 181
JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
JsseJCE:  Using AlgorithmParameters EC from provider IBMJCE version 1.8
*** ClientHello, TLSv1.2
RandomCookie:  GMT: 1491538846 bytes = { 239, 0, 205, 234, 239, 135, 27, 62, 
91, 187, 205, 216, 254, 230, 62, 170, 127, 69, 1, 60, 88, 75, 88, 14, 181, 116, 
137, 40 }
Session ID:  {}
Cipher Suites:
[...]

The corresponding Wireshark trace showed the cipher-list with the names
you're used to, so there really are no SSL-ciphers here, "just" a
different naming scheme.


Cheers, Lothar
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] keystore

2018-03-14 Thread Joakim Erdfelt
Also, with the IBM JVM you might have to configure the following on the
Jetty side ...

SslContextFactory ...

.setProtocol(String protocol) - this defaults to "TLS" (the openjdk
official name), yours is likely different (based on my reading of the IBM
JVM documentation).
.setProvider(String provider) - this defaults to "" (unset) as we use the
default provider, but your IBM JVM seems to want to do things "the IBM
way", not "the standard way".

As a last resort, you might need to create the javax.net.ssl.SSLContext
manually, the IBM way, and give it to the jetty side
SslContextFactory.setSslContext(SSLContext context)


Joakim Erdfelt / joa...@webtide.com

On Wed, Mar 14, 2018 at 12:04 PM, Joakim Erdfelt  wrote:

> Also, read and understand the linked to issue at the IBM side for TLS
> (from the prior message)
>
> https://www.ibm.com/support/knowledgecenter/en/SSYKE2_8.0.
> 0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/
> matchsslcontext_tls.html
>
> The IBM JVM does not apparently follow the OpenJDK standard naming of
> things (which dozens of other alternate JVMs do), that article tells you
> how to correct the startup of your IBM JVM to address that as well.
>
>
>
> Joakim Erdfelt / joa...@webtide.com
>
> On Wed, Mar 14, 2018 at 11:53 AM, Silvio Bierman <
> sbier...@jambo-software.com> wrote:
>
>> Those are ciphers for the SSL protocol instead of TLS. You do not want to
>> use those...
>>
>>
>>
>> Sent from my Samsung Galaxy smartphone.
>>
>> ---- Original message 
>> From: Lothar Kimmeringer 
>> Date: 3/14/18 17:36 (GMT+01:00)
>> To: jetty-users@eclipse.org
>> Subject: Re: [jetty-users] keystore
>>
>> Hi,
>>
>> Am 14.03.2018 um 17:24 schrieb Joakim Erdfelt:
>>
>> > * The IBM JVM is not sane, look into its cipher suites and protocols.
>> >
>> > A quick comparison shows that it has half the cipher suites that oracle
>> jvm or openjdk has.
>>
>> Not necessarily. At least the JVM for i Series has more or less the same
>> ciphers but the textual representation is not starting with TLS_... but
>> SSL_...
>> so filters based on the textual representation will filter out most
>> of them (in my case where I found that out, all ciphers were filtered).
>>
>> Here as an example -Djavax.net.debug=ssl:handshake output for a
>> ClientHello
>> sent by an AS/400:
>>
>> Cipher Suites: [
>>   TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
>>   SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
>>   SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
>>   SSL_RSA_WITH_AES_256_CBC_SHA256,
>>   SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
>>   SSL_ECDH_RSA_WITH_AES_256_CBC_SHA384,
>>   SSL_DHE_RSA_WITH_AES_256_CBC_SHA256,
>>   SSL_DHE_DSS_WITH_AES_256_CBC_SHA256,
>>   SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
>>   SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA,
>>   SSL_RSA_WITH_AES_256_CBC_SHA,
>>   SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
>>   SSL_ECDH_RSA_WITH_AES_256_CBC_SHA,
>>   SSL_DHE_RSA_WITH_AES_256_CBC_SHA,
>>   SSL_DHE_DSS_WITH_AES_256_CBC_SHA,
>>   SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
>>   SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
>>   SSL_RSA_WITH_AES_128_CBC_SHA256,
>>   SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
>>   SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256,
>>   SSL_DHE_RSA_WITH_AES_128_CBC_SHA256,
>>   SSL_DHE_DSS_WITH_AES_128_CBC_SHA256,
>>   SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
>>   SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA,
>>   SSL_RSA_WITH_AES_128_CBC_SHA,
>>   SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
>>   SSL_ECDH_RSA_WITH_AES_128_CBC_SHA,
>>   SSL_DHE_RSA_WITH_AES_128_CBC_SHA,
>>   SSL_DHE_DSS_WITH_AES_128_CBC_SHA,
>>   SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
>>   SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
>>   SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
>>   SSL_RSA_WITH_AES_256_GCM_SHA384,
>>   SSL_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
>>   SSL_ECDH_RSA_WITH_AES_256_GCM_SHA384,
>>   SSL_DHE_DSS_WITH_AES_256_GCM_SHA384,
>>   SSL_DHE_RSA_WITH_AES_256_GCM_SHA384,
>>   SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
>>   SSL_RSA_WITH_AES_128_GCM_SHA256,
>>   SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
>>   SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256,
>>   SSL_DHE_RSA_WITH_AES_128_GCM_SHA256,
>>   SSL_DHE_DSS_WITH_AES_128_GCM_SHA256]
>>
>>
>> Cheers, Lothar
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Joakim Erdfelt
Also, read and understand the linked to issue at the IBM side for TLS (from
the prior message)

