-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Gary,

On 4/27/14, 11:05 PM, Gary Briggs wrote:
> In short: What's the best way to configure ciphers, matching in
> tomcat and openssl, to get widest browser compatability without
> sacrificing security?
> 
> In long: I'm running tomcat with client-certificate authentication
> behind a proxy made by F5 [LTM, "Local Traffic Manager", is the
> specific product].
> 
> The LTM is basically a reverse proxy. You hand it your server's 
> certificate and private keys, then tell it to "do that SSL proxy 
> thing". It conducts a MITM attack; listening, modifying, and
> watching your traffic for sketchy behaviour ["Wait... why is that
> IRC instead of HTTP?"].
> 
> Skeevy as it sounds as I've described it, I've actually so far
> been very happy with it. For example, rather than routing with
> SNAT, the proxy injects an X-Forwarded-For header into the HTTP
> stream; my server cannot even address/route to anything outside,
> but I can still configure tomcat to log the originating address,
> and it's still TLS end-to-end.
> 
> The proxy comes with a default set of ciphers configured which
> resembles openssl cipher string: 
> !SSLv2:!EXPORT:!DH:RSA+RC4:RSA+AES:RSA+DES:RSA+3DES:@SPEED
> 
> I believe this string corresponds to a tomcat cipher
> configuration: TLS_RSA_WITH_RC4_128_SHA, TLS_RSA_WITH_RC4_128_MD5,
> TLS_RSA_EXPORT_WITH_RC4_40_MD5, TLS_RSA_WITH_AES_256_GCM_SHA384,
> TLS_RSA_WITH_AES_256_CBC_SHA256, TLS_RSA_WITH_AES_256_CBC_SHA, 
> TLS_RSA_WITH_AES_128_GCM_SHA256, TLS_RSA_WITH_AES_128_CBC_SHA256,
> TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_DES_CBC_SHA,
> TLS_RSA_EXPORT_WITH_DES40_CBC_SHA, TLS_RSA_WITH_3DES_EDE_CBC_SHA

Something doesn't seem right about the above: you have an EXPORT
cipher in your Tomcat list, but the OpenSSL configuration shouldn't be
using that (due to !EXPORT).

> This works fine with IE9,10 and Chrome. But recent firefox
> versions don't like it, I get the error correspondong to "no cypher
> overlap" [which I presume is missing overlap between firefox and
> tomcat, because when the overlap is missing between tomcat and the
> F5, the F5 just drops the connection]
> 
> I'm using the most recent Tomcat7 release right now, with the
> latest JDK7 release.
> 
> Does anyone have any suggestions as to what set of options will go
> best for me, both in the openssl-based proxy, and in tomcat?

Remember that the client is only contacting the F5 to negotiate the
cipher. The cipher used between LTM and Tomcat is not relevant. You
ought to be able to set the cipher on the Tomcat end to be one
specific thing that you particularly like (and of course that is
supported by LTM) and it will always use that, regardless of what the
client is using.

I'm surprised that LTM has a configuration that does not allow it to
accept connections from recent versions of Firefox. That would seem to
be a serious problem. I know that Firefox 28 can do
SSL_RSA_WITH_RC4_128_SHA (as reported by ff; should be
TLS_RSA_WITH_RC4_128_SHA in Java-speak and RC4-SHA in OpenSSL-speak)
because I can see it connected to such a side using that cipher right
now in a window I've got up.

I agree with Mark: you should use Qualys's tools and perhaps something
like sslscan (freely-downloadable; also available from some some Linux
package-managers) to help figure out what ciphers are actually
available given a particular configuration.

Do you have the ability to modify the LTM's cipher configuration?

- -chris
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=3je8
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to