On Tue, Feb 19, 2013 at 10:59 AM, Giuseppe Sacco
<giuse...@eppesuigoccas.homedns.org> wrote:
[...]

> I listed all providers here:
> http://centrum.lixper.it/~giuseppe/ipad-tomcat-list-ciphers-no-bouncycastle.html
> as you may see, a few of them are TLS_RSA and TLS_DHE:
> *       TLS_RSA_WITH_AES_128_CBC_SHA
> *       TLS_RSA_WITH_AES_256_CBC_SHA
> *       TLS_DHE_DSS_WITH_AES_128_CBC_SHA
> *       TLS_DHE_DSS_WITH_AES_256_CBC_SHA
> *       TLS_DHE_RSA_WITH_AES_128_CBC_SHA
> *       TLS_DHE_RSA_WITH_AES_256_CBC_SHA
>
> They are also listed as "default" ciphers, so -- if I understood what
> default means -- they should not be enabled explicitly.
>
> They overlap with those client ciphers:
> TLS_RSA_WITH_AES_128_CBC_SHA
> TLS_RSA_WITH_AES_256_CBC_SHA
> TLS_DHE_RSA_WITH_AES_128_CBC_SHA
> TLS_DHE_RSA_WITH_AES_256_CBC_SHA
>
> Is there any possibility that some of those server ciphers are disabled
> because of the algorithm used in the server certificate? Its signature
> algorithm is SHA1withDSA. I created it with this command line:
> keytool -genkeypair -alias tomcat -keystore ~tomcat6/.keystore

Yes.
If the server keys are DSA, then only cipher suites using DSS/*DSA
will be negotiated.
In this case, the only DSS cipher suite that your client appears to
support is TLS_DHE_DSS_WITH_NULL_SHA, which isn't supported by Java 6
or 7.

> A side note: is it possibile to put tomcat behind a web server and make
> the latter encrypt in SSL? This would imply that communication between
> the web server and tomcat would be in clear, but how do I  create the
> connector proxy* information? I may specify proxyName and proxyPort, but
> I cannot specify proxyProtocol. Is this right?
>

tim

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to