https://www.ibm.com/support/knowledgecenter/en/SSYKE2_8.0.0/com.ibm.java.security.component.80.doc/security-component/jsse2Docs/matchsslcontext_tls.html

The IBM JVM does not apparently follow the OpenJDK standard naming of
things (which dozens of other alternate JVMs do), that article tells you
how to correct the startup of your IBM JVM to address that as well.



Joakim Erdfelt / joa...@webtide.com

On Wed, Mar 14, 2018 at 11:53 AM, Silvio Bierman <
sbier...@jambo-software.com> wrote:

> Those are ciphers for the SSL protocol instead of TLS. You do not want to
> use those...
>
>
>
> Sent from my Samsung Galaxy smartphone.
>
>  Original message 
> From: Lothar Kimmeringer 
> Date: 3/14/18 17:36 (GMT+01:00)
> To: jetty-users@eclipse.org
> Subject: Re: [jetty-users] keystore
>
> Hi,
>
> Am 14.03.2018 um 17:24 schrieb Joakim Erdfelt:
>
> > * The IBM JVM is not sane, look into its cipher suites and protocols.
> >
> > A quick comparison shows that it has half the cipher suites that oracle
> jvm or openjdk has.
>
> Not necessarily. At least the JVM for i Series has more or less the same
> ciphers but the textual representation is not starting with TLS_... but
> SSL_...
> so filters based on the textual representation will filter out most
> of them (in my case where I found that out, all ciphers were filtered).
>
> Here as an example -Djavax.net.debug=ssl:handshake output for a
> ClientHello
> sent by an AS/400:
>
> Cipher Suites: [
>   TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
>   SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
>   SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
>   SSL_RSA_WITH_AES_256_CBC_SHA256,
>   SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
>   SSL_ECDH_RSA_WITH_AES_256_CBC_SHA384,
>   SSL_DHE_RSA_WITH_AES_256_CBC_SHA256,
>   SSL_DHE_DSS_WITH_AES_256_CBC_SHA256,
>   SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
>   SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA,
>   SSL_RSA_WITH_AES_256_CBC_SHA,
>   SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
>   SSL_ECDH_RSA_WITH_AES_256_CBC_SHA,
>   SSL_DHE_RSA_WITH_AES_256_CBC_SHA,
>   SSL_DHE_DSS_WITH_AES_256_CBC_SHA,
>   SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
>   SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
>   SSL_RSA_WITH_AES_128_CBC_SHA256,
>   SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
>   SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256,
>   SSL_DHE_RSA_WITH_AES_128_CBC_SHA256,
>   SSL_DHE_DSS_WITH_AES_128_CBC_SHA256,
>   SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
>   SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA,
>   SSL_RSA_WITH_AES_128_CBC_SHA,
>   SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
>   SSL_ECDH_RSA_WITH_AES_128_CBC_SHA,
>   SSL_DHE_RSA_WITH_AES_128_CBC_SHA,
>   SSL_DHE_DSS_WITH_AES_128_CBC_SHA,
>   SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
>   SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
>   SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
>   SSL_RSA_WITH_AES_256_GCM_SHA384,
>   SSL_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
>   SSL_ECDH_RSA_WITH_AES_256_GCM_SHA384,
>   SSL_DHE_DSS_WITH_AES_256_GCM_SHA384,
>   SSL_DHE_RSA_WITH_AES_256_GCM_SHA384,
>   SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
>   SSL_RSA_WITH_AES_128_GCM_SHA256,
>   SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
>   SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256,
>   SSL_DHE_RSA_WITH_AES_128_GCM_SHA256,
>   SSL_DHE_DSS_WITH_AES_128_GCM_SHA256]
>
>
> Cheers, Lothar
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Lothar Kimmeringer

Hi,

Am 14.03.2018 um 17:47 schrieb Joakim Erdfelt:


Conclusion: You have a cipher suite issue.


