-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Jason,

On 1/21/15 4:29 AM, Jason Y wrote:
> Here is what I get with openssl s_client command:
> 
> Loading 'screen' into random state - done CONNECTED(000001E8) write
> to 0x2103650 [0x2103698] (124 bytes => 124 (0x7C)) 0000 - 80 7a 01
> 03 01 00 51 00-00 00 20 00 00 39 00 00   .z....Q... ..9.. 0010 - 38
> 00 00 35 00 00 16 00-00 13 00 00 0a 07 00 c0   8..5............ 
> 0020 - 00 00 33 00 00 32 00 00-2f 00 00 07 05 00 80 03
> ..3..2../....... 0030 - 00 80 00 00 05 00 00 04-01 00 80 00 00 15
> 00 00   ................ 0040 - 12 00 00 09 06 00 40 00-00 14 00 00
> 11 00 00 08   ......@......... 0050 - 00 00 06 04 00 80 00 00-03 02
> 00 80 2b 20 ff a2   ............+ .. 0060 - dc 75 81 67 91 ff 8a
> 7e-8e 37 ed ac f6 97 0e 83   .u.g...~.7...... 0070 - 66 46 8c 87 b8
> 1c b3 0a-7e 46 72 30               fF......~Fr0 read from 0x2103650
> [0x2108bf8] (7 bytes => 7 (0x7)) 0000 - 15 03 01 00 02 02 28
> ......( 13756:error:14077410:SSL
> routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake
> failure:.\ssl\s23_clnt.c:596:

Use this:

$ openssl s_client -tls1 -connect host:port

If you want to be able to handle SSL2/3 handshakes, then you will want
to enable SSLv2hello using the "sslProtocolsEnabled" attribute, like this:

<Connector [...]
   sslProtocol="TLS"
   sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1,SSLv2hello"
   />

