-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Sverre,

On 5/26/14, 5:42 AM, Sverre Moe wrote:
>> Latest versions of Firefox and Chrome (and others I suspect) use
>> GCM
> ciphers (gmail seems to prefer them for example). Yes, but it only
> supports AES_128_GCM_SHA256. No Chromium support for
> AES_256_GCM_SHA384. Neither does it support SHA256/SHA384 for
> AES_X_CBC.
> 
>> You don’t have to accept the default ciphers, or ordering. Check
>> the docs for the HTTP connector to see how to configure this.
> 
> If one use the APR Connector with OpenSSL and sets
> SSLHonorCipherOrder, but the JSSE Connector does not have such a
> parameter.

Right: JSSE doesn't support server-preferred cipher ordering, but the
cipher order in Java 7 looks reasonable to me:
http://docs.oracle.com/javase/7/docs/technotes/guides/security/SunProviders.html#SupportedCipherSuites

Unfortunately, explicitly setting the server's preferred cipher order
requires the use of Java 8:
http://docs.oracle.com/javase/8/docs/technotes/guides/security/enhancements-8.html
(See the final bullet point on that page)

There's a bug to support this in Bugzilla:
https://issues.apache.org/bugzilla/show_bug.cgi?id=55988

Vote for the bug if you want it fixed. ;)

> I realize I didn't specify that in my original post, but I need to 
> use JSSE since I am running SLES (which has an old version of 
> OpenSSL).

How old? 0.9.8 is okay, but has fewer ciphers and does not support TLS
1.2. As a bonus, it never had heartbeat support ;)

- -chris

> 2014-05-26 11:25 GMT+02:00 Tim Whittington <t...@apache.org>:
> 
>> 
>> On 26/05/2014, at 6:58 pm, Sverre Moe <sverre....@gmail.com>
>> wrote:
>> 
>>>> Documentation aside, none of these cipher-suites are
>>>> supported in Oracle
>>> Java 7. The AES_CBC ciphers I had there are supported in Java
>>> 7.
>>> 
>>> I have already concluded as much regarding the AES_x_GCM. Using
>>> Java 8
>> one
>>> have access to these higher GCM ciphers, but only very few
>>> obscure
>> browsers
>>> supports them. Therefore neither AES_256_GCM nor SHA384 can be
>>> used yet.
>>> 
>> 
>> Latest versions of Firefox and Chrome (and others I suspect) use
>> GCM ciphers (gmail seems to prefer them for example).
>> 
>>> Also because of the the JSSE cipher ordering it will always
>>> choose AES_x_CBC instead over AES_x_GCM if both are in the
>>> Connector cipher
>> list.
>>> See table: Default Enabled Cipher Suites
>>> 
>> http://docs.oracle.com/javase/8/docs/technotes/guides/security/SunProviders.html#SunJSSEProvider
>>>
>> 
Same ordering you get from getDefaultCipherSuites();
>>> 
>> 
>> You don’t have to accept the default ciphers, or ordering. Check
>> the docs for the HTTP connector to see how to configure this.
>> 
>> 
>> tim 
>> ---------------------------------------------------------------------
>>
>> 
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>> For additional commands, e-mail: users-h...@tomcat.apache.org
>> 
>> 
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
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=DWt5
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to