I don't have any issues (I just added my 2 cents to this thread). My point is
if we have a similar effect here than with JVMs on iSeries that the JVM
reports ciphers "SSL_-something" and jetty is configured to only enable
ciphers "TLS_-something", the server might filter out all the "good ones"
leading to the situation that server and client don't share any ciphers
leading to this error.

The fix in that case would be to change the jetty-configuration of
enabled ciphers to the corresponding textual representations of these
ciphers on that particular system (replace TLS_ by SSL_ that is)


Cheers, Lothar
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] keystore

2018-03-14 Thread Silvio Bierman
Those are ciphers for the SSL protocol instead of TLS. You do not want to use 
those...


Sent from my Samsung Galaxy smartphone.
 Original message From: Lothar Kimmeringer 
 Date: 3/14/18  17:36  (GMT+01:00) To: 
jetty-users@eclipse.org Subject: Re: [jetty-users] keystore 
Hi,

Am 14.03.2018 um 17:24 schrieb Joakim Erdfelt:

> * The IBM JVM is not sane, look into its cipher suites and protocols.
>
> A quick comparison shows that it has half the cipher suites that oracle jvm 
> or openjdk has.

Not necessarily. At least the JVM for i Series has more or less the same
ciphers but the textual representation is not starting with TLS_... but SSL_...
so filters based on the textual representation will filter out most
of them (in my case where I found that out, all ciphers were filtered).

Here as an example -Djavax.net.debug=ssl:handshake output for a ClientHello
sent by an AS/400:

Cipher Suites: [
  TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
  SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
  SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
  SSL_RSA_WITH_AES_256_CBC_SHA256,
  SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
  SSL_ECDH_RSA_WITH_AES_256_CBC_SHA384,
  SSL_DHE_RSA_WITH_AES_256_CBC_SHA256,
  SSL_DHE_DSS_WITH_AES_256_CBC_SHA256,
  SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
  SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA,
  SSL_RSA_WITH_AES_256_CBC_SHA,
  SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
  SSL_ECDH_RSA_WITH_AES_256_CBC_SHA,
  SSL_DHE_RSA_WITH_AES_256_CBC_SHA,
  SSL_DHE_DSS_WITH_AES_256_CBC_SHA,
  SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
  SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
  SSL_RSA_WITH_AES_128_CBC_SHA256,
  SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
  SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256,
  SSL_DHE_RSA_WITH_AES_128_CBC_SHA256,
  SSL_DHE_DSS_WITH_AES_128_CBC_SHA256,
  SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
  SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA,
  SSL_RSA_WITH_AES_128_CBC_SHA,
  SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
  SSL_ECDH_RSA_WITH_AES_128_CBC_SHA,
  SSL_DHE_RSA_WITH_AES_128_CBC_SHA,
  SSL_DHE_DSS_WITH_AES_128_CBC_SHA,
  SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
  SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
  SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
  SSL_RSA_WITH_AES_256_GCM_SHA384,
  SSL_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
  SSL_ECDH_RSA_WITH_AES_256_GCM_SHA384,
  SSL_DHE_DSS_WITH_AES_256_GCM_SHA384,
  SSL_DHE_RSA_WITH_AES_256_GCM_SHA384,
  SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
  SSL_RSA_WITH_AES_128_GCM_SHA256,
  SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
  SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256,
  SSL_DHE_RSA_WITH_AES_128_GCM_SHA256,
  SSL_DHE_DSS_WITH_AES_128_GCM_SHA256]


Cheers, Lothar
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Joakim Erdfelt
>  Secure Connection Failed Error code: SSL_ERROR_NO_CYPHER_OVERLAP

The stated reason from Firefox for that error is that you lack the required
cipher suites for the updated TLS configuration present since FireFox 50.x

* https://support.mozilla.org/en-US/questions/1148536
* https://support.mozilla.org/en-US/questions/1153050
* https://support.mozilla.org/en-US/questions/1167953

Your IBM JVM reports 14 selected Cipher Suites (31 disabled) by default.
Oracle JVM reports 29 selected Cipher Suites (53 disabled) by default.

Conclusion: You have a cipher suite issue.

Try MSIE or FireFox 45 (suggestions made in the mozilla support forum).  If
those work, then you have a Cipher Suite issue with your IBM JVM.


