Il giorno gio, 14/02/2013 alle 11.38 -0500, Christopher Schultz ha
scritto:
[...]
> > Tomcat version is the one shipped with Debian, and uses jdk
> > 1.6.0_u39 with jce unrestricted policy. I also added bouncy castle
> > jar in $JAVA_HOME/jre/lib/ext and added its provider in 
> > $JAVA_HOME/jre/lib/security/java.security as last in the provider
> > list. After restarting tomcat nothing changed.
> 
> Did you add Bouncy Castle just to see if it would improve things? Or
> are you attempting to use Bouncy Castle as your provider?

I added it in oder to add moe ciphes. I don't even know if this new
povider is used at all. The only step I did are the one listed above.

[...] 
> > <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true" 
> > maxThreads="150" scheme="https" secure="true" clientAuth="false" 
> > sslProtocol="TLS" proxyName="www.my-visible-name.tld" 
> > proxyPort="8443" address="192.168.1.55" />
> 
> It's traditional to specify a server key and certificate when
> configuring SSL. Where are yours configured?

I used default values: the keystore in named ".keystore" and is in the
home directory of the user running tomcat. It contains only one key pair
and one certificate, and its password is the standard one.

> > So, my question: how to configure tomcat for accepting a broader
> > range of ciphers, or at least to accept even one of those used by
> > this browser?
> 
> The default cipher suite depends upon your JVM, and is usually fairly
> inclusive. Here's a little program I wrote to find out what your JVM
> will support and what its default cipher suite will be:
> http://markmail.org/message/zn4namfhypyxum23

Right. This is why I added bouncycastle.

Anyway, I just tried the program in the link you supplied. This is its
output:

/tmp# java -showversion SSLInfo
java version "1.6.0_39"
Java(TM) SE Runtime Environment (build 1.6.0_39-b04)
Java HotSpot(TM) 64-Bit Server VM (build 20.14-b01, mixed mode)

Default Cipher
*       SSL_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA
*       SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA
*       SSL_DHE_DSS_WITH_DES_CBC_SHA
*       SSL_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA
*       SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA
*       SSL_DHE_RSA_WITH_DES_CBC_SHA
        SSL_DH_anon_EXPORT_WITH_DES40_CBC_SHA
        SSL_DH_anon_EXPORT_WITH_RC4_40_MD5
        SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
        SSL_DH_anon_WITH_DES_CBC_SHA
        SSL_DH_anon_WITH_RC4_128_MD5
*       SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
*       SSL_RSA_EXPORT_WITH_RC4_40_MD5
*       SSL_RSA_WITH_3DES_EDE_CBC_SHA
*       SSL_RSA_WITH_DES_CBC_SHA
        SSL_RSA_WITH_NULL_MD5
        SSL_RSA_WITH_NULL_SHA
*       SSL_RSA_WITH_RC4_128_MD5
*       SSL_RSA_WITH_RC4_128_SHA
*       TLS_DHE_DSS_WITH_AES_128_CBC_SHA
*       TLS_DHE_DSS_WITH_AES_256_CBC_SHA
*       TLS_DHE_RSA_WITH_AES_128_CBC_SHA
*       TLS_DHE_RSA_WITH_AES_256_CBC_SHA
        TLS_DH_anon_WITH_AES_128_CBC_SHA
        TLS_DH_anon_WITH_AES_256_CBC_SHA
*       TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
*       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
*       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
        TLS_ECDHE_ECDSA_WITH_NULL_SHA
*       TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
*       TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
*       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
*       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
        TLS_ECDHE_RSA_WITH_NULL_SHA
*       TLS_ECDHE_RSA_WITH_RC4_128_SHA
*       TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
*       TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
*       TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
        TLS_ECDH_ECDSA_WITH_NULL_SHA
*       TLS_ECDH_ECDSA_WITH_RC4_128_SHA
*       TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
*       TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
*       TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
        TLS_ECDH_RSA_WITH_NULL_SHA
*       TLS_ECDH_RSA_WITH_RC4_128_SHA
        TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
        TLS_ECDH_anon_WITH_AES_128_CBC_SHA
        TLS_ECDH_anon_WITH_AES_256_CBC_SHA
        TLS_ECDH_anon_WITH_NULL_SHA
        TLS_ECDH_anon_WITH_RC4_128_SHA
*       TLS_EMPTY_RENEGOTIATION_INFO_SCSV
        TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5
        TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA
        TLS_KRB5_EXPORT_WITH_RC4_40_MD5
        TLS_KRB5_EXPORT_WITH_RC4_40_SHA
        TLS_KRB5_WITH_3DES_EDE_CBC_MD5
        TLS_KRB5_WITH_3DES_EDE_CBC_SHA
        TLS_KRB5_WITH_DES_CBC_MD5
        TLS_KRB5_WITH_DES_CBC_SHA
        TLS_KRB5_WITH_RC4_128_MD5
        TLS_KRB5_WITH_RC4_128_SHA
*       TLS_RSA_WITH_AES_128_CBC_SHA
*       TLS_RSA_WITH_AES_256_CBC_SHA

If I run it after removing the bouncy castle provider, this list become
short. The diff is about ciphers that iPad does not use, so I think I
may remove bouncy castle at all:

< *     TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA
< *     TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
< *     TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
<       TLS_ECDHE_ECDSA_WITH_NULL_SHA
< *     TLS_ECDHE_ECDSA_WITH_RC4_128_SHA
< *     TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA
< *     TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
< *     TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
<       TLS_ECDHE_RSA_WITH_NULL_SHA
< *     TLS_ECDHE_RSA_WITH_RC4_128_SHA
< *     TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA
< *     TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA
< *     TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA
<       TLS_ECDH_ECDSA_WITH_NULL_SHA
< *     TLS_ECDH_ECDSA_WITH_RC4_128_SHA
< *     TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA
< *     TLS_ECDH_RSA_WITH_AES_128_CBC_SHA
< *     TLS_ECDH_RSA_WITH_AES_256_CBC_SHA
<       TLS_ECDH_RSA_WITH_NULL_SHA
< *     TLS_ECDH_RSA_WITH_RC4_128_SHA
<       TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA
<       TLS_ECDH_anon_WITH_AES_128_CBC_SHA
<       TLS_ECDH_anon_WITH_AES_256_CBC_SHA
<       TLS_ECDH_anon_WITH_NULL_SHA
<       TLS_ECDH_anon_WITH_RC4_128_SHA

Thanks,
Giuseppe

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to