You can disable the protocols at the java level in the java.security file jdk.tls.disabledAlgorithms=SSLv3, RC4, MD5withRSA, DH keySize < 768, TLSv1, TLSv1.1
On Wed, Aug 10, 2022 at 5:09 AM Thomas Hoffmann (Speed4Trade GmbH) <thomas.hoffm...@speed4trade.com.invalid> wrote: > Hello Peter, > > > -----Ursprüngliche Nachricht----- > > Von: logo <l...@kreuser.name> > > Gesendet: Mittwoch, 10. August 2022 10:22 > > An: Tomcat Users List <users@tomcat.apache.org> > > Betreff: Re: AW: SSLLabs scan shows TLSv1.0 and TLSv1.1 even though I > have > > sslProtocol="TLSv1.2" > > > > Thomas, > > > > Am 2022-08-10 08:59, schrieb Thomas Hoffmann (Speed4Trade GmbH): > > > Hello, > > > > > >> -----Ursprüngliche Nachricht----- > > >> Von: Peter Kreuser <l...@kreuser.name> > > >> Gesendet: Mittwoch, 10. August 2022 08:44 > > >> An: Tomcat Users List <users@tomcat.apache.org> > > >> Betreff: Re: SSLLabs scan shows TLSv1.0 and TLSv1.1 even though I > > >> have sslProtocol="TLSv1.2" > > >> > > >> > > >> > > >> James, > > >> > > >> the most recent connector attribute is "protocols". The documentation > > >> is a bit vague on this saying there is an overlap between the two, > > >> yet I don't know if the overlap is there if protocols is unset and > > >> defaults to "all".... > > >> https://tomcat.apache.org/tomcat-8.5-doc/config/http.html#SSL_Support > > >> > > >> Peter > > >> > > >> > Am 10.08.2022 um 00:15 schrieb James H. H. Lampert > > >> <jam...@touchtonecorp.com.invalid>: > > >> > > > >> > I think this may have come up before, but I don't recall how it was > > resolved. > > >> > > > >> > On customer box #1, I have: > > >> > <Connector port="443" > > protocol="org.apache.coyote.http11.Http11Protocol" > > >> address="<REDACTED>" > > >> > maxThreads="400" SSLEnabled="true" scheme="https" > > secure="true" > > >> > keystoreFile="<REDACTED>/tomcat/wttomcat.ks" > > >> keyAlias="<REDACTED>" > > >> > > > >> > > ciphers="TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WI > > >> > > TH_AES_128_GCM_SHA256,SSL_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384" > > >> > clientAuth="false" sslProtocol="TLSv1.2" /> > > >> > > > >> > and an SSLLabs scan shows it accepting only TLSv1.2, as it should. > > >> > > > >> > But on customer box #2, I have: > > >> > > > >> > <Connector port="443" > > protocol="org.apache.coyote.http11.Http11Protocol" > > >> > maxThreads="150" SSLEnabled="true" scheme="https" > > secure="true" > > >> > keystoreFile="<REDACTED>/tomcat/wttomcat.ks" > > >> keyAlias="<REDACTED>" > > >> > clientAuth="false" sslProtocol="TLSv1.2" /> > > >> > > > >> > and an SSLLabs scan shows it accepting TLSv1.0, TLSv1.1, and > TLSv1.2. > > >> > > > >> > What could be wrong here? I vaguely recall seeing something like > this > > before. > > >> > > > >> > -- > > >> > JHHL > > >> > > > >> > ------------------------------------------------------------------- > > >> > -- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > > >> > For additional commands, e-mail: users-h...@tomcat.apache.org > > >> > > > > > > > I have configured my connector as follows: > > > <Connector port="443" > > > protocol="org.apache.coyote.http11.Http11NioProtocol" > > > > > > > > sslImplementationName="org.apache.tomcat.util.net.openssl.OpenSSLImpleme > > ntation" > > > maxThreads="150" minSpareThreads="25" > > > URIEncoding="UTF-8" useBodyEncodingForURI="false" > > > enableLookups="false" disableUploadTimeout="true" > > > acceptCount="100" scheme="https" secure="true" > > > SSLEnabled="true" > > > compression="off" > > > > <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" > > /> > > > <SSLHostConfig > > > ciphers="ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM- > > SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM- > > SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20- > > POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384" > > > disableSessionTickets="true" > > honorCipherOrder="false" > > > protocols="+TLSv1.2,+TLSv1.3"> > > > <Certificate certificateKeyFile="../xx.key" > > > certificateFile="../xx.pem" type="RSA" /> > > > </SSLHostConfig> > > > </Connector> > > > > > > This gives a good grade when checking with ssllabs. > > > Only TLS 1.2 and 1.3 are enabled. > > > > > > > of course SSLHostConfig is the modern and preferred way. But unless you > have > > plenty of time, it's a hassle to migrate many boxes to the new way... > > > > Peter > > > > > Greetins, Thomas > > > > > The attributes are quite similar or the same, just located at other > xml-elements, so you can still use the attributes like "protocols" or > "ciphers". > Just located at different tags. > > Sooner or later the old syntax will get deprecated. So it's usually a > matter of time when you have the hassle ;) > > Greetings, Thomas > > --------------------------------------------------------------------- > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > For additional commands, e-mail: users-h...@tomcat.apache.org > -- Thanks, Brian Wolfe https://www.linkedin.com/in/brian-wolfe-3136425a/