Joakim Erdfelt / joa...@webtide.com

On Wed, Mar 14, 2018 at 11:36 AM, Lothar Kimmeringer 
wrote:

> Hi,
>
> Am 14.03.2018 um 17:24 schrieb Joakim Erdfelt:
>
> * The IBM JVM is not sane, look into its cipher suites and protocols.
>>
>> A quick comparison shows that it has half the cipher suites that oracle
>> jvm or openjdk has.
>>
>
> Not necessarily. At least the JVM for i Series has more or less the same
> ciphers but the textual representation is not starting with TLS_... but
> SSL_...
> so filters based on the textual representation will filter out most
> of them (in my case where I found that out, all ciphers were filtered).
>
> Here as an example -Djavax.net.debug=ssl:handshake output for a
> ClientHello
> sent by an AS/400:
>
> Cipher Suites: [
>  TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
>  SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
>  SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
>  SSL_RSA_WITH_AES_256_CBC_SHA256,
>  SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
>  SSL_ECDH_RSA_WITH_AES_256_CBC_SHA384,
>  SSL_DHE_RSA_WITH_AES_256_CBC_SHA256,
>  SSL_DHE_DSS_WITH_AES_256_CBC_SHA256,
>  SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
>  SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA,
>  SSL_RSA_WITH_AES_256_CBC_SHA,
>  SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
>  SSL_ECDH_RSA_WITH_AES_256_CBC_SHA,
>  SSL_DHE_RSA_WITH_AES_256_CBC_SHA,
>  SSL_DHE_DSS_WITH_AES_256_CBC_SHA,
>  SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
>  SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
>  SSL_RSA_WITH_AES_128_CBC_SHA256,
>  SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
>  SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256,
>  SSL_DHE_RSA_WITH_AES_128_CBC_SHA256,
>  SSL_DHE_DSS_WITH_AES_128_CBC_SHA256,
>  SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
>  SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA,
>  SSL_RSA_WITH_AES_128_CBC_SHA,
>  SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
>  SSL_ECDH_RSA_WITH_AES_128_CBC_SHA,
>  SSL_DHE_RSA_WITH_AES_128_CBC_SHA,
>  SSL_DHE_DSS_WITH_AES_128_CBC_SHA,
>  SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
>  SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
>  SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
>  SSL_RSA_WITH_AES_256_GCM_SHA384,
>  SSL_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
>  SSL_ECDH_RSA_WITH_AES_256_GCM_SHA384,
>  SSL_DHE_DSS_WITH_AES_256_GCM_SHA384,
>  SSL_DHE_RSA_WITH_AES_256_GCM_SHA384,
>  SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
>  SSL_RSA_WITH_AES_128_GCM_SHA256,
>  SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
>  SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256,
>  SSL_DHE_RSA_WITH_AES_128_GCM_SHA256,
>  SSL_DHE_DSS_WITH_AES_128_GCM_SHA256]
>
>
> Cheers, Lothar
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-14 Thread Lothar Kimmeringer

Hi,

Am 14.03.2018 um 17:24 schrieb Joakim Erdfelt:


* The IBM JVM is not sane, look into its cipher suites and protocols.

A quick comparison shows that it has half the cipher suites that oracle jvm or 
openjdk has.


Not necessarily. At least the JVM for i Series has more or less the same
ciphers but the textual representation is not starting with TLS_... but SSL_...
so filters based on the textual representation will filter out most
of them (in my case where I found that out, all ciphers were filtered).

Here as an example -Djavax.net.debug=ssl:handshake output for a ClientHello
sent by an AS/400:

Cipher Suites: [
 TLS_EMPTY_RENEGOTIATION_INFO_SCSV,
 SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384,
 SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA384,
 SSL_RSA_WITH_AES_256_CBC_SHA256,
 SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA384,
 SSL_ECDH_RSA_WITH_AES_256_CBC_SHA384,
 SSL_DHE_RSA_WITH_AES_256_CBC_SHA256,
 SSL_DHE_DSS_WITH_AES_256_CBC_SHA256,
 SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,
 SSL_ECDHE_RSA_WITH_AES_256_CBC_SHA,
 SSL_RSA_WITH_AES_256_CBC_SHA,
 SSL_ECDH_ECDSA_WITH_AES_256_CBC_SHA,
 SSL_ECDH_RSA_WITH_AES_256_CBC_SHA,
 SSL_DHE_RSA_WITH_AES_256_CBC_SHA,
 SSL_DHE_DSS_WITH_AES_256_CBC_SHA,
 SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,
 SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA256,
 SSL_RSA_WITH_AES_128_CBC_SHA256,
 SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA256,
 SSL_ECDH_RSA_WITH_AES_128_CBC_SHA256,
 SSL_DHE_RSA_WITH_AES_128_CBC_SHA256,
 SSL_DHE_DSS_WITH_AES_128_CBC_SHA256,
 SSL_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,
 SSL_ECDHE_RSA_WITH_AES_128_CBC_SHA,
 SSL_RSA_WITH_AES_128_CBC_SHA,
 SSL_ECDH_ECDSA_WITH_AES_128_CBC_SHA,
 SSL_ECDH_RSA_WITH_AES_128_CBC_SHA,
 SSL_DHE_RSA_WITH_AES_128_CBC_SHA,
 SSL_DHE_DSS_WITH_AES_128_CBC_SHA,
 SSL_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,
 SSL_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,
 SSL_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
 SSL_RSA_WITH_AES_256_GCM_SHA384,
 SSL_ECDH_ECDSA_WITH_AES_256_GCM_SHA384,
 SSL_ECDH_RSA_WITH_AES_256_GCM_SHA384,
 SSL_DHE_DSS_WITH_AES_256_GCM_SHA384,
 SSL_DHE_RSA_WITH_AES_256_GCM_SHA384,
 SSL_ECDHE_RSA_WITH_AES_128_GCM_SHA256,
 SSL_RSA_WITH_AES_128_GCM_SHA256,
 SSL_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,
 SSL_ECDH_RSA_WITH_AES_128_GCM_SHA256,
 SSL_DHE_RSA_WITH_AES_128_GCM_SHA256,
 SSL_DHE_DSS_WITH_AES_128_GCM_SHA256]


