James,

One more tidbit (perhaps you already saw this). https://www.400power.com/node/323

Sounds a bit like what you are experiencing?

Pete Helgren
www.petesworkshop.com
GIAC Secure Software Programmer-Java
GIAC Cloud Penetration Tester
AWS Certified Cloud Practitioner
Microsoft Certified: Azure Fundamentals

On 1/2/2025 4:34 PM, Christopher Schultz wrote:
James,

On 1/2/25 2:45 PM, James H. H. Lampert wrote:
On 1/2/25 10:38 AM, Christopher Schultz wrote:

Is it possible that you are using a self-signed cert in this case? If you do not import the signed certificate properly into the keystore, you can end up with your private key+cert separate from the signed one from the CA.

If you only have a single item in the keystore, that's not the issue but double-check the Issuer and Subject of the cert. They should be different if you are using a CA -- even if it's an internal CA like My-Company-CA or whatever.

ERR_SSL_VERSION_OR_CIPHER_MISMATCH really suggests Chrome doesn't like the TLS protocol version or can't match a cipher suite but that doesn't jive with your Qualys results. You are hitting this Tomcat instance directly, right? Not through a proxy or anything that might be performing its own TLS handshake that isn't Tomcat?

None of these possibilities explain why Firefox and Qualys/SSLLabs found nothing amiss.

Yeah, this was why I was asking if maybe there was a load-balancer in the mix somewhere making everything "work" but I guess... not work. In retrospect, it was a dumb question :)

And the keystore appears to be just fine: just one chain, with the CA reply imported properly into the subject cert, and the supporting certs chained but not imported.

There is no difference between chained and imported. If they are in the keystore (and are chained) then they are used. If not, then they obviously can't be used. "Import" just means putting the item into the keystore.

And yes, the Tomcat instance is being accessed directly.

It wouldn't be the first time I've seen things I can't explain. And they are the only customer installation that hasn't been migrated to *at least* Tomcat 8, and I put a note about the anomaly in their records.
Well, I'm happy it's working for you under at least one configuration. Migrating forward to Tomcat 9 should obviously be on their schedule. I'm not sure what market sector they are in, but it's possible they are violating a required best practice, here: you shouldn't be running unsupported software. That said, there is at least one company I know of that will provide support for Tomcat 7 including back-porting all security fixes, etc. if your customer (or you, since you are the software provider) needs such paid support.

-chris


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to