Re: [openssl-users] libssl.so.1.0.0 -> Java1.6 net.ssl gives: dh key too small:s3_clnt.c:3617:

2016-08-25 Thread Porter, Andrew
There may be other solutions but here are two I've used:

(1) Upgrade the Java the server uses to a recent Java 8. It should run fine. 
The product I work in is built with the Java 6 development kit but runs without 
any problems on Java 6 - 8.

(2) Update the server Java 6 to the latest version of 6 with security updates. 
This is NOT publicly available but is available under support from Oracle. If 
the server is running on Red Hat Enterprise Linux and has support you are able 
to get the latest Java 6 through Red Hat by adding a special subscription 
channel and using the standard system update tools to install/update Oracle 
Java. Don't know about other operating systems.

Andrew

-Original Message-
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Matthias Apitz
Sent: Thursday, August 25, 2016 07:22
To: openssl-users@openssl.org
Subject: [openssl-users] libssl.so.1.0.0 -> Java1.6 net.ssl gives: dh key too 
small:s3_clnt.c:3617:


Hello,

We have a C written OpenSSL application which talks to a server written in 
Java1.6. The client side (i.e. OpenSSL) rejects connecting with the
error:

25.08.2016-10:58:06 Error - SSL_connect() returned:<-1> - connection failed
25.08.2016-10:58:06 SSL_get_error() returned SSL_ERROR_SSL, 
ERR_print_errors_fp():
4087322300:error:14082174:SSL routines:ssl3_check_cert_and_algorithm:dh key too 
small:s3_clnt.c:3617:

I read in Don Google that is due to a stronger check in OpenSSL since somewhere 
in September 2015. The problem is of course with the old Java 1.6 server and 
does not show up when we talk to a newer version of our server runninng on 
Java1.8. It works also with 1.6 when I use on the C side some older shared lib 
libssl.so.1.0.0 from Januar 2015, i.e. it seems exactly the bug as described in 
https://urldefense.proofpoint.com/v2/url?u=https-3A__groups.google.com_forum_-23-21topic_ganeti_ds0TwfroS8A=CwIGaQ=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E=rM-xapYCunnmjke6suxLaVU8krc3wfCZvRQxfT87RRc=zyF1KGGEdIw5t8MZBZhZYjK_goSnyFnKtB2cxUvFm5Q=9It2fqYqL0MrbGps6_nQksmKlroixvU1_OGDrUFtrWQ=
  :

The used keystore is generated with the Java keytool. It does not help generate 
the keystore with Java1.8 keytool and use this in the Java1.6 server.

Is there some workaround?

Thanks

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ 
https://urldefense.proofpoint.com/v2/url?u=http-3A__www.unixarea.de_=CwIGaQ=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E=rM-xapYCunnmjke6suxLaVU8krc3wfCZvRQxfT87RRc=zyF1KGGEdIw5t8MZBZhZYjK_goSnyFnKtB2cxUvFm5Q=G05u61yon8Fp-9mwaRO2ujd87dFGPboM4uGXo7IhMIU=
   ☎ +49-176-38902045
--
openssl-users mailing list
To unsubscribe: 
https://urldefense.proofpoint.com/v2/url?u=https-3A__mta.openssl.org_mailman_listinfo_openssl-2Dusers=CwIGaQ=UrUhmHsiTVT5qkaA4d_oSzcamb9hmamiCDMzBAEwC7E=rM-xapYCunnmjke6suxLaVU8krc3wfCZvRQxfT87RRc=zyF1KGGEdIw5t8MZBZhZYjK_goSnyFnKtB2cxUvFm5Q=bXIMkT6q0xTjcZ6C6_6c9QRue1Na6iyGeDZ20yqzgMo=
 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] libssl.so.1.0.0 -> Java1.6 net.ssl gives: dh key too small:s3_clnt.c:3617:

2016-08-25 Thread Jakob Bohm

On 25/08/2016 16:21, Matthias Apitz wrote:

Hello,

We have a C written OpenSSL application which talks to a server written
in Java1.6. The client side (i.e. OpenSSL) rejects connecting with the
error:

25.08.2016-10:58:06 Error - SSL_connect() returned:<-1> - connection failed
25.08.2016-10:58:06 SSL_get_error() returned SSL_ERROR_SSL, 
ERR_print_errors_fp():
4087322300:error:14082174:SSL routines:ssl3_check_cert_and_algorithm:dh key too 
small:s3_clnt.c:3617:

I read in Don Google that is due to a stronger check in OpenSSL since
somewhere in September 2015. The problem is of course with the old Java 1.6
server and does not show up when we talk to a newer version of our
server runninng on Java1.8. It works also with 1.6 when I use on the C
side some older shared lib libssl.so.1.0.0 from Januar 2015, i.e. it
seems exactly the bug as described in
https://groups.google.com/forum/#!topic/ganeti/ds0TwfroS8A :

The used keystore is generated with the Java keytool. It does not help
generate the keystore with Java1.8 keytool and use this in the Java1.6
server.

Is there some workaround?


According to the information published by Qualsys, Java 1.6
supports DH group parameters (primes) up to 1024 bit.

OpenSSL and other modern clients rejects DH group parameters
smaller than 768 or 1024 bits.

So configuring the Java 1.6 server to use a (brand new, not
shared with other sites) 1024 bit prime in its DH group
parameters should be the best available compromise.

Upgrading to a current version of Java would allow using a
more secure prime size such as 2048 bits or more, but could
involve incompatibilities in other parts of Java.

I don't know how to tell the SSL/TLS code in Java 1.6 to use
specific DH group parameters, or to generate new such
parameters on a regular basis (it's a somewhat slow task, so
should be done in background while incoming connections use
the previous group parameters stored in an on-disk cache of
some kind).

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  https://www.wisemo.com
Transformervej 29, 2860 Søborg, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded

--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] libssl.so.1.0.0 -> Java1.6 net.ssl gives: dh key too small:s3_clnt.c:3617:

2016-08-25 Thread Matthias Apitz

Hello,

We have a C written OpenSSL application which talks to a server written
in Java1.6. The client side (i.e. OpenSSL) rejects connecting with the
error:

25.08.2016-10:58:06 Error - SSL_connect() returned:<-1> - connection failed
25.08.2016-10:58:06 SSL_get_error() returned SSL_ERROR_SSL, 
ERR_print_errors_fp():
4087322300:error:14082174:SSL routines:ssl3_check_cert_and_algorithm:dh key too 
small:s3_clnt.c:3617:

I read in Don Google that is due to a stronger check in OpenSSL since
somewhere in September 2015. The problem is of course with the old Java 1.6
server and does not show up when we talk to a newer version of our
server runninng on Java1.8. It works also with 1.6 when I use on the C
side some older shared lib libssl.so.1.0.0 from Januar 2015, i.e. it
seems exactly the bug as described in
https://groups.google.com/forum/#!topic/ganeti/ds0TwfroS8A :

The used keystore is generated with the Java keytool. It does not help
generate the keystore with Java1.8 keytool and use this in the Java1.6
server.

Is there some workaround?

Thanks

matthias

-- 
Matthias Apitz, ✉ g...@unixarea.de, ⌂ http://www.unixarea.de/  ☎ 
+49-176-38902045
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users