Cheers, Lothar
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users


Re: [jetty-users] keystore

2018-03-14 Thread Joakim Erdfelt
Your server has no handlers, none, completely empty.

Perhaps you missed the ...

server.setHandler(resourceHandler);

Better yet, use ...

HandlerList handlers = new HandlerList();
handlers.addHandler(resourceHandler);
handlers.addHandler(new DefaultHandler()); // always last
server.setHandler(handlers);

Also, add this before your server.start();

server.setDumpAfterStart(true);
server.start();
server.join();

That should produce the dump I mentioned in the prior email.


Joakim Erdfelt / joa...@webtide.com

On Wed, Mar 14, 2018 at 9:55 AM, Lou DeGenaro 
wrote:

> Have you attempted to configure the SSL Cipher Suites on the Jetty server
> side?
>
> > NO.  I'm using vanilla jetty as shipped.  Is there something else I need
> to do?
>
> Code shown below.
>
> Thanks.
>
> Lou.
>
> private void server_main(String[] args) {
> try {
> // === jetty.xml ===
>
>
>
> // Setup Threadpool
>
>
> QueuedThreadPool threadPool = new QueuedThreadPool();
> threadPool.setMaxThreads(max_threads);
>
> // Server
>
>
> server = new Server(threadPool);
>
> // Scheduler
>
>
> server.addBean(new ScheduledExecutorScheduler());
>
> // === jetty-http.xml ===
>
>
> ServerConnector http = new ServerConnector(server, new
> HttpConnectionFactory());
> http.setPort(port_http);
> http.setIdleTimeout(idle_timeout);
> server.addConnector(http);
>
> // === jetty-https.xml ===
>
>
> // SSL Context Factory
>
>
> SslContextFactory sslContextFactory = new SslContextFactory();
>
> HttpConfiguration http_config = new HttpConfiguration();
>  http_config.setSecureScheme("https");
>  http_config.setSecurePort(port_https);
>
> HttpConfiguration https_config = new
> HttpConfiguration(http_config);
> https_config.addCustomizer(new SecureRequestCustomizer());
>
> ServerConnector https = new ServerConnector(server,
>  new SslConnectionFactory(sslContextFactory,"http/1.1"),
>  new HttpConnectionFactory(https_config));
>
> https.setPort(port_https);
> sslContextFactory.setKeyStorePath(keystore);
>
> sslContextFactory.setKeyStorePassword(keystore_password);
> sslContextFactory.setKeyManagerPassword(keymanager_password);
>
> server.setConnectors(new Connector[] { http });
> server.addConnector(https);
>
> //
> ResourceHandler resourceHandler = new ResourceHandler();
> resourceHandler.setDirectoriesListed(true);
> resourceHandler.setResourceBase(jetty_server_root);
>
> server.start();
> server.join();
> }
> catch(Exception e) {
> e.printStackTrace();
> }
> }
>
> On Wed, Mar 14, 2018 at 10:44 AM, Joakim Erdfelt 
> wrote:
>
>> Have you attempted to configure the SSL Cipher Suites on the Jetty server
>> side?
>>
>> If you enable the jetty startup dump you'll see the list of enabled
>> cipher suites and protocols that Jetty is running with (including the
>> reason why a specific available protocol or cipher suite is disabled).
>>
>> $ java -jar /path/to/my/jetty-home/start.jar
>> jetty.server.dumpAfterStart=true
>>
>> Example output:
>>
>>  |   += SslConnectionFactory@51c668e3{SSL->http/1.1} - STARTED
>>  |   |   += SslContextFactory@19f040ba[provider=null,keyStore=file:///
>> mnt/c/code/jetty/distros/jetty-distribution-9.4.8.v20171121/
>> demo-base/etc/keystore,trustStore=file:///mnt/c/code/jetty/distros/jetty-
>> distribution-9.4.8.v20171121/demo-base/etc/keystore] trustAll=false
>>  |   |   +- Protocol Selections
>>  |   |   |   +- Enabled (size=3)
>>  |   |   |   |   +- TLSv1
>>  |   |   |   |   +- TLSv1.1
>>  |   |   |   |   +- TLSv1.2
>>  |   |   |   +- Disabled (size=2)
>>  |   |   |   +- SSLv2Hello - ConfigExcluded:'SSLv2Hello'
>>  |   |   |   +- SSLv3 - JreDisabled:java.security,
>> ConfigExcluded:'SSLv3'
>>  |   |   +- Cipher Suite Selections
>>  |   |   +- Enabled (size=29)
>>  |   |   |   +- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
>>  |   |   |   +- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
>>  |   |   |   +- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
>>  |   |   |   +- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
>>  |   |   |   +- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
>>  |   |   |   +- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
>>  |   |   |   +- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
>>  |   |   |   +- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
>>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
>>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
>>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
>>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_256_G