- -chris

> On Wed, Jan 21, 2015 at 4:49 PM, Sanaullah <sanaulla...@gmail.com>
> wrote:
> 
>> then may be its not the issue of tomcat.you can check you
>> firewall? may be your firewall dropping the correction after some
>> time.
>> 
>> try to connect the server from localhost using " openssl s_client
>> -connect hostname:8443 -debug " may be you will found something
>> use full.
>> 
>> On Wed, Jan 21, 2015 at 11:43 AM, Jason Y <day...@gmail.com>
>> wrote:
>> 
>>> Got another issue...Tomcat is working fine after restart but it
>>> cannot
>> last
>>> long. Now I cannot access https pages with any browsers. I
>>> didn't find anything useful in logs. After a restart, it works
>>> well again.
>>> 
>>> <Connector executor="tomcatThreadPool" port="8080"
>>> protocol="HTTP/1.1" connectionTimeout="20000" 
>>> redirectPort="8443" /> <Connector port="8443"
>>> protocol="org.apache.coyote.http11.Http11Protocol" 
>>> maxThreads="150" SSLEnabled="true" scheme="https" 
>>> secure="true" clientAuth="false" sslProtocol="TLS" 
>>> sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1" 
>>> keystoreFile="lib/cert/xxxx.keystore" keystorePass="xxxx" /> 
>>> <!-- Define an AJP 1.3 Connector on port 8009 --> <Connector
>>> port="8009" protocol="AJP/1.3" redirectPort="8443" />
>>> 
>>> On Wed, Jan 21, 2015 at 10:01 AM, Sanaullah
>>> <sanaulla...@gmail.com>
>> wrote:
>>> 
>>>> its not necessary to have ciphers properties but if you want
>>>> to
>> restrict
>>>> the ciphers then you can use this property.
>>>> 
>>>> On Wed, Jan 21, 2015 at 6:53 AM, Jason Y <day...@gmail.com>
>>>> wrote:
>>>> 
>>>>> Thank you all. Now it is working fine.
>>>>> 
>>>>> <Connector port="8443"
>>> protocol="org.apache.coyote.http11.Http11Protocol"
>>>>> maxThreads="150" SSLEnabled="true" scheme="https" 
>>>>> secure="true" clientAuth="false" sslProtocol="TLS" 
>>>>> sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1" 
>>>>> keystoreFile="lib/cert/xxxx.keystore" keystorePass="xxxx" 
>>>>> ciphers="TLS_RSA_WITH_AES_128_CBC_SHA, 
>>>>> TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
>>>>> TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
>> />
>>>>> 
>>>>> By the way, do I need "ciphers" properties here?
>>>>> 
>>>>> On Tue, Jan 20, 2015 at 11:22 PM, Christopher Schultz < 
>>>>> ch...@christopherschultz.net> wrote:
>>>>> 
> Jason,
> 
> On 1/20/15 4:17 AM, Jason Y wrote:
>>>>>>>> Recently my application cannot be accessible in
>>>>>>>> browser with
>>> https
>>>>>>>> version. I think it is due to vulnerability in ssl
>>>>>>>> 3.0 issue.
>>>>>>>> 
>>>>>>>> I checked my tomcat configuration and replaced
>>>>>>>> sslProtocol="TLS" with
>>>>>>>> sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2" to
>>>>>>>> disable SSL 3.0.
>>>>>>>> 
>>>>>>>> <Connector port="8080" protocol="HTTP/1.1" 
>>>>>>>> connectionTimeout="20000" redirectPort="8443" />
>>>>>>>> <Connector port="8443"
>>>>>>>> protocol="org.apache.coyote.http11.Http11Protocol" 
>>>>>>>> maxThreads="150" SSLEnabled="true" scheme="https"
>>>>>>>> secure="true" clientAuth="false"
>>>>>>>> sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2" 
>>>>>>>> keystoreFile="xxx" keystorePass="xxx" /> <Connector
>>>>>>>> port="8009" protocol="AJP/1.3" redirectPort="8443"
>>>>>>>> />
> 
> None of the responses you have gotten thus far are useful in any
>>> way.
> 
> Your configuration looks fine to me: sslEnabledProtocols is the
> way
>>>> to
> go, although in recent versions of Tomcat the default is NOT to 
> include any "SSL" protocols and only use the "TLS" ones, so if you
>>>> are
> running something recent, you should be okay.
> 
>>>>>>>> Then I can open my application https link in browser.
>>>>>>>> BUT, good time never lasts too long, after several
>>>>>>>> hours, I failed to
>>> access
>>>>>>>> my https link again.
> 
> What kinds of errors do you get? What do the logs say? What are
> the URLs you are using?
> 
>>>>>>>> Anyone has any ideas about this? please share your
>>> suggestions...My
>>>>>>>> tomcat version is 7.0.55
> 
> Those SSL/TLS defaults I mentioned above were done in 7.0.57, so
>>> you
> should definitely keep your above configuration. There is no need
>>> to
> add a trust store or cipher specification to that.
> 
> -chris
>>>>>> 
>>>>>> 
>> ---------------------------------------------------------------------
>>>>>>
>> 
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
>>>>>> For additional commands, e-mail:
>>>>>> users-h...@tomcat.apache.org
>>>>>> 
>>>>>> 
>>>>> 
>>>> 
>>> 
>> 
> 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: GPGTools - http://gpgtools.org

iQIcBAEBCAAGBQJUv77ZAAoJEBzwKT+lPKRYgXEP/2qs2LbTwlfZ2J0kg8r5aWQi
LHsQZUo8PjE7eH97DtDoDB5rVMPKk3wj0w38o3KCnxN1LQY44k6/11Vp8PqotRQ9
loLJKgogYo+Rkfherb2WJqC8wS/K9aAzyNFO49kRkjAKunoWbdyyNXAXcRA/LS2v
FG4pGgZZp3ITWuVuD7pcoHfYHRHJ6AlMGvHISkKiU6uiV4sy9S5HiHEcc4KW7PQt
q9LNxKkPylf1N/AH4IZ/GJQycrLHxJLbj+oK4vG7ofFBxgsAOu/WLcepGEwEv2zr
8BHBSd4mSMauAP7x12IiPjzv7D04PXUKKx7YLJm1k2yjF099QyZok3n5AlF/iX+8
n5pTtv0GpI7nU63ua2wg2Xu7V+V9FxJvChbeVvK921NJRE0Db4cdtOYk5XZOiy6O
x8/9srw8UcDGanPqMXi9W1sUyV4D/t8F5W5moQJ+avxRInUlA4ORBGjRg4F+nZIB
HbQPHg6H3HvATr47LzAdXMC4DGI3cCmP9cef1AxMlGp3D6R/lrkkTf2AIt05zyOF
8IuxH2YIi1zekI/kDNQeDry9FmkWlXk6taYjzk67F4mIdtopOkMen2eNz3fEnehT
5sXqOSfx8vRB3YC6n9oH1rTPf4QPweVUiJ8Zx5HGHFAi4zNbUWor1xvRxgNc6ZFg
Q+zWfPkPmpeo4CTlQqIk
=WGjm
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to