James,

On 12/19/24 11:15 PM, James Lampert wrote:
This afternoon, I was doing a routine certificate update for a
customer (cert in a Java Keystore), and when I restarted, Firefox
worked just fine with the site, but Chrome kept insisting it couldn't
negotiate a cipher.

What cipher suite did Firefox successfully negotiate?

The customer in question is still on Tomcat 7, because for some reason
(maybe having to do with the IBM Midrange box it's running on is
WAAayyyy behind on PTFs). I shut them down, swapped in the new
keystore (which I already had pre-staged), and I promptly discovered
that I'd used a different alias for the cert.

So I went into server.xml, found the connector, and removed the
keyAlias clause completely: after all, there's only one chain in the
keystore, and we've had plenty of connectors that work just fine with
no keyAlias clause.

This one didn't. It came back up, and it worked fine with Firefox and
Safari, but Chrome kept insisting that it couldn't negotiate a cipher.
I looked at it in SSLlabs, and everything looked just fine.

I switched it back to the old keystore, and Chrome still rejected it,
with the same claim.

Finally, I put the keyAlias clause back in, restarted, and it worked
just fine with Chrome. So I shut it back down, switched to the new
keystore, plugged the new alias into the keyAlias clause, and brought
it back up, and it still worked just fine.

When you got Chrome working again, which cipher suite did it successfully negotiate? If you try in this configuration with Firefox, which cipher suite is successfully negotiated?

What does SSLLabs say for each of the two configurations in terms of supported cipher suites?

Do the keys used in both cases have similar qualities (e.g. key type RSA-vs-EC, same bit count, and same-curve for EC)?

I've added a note (in large, boldface, cranberry type) to the
customer's records, saying to always have a keyAlias clause, but I'm
still left with one nagging question:

What the <censored> just happened?

Tomcat needs to select the right key and cert from the keystore so if that's wrong things won't work. But the way you describe them not-working is odd. Typically, if Tomcat can't find the key+cert, the connector will simply fail to initialize and you won't be able to connect to it AT ALL.

-chris


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to