Re: [jetty-users] keystore

2018-03-14 Thread Lou DeGenaro
Have you attempted to configure the SSL Cipher Suites on the Jetty server
side?

> NO.  I'm using vanilla jetty as shipped.  Is there something else I need
to do?

Code shown below.

Thanks.

Lou.

private void server_main(String[] args) {
try {
// === jetty.xml
===


// Setup
Threadpool

QueuedThreadPool threadPool = new QueuedThreadPool();
threadPool.setMaxThreads(max_threads);

//
Server

server = new Server(threadPool);

//
Scheduler

server.addBean(new ScheduledExecutorScheduler());

// === jetty-http.xml
===

ServerConnector http = new ServerConnector(server, new
HttpConnectionFactory());
http.setPort(port_http);
http.setIdleTimeout(idle_timeout);
server.addConnector(http);

// === jetty-https.xml
===

// SSL Context
Factory

SslContextFactory sslContextFactory = new SslContextFactory();

HttpConfiguration http_config = new HttpConfiguration();
 http_config.setSecureScheme("https");
 http_config.setSecurePort(port_https);

HttpConfiguration https_config = new
HttpConfiguration(http_config);
https_config.addCustomizer(new SecureRequestCustomizer());

ServerConnector https = new ServerConnector(server,
 new SslConnectionFactory(sslContextFactory,"http/1.1"),
 new HttpConnectionFactory(https_config));

https.setPort(port_https);
sslContextFactory.setKeyStorePath(keystore);

sslContextFactory.setKeyStorePassword(keystore_password);
sslContextFactory.setKeyManagerPassword(keymanager_password);

server.setConnectors(new Connector[] { http });
server.addConnector(https);

//
ResourceHandler resourceHandler = new ResourceHandler();
resourceHandler.setDirectoriesListed(true);
resourceHandler.setResourceBase(jetty_server_root);

server.start();
server.join();
}
catch(Exception e) {
e.printStackTrace();
}
}

On Wed, Mar 14, 2018 at 10:44 AM, Joakim Erdfelt  wrote:

> Have you attempted to configure the SSL Cipher Suites on the Jetty server
> side?
>
> If you enable the jetty startup dump you'll see the list of enabled cipher
> suites and protocols that Jetty is running with (including the reason why a
> specific available protocol or cipher suite is disabled).
>
> $ java -jar /path/to/my/jetty-home/start.jar jetty.server.dumpAfterStart=
> true
>
> Example output:
>
>  |   += SslConnectionFactory@51c668e3{SSL->http/1.1} - STARTED
>  |   |   += SslContextFactory@19f040ba[provider=null,keyStore=file://
> /mnt/c/code/jetty/distros/jetty-distribution-9.4.8.
> v20171121/demo-base/etc/keystore,trustStore=file:///
> mnt/c/code/jetty/distros/jetty-distribution-9.4.8.v20171121/demo-base/etc/keystore]
> trustAll=false
>  |   |   +- Protocol Selections
>  |   |   |   +- Enabled (size=3)
>  |   |   |   |   +- TLSv1
>  |   |   |   |   +- TLSv1.1
>  |   |   |   |   +- TLSv1.2
>  |   |   |   +- Disabled (size=2)
>  |   |   |   +- SSLv2Hello - ConfigExcluded:'SSLv2Hello'
>  |   |   |   +- SSLv3 - JreDisabled:java.security,
> ConfigExcluded:'SSLv3'
>  |   |   +- Cipher Suite Selections
>  |   |   +- Enabled (size=29)
>  |   |   |   +- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
>  |   |   |   +- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
>  |   |   |   +- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
>  |   |   |   +- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
>  |   |   |   +- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
>  |   |   |   +- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
>  |   |   |   +- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
>  |   |   |   +- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
>  |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
>  |   |   |   +- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
>  |   |   |   +- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
>  |   |   |   +- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
>  |   |   |   +- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
>  |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
>  |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
>  |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
>  |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
>  |   |   |   +- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
>  |   |   |   +- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
>  |   |   |   +- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
>  |   |   |   +- TLS_ECDH_RSA_WIT

Re: [jetty-users] keystore

2018-03-14 Thread Joakim Erdfelt
Have you attempted to configure the SSL Cipher Suites on the Jetty server
side?

If you enable the jetty startup dump you'll see the list of enabled cipher
suites and protocols that Jetty is running with (including the reason why a
specific available protocol or cipher suite is disabled).

$ java -jar /path/to/my/jetty-home/start.jar
jetty.server.dumpAfterStart=true

Example output:

 |   += SslConnectionFactory@51c668e3{SSL->http/1.1} - STARTED
 |   |   += 
SslContextFactory@19f040ba[provider=null,keyStore=file:///mnt/c/code/jetty/distros/jetty-distribution-9.4.8.v20171121/demo-base/etc/keystore,trustStore=file:///mnt/c/code/jetty/distros/jetty-distribution-9.4.8.v20171121/demo-base/etc/keystore]
trustAll=false
 |   |   +- Protocol Selections
 |   |   |   +- Enabled (size=3)
 |   |   |   |   +- TLSv1
 |   |   |   |   +- TLSv1.1
 |   |   |   |   +- TLSv1.2
 |   |   |   +- Disabled (size=2)
 |   |   |   +- SSLv2Hello - ConfigExcluded:'SSLv2Hello'
 |   |   |   +- SSLv3 - JreDisabled:java.security,
ConfigExcluded:'SSLv3'
 |   |   +- Cipher Suite Selections
 |   |   +- Enabled (size=29)
 |   |   |   +- TLS_DHE_DSS_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_DHE_DSS_WITH_AES_256_CBC_SHA256
 |   |   |   +- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384
 |   |   |   +- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
 |   |   |   +- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
 |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
 |   |   |   +- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
 |   |   |   +- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
 |   |   |   +- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
 |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384
 |   |   |   +- TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384
 |   |   |   +- TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384
 |   |   |   +- TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384
 |   |   |   +- TLS_EMPTY_RENEGOTIATION_INFO_SCSV
 |   |   |   +- TLS_RSA_WITH_AES_128_CBC_SHA256
 |   |   |   +- TLS_RSA_WITH_AES_128_GCM_SHA256
 |   |   |   +- TLS_RSA_WITH_AES_256_CBC_SHA256
 |   |   |   +- TLS_RSA_WITH_AES_256_GCM_SHA384
 |   |   +- Disabled (size=53)
 |   |   +- SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DHE_DSS_WITH_DES_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DHE_RSA_WITH_DES_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DH_anon_WITH_3DES_EDE_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_DH_anon_WITH_DES_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_RSA_EXPORT_WITH_DES40_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_RSA_WITH_3DES_EDE_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_RSA_WITH_DES_CBC_SHA -
JreDisabled:java.security, ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_RSA_WITH_NULL_MD5 - JreDisabled:java.security,
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- SSL_RSA_WITH_NULL_SHA - JreDisabled:java.security,
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- TLS_DHE_DSS_WITH_AES_128_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- TLS_DHE_DSS_WITH_AES_256_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- TLS_DHE_RSA_WITH_AES_128_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- TLS_DHE_RSA_WITH_AES_256_CBC_SHA -
ConfigExcluded:'^.*_(MD5|SHA|SHA1)$'
 |   |   +- TLS_DH_anon_WITH_AES_12

Re: [jetty-users] keystore

2018-03-14 Thread Lou DeGenaro
Still having (likely user error) issues with SSL.  I generate my keystore
thus:

/share/jdk1.8/bin/keytool -genkey -noprompt -alias jetty -dname "CN=my.cn,
OU=my.ou, O=my.o, L=my.l, S=my.s, C=my.c" -keyalg RSA -keysize 2048 -sigalg
SHA256withRSA -validity 1 -keystore /home/webserver/etc/keystore
-storepass uE9RVnqAXAh -keypass uE9RVnqAXAh

I run jetty 9.4.8 with java 1.8 and the keystore.

I visit https:/myhost:8443/ using Firefox 52.4.0 (64-bit) and my windows
displays: Secure Connection Failed Error code: SSL_ERROR_NO_CYPHER_OVERLAP

Thanks for your advise.

Lou.

On Mon, Mar 12, 2018 at 2:03 AM, Greg Wilkins  wrote:

> Any jetty.keystore.password is not set anywhere? if it is set, is it set
> to your password?
> Try hard coding it in the XML to debug before playing with parameters.
>
> cheers
>
>
> On 11 March 2018 at 06:48, Lou DeGenaro  wrote:
>
>> yep.
>>
>> On Sat, Mar 10, 2018 at 12:59 PM, John English 
>> wrote:
>>
>>> On 10/03/2018 16:15, Lou DeGenaro wrote:
>>>
 >>> default="my-password"/>
 >>> default="my-password"/>

>>>
>>> The keystore password and truststore password are really the same? Are
>>> you sure?
>>>
>>> --
>>> John English
>>> ___
>>> jetty-users mailing list
>>> jetty-users@eclipse.org
>>> To change your delivery options, retrieve your password, or unsubscribe
>>> from this list, visit
>>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>>
>>
>>
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
>
> --
> Greg Wilkins  CTO http://webtide.com
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-11 Thread Greg Wilkins
Any jetty.keystore.password is not set anywhere? if it is set, is it set to
your password?
Try hard coding it in the XML to debug before playing with parameters.

cheers


On 11 March 2018 at 06:48, Lou DeGenaro  wrote:

> yep.
>
> On Sat, Mar 10, 2018 at 12:59 PM, John English 
> wrote:
>
>> On 10/03/2018 16:15, Lou DeGenaro wrote:
>>
>>> >> default="my-password"/>
>>> >> default="my-password"/>
>>>
>>
>> The keystore password and truststore password are really the same? Are
>> you sure?
>>
>> --
>> John English
>> ___
>> jetty-users mailing list
>> jetty-users@eclipse.org
>> To change your delivery options, retrieve your password, or unsubscribe
>> from this list, visit
>> https://dev.eclipse.org/mailman/listinfo/jetty-users
>>
>
>
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>



-- 
Greg Wilkins  CTO http://webtide.com
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-10 Thread Lou DeGenaro
yep.

On Sat, Mar 10, 2018 at 12:59 PM, John English 
wrote:

> On 10/03/2018 16:15, Lou DeGenaro wrote:
>
>> > default="my-password"/>
>> > default="my-password"/>
>>
>
> The keystore password and truststore password are really the same? Are you
> sure?
>
> --
> John English
> ___
> jetty-users mailing list
> jetty-users@eclipse.org
> To change your delivery options, retrieve your password, or unsubscribe
> from this list, visit
> https://dev.eclipse.org/mailman/listinfo/jetty-users
>
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users

Re: [jetty-users] keystore

2018-03-10 Thread John English

On 10/03/2018 16:15, Lou DeGenaro wrote:
default="my-password"/>
name="jetty.truststore.password" default="my-password"/>


The keystore password and truststore password are really the same? Are 
you sure?


--
John English
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users


[jetty-users] keystore

2018-03-10 Thread Lou DeGenaro
I've downloaded jetty 9.2.13 (yes, we will move on to something better
soon).

I made one small change to jetty-https.xml replacing 433 with 8443 for the
secure port.  I create a small test webapp:

webapps/test/index.html

Hello World!


I launch this vanilla and otherwise unadulterated jetty thus:

> java -jar start.jar -Dorg.eclipse.jetty.LEVEL=DEBUG

Using my FF browser I visit https://myhost:8443/test/ and after adding an
exception for an "Insecure Connection" I see: Hello World!

Great.

Now comes the part I don't understand (somewhat naive ssl user here).

I have a keystore and password that is working fine for an embedded jetty
(also 9.2.13) in another application.  Works fine for https with the same
"Insecure Connection" due to self-signed cert.

I take the keystore from my application and put in into /etc of the vanilla
jetty 9.2.13. And I take the password from my application and put in into
jetty-ssl.xml thus:




When I launch the jetty server the same way:

> java -jar start.jar -Dorg.eclipse.jetty.LEVEL=DEBUG

I get:

2018-03-10 09:12:19.794:WARN:oejuc.AbstractLifeCycle:main: FAILED
SslContextFactory@2a3046da(/home/degenaro/test/jetty-distribution-9.2.13.v20150730/etc/keystore,/home/degenaro/test/jetty-distribution-9.2.13.v20150730/etc/keystore):
java.io.IOException: Keystore was tampered with, or password was incorrect
java.io.IOException: Keystore was tampered with, or password was incorrect
at sun.security.provider.JavaKeyStore.engineLoad(JavaKeyStore.java:780)
at
sun.security.provider.JavaKeyStore$JKS.engineLoad(JavaKeyStore.java:56)
at
sun.security.provider.KeyStoreDelegator.engineLoad(KeyStoreDelegator.java:224)
at
sun.security.provider.JavaKeyStore$DualFormatJKS.engineLoad(JavaKeyStore.java:70)
at java.security.KeyStore.load(KeyStore.java:1445)

Certainly user error, but what have I done wrong??

Thanks.

Lou.
___
jetty-users mailing list
jetty-users@eclipse.org
To change your delivery options, retrieve your password, or unsubscribe from 
this list, visit
https://dev.eclipse.org/mailman/listinfo/jetty-users