Return-Path: X-Original-To: apmail-tomcat-users-archive@www.apache.org Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 9ED3018DDE for ; Tue, 13 Oct 2015 20:55:42 +0000 (UTC) Received: (qmail 58025 invoked by uid 500); 13 Oct 2015 20:55:36 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 57962 invoked by uid 500); 13 Oct 2015 20:55:36 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 57951 invoked by uid 99); 13 Oct 2015 20:55:36 -0000 Received: from Unknown (HELO spamd3-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 13 Oct 2015 20:55:36 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd3-us-west.apache.org (ASF Mail Server at spamd3-us-west.apache.org) with ESMTP id 0A16D180A60 for ; Tue, 13 Oct 2015 20:55:36 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd3-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: 2.901 X-Spam-Level: ** X-Spam-Status: No, score=2.901 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=3, URIBL_BLOCKED=0.001] autolearn=disabled Authentication-Results: spamd3-us-west.apache.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com Received: from mx1-us-east.apache.org ([10.40.0.8]) by localhost (spamd3-us-west.apache.org [10.40.0.10]) (amavisd-new, port 10024) with ESMTP id rVJCcobORYYq for ; Tue, 13 Oct 2015 20:55:24 +0000 (UTC) Received: from mail-vk0-f47.google.com (mail-vk0-f47.google.com [209.85.213.47]) by mx1-us-east.apache.org (ASF Mail Server at mx1-us-east.apache.org) with ESMTPS id 3E1F9439CB for ; Tue, 13 Oct 2015 20:55:24 +0000 (UTC) Received: by vkex70 with SMTP id x70so11236320vke.3 for ; Tue, 13 Oct 2015 13:55:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; bh=n8/69YMogoo37b4vNQQ4Cy+JA2+pFToAjgeR7ANYlFs=; b=KN5tPTZHehi2rqe+alWvRf9eBbZ0AJABbnAwr4/dTJUYmbX0CLyxSCG9D3fqO6s9kh /7wCj7XBOcMc0XajQJ4oe7FoDFeP6LShS+LLcqZjg0SZzXA9KAXGCtkB8pLUh655H8wa s6bVs1BtOYSj6Gu+OgA7PB67F8HmMsCtHj6euCKCGSNFSNxl9CjdoSqZbVqkvIHy1NQZ AenH0hs0BfvqpslD+Z1R1lz6tDB4VwdVdBj37eqq8mXKfi1kpPmsSUnTeN4YLEXVrKlt gVf4yerKilHMewnovmzOmtPoYsTYcUUeo6HNZUYPWXhl0bgEzckbhG30jyvOehg8oJF0 wz9A== MIME-Version: 1.0 X-Received: by 10.31.172.70 with SMTP id v67mr22616163vke.47.1444769723446; Tue, 13 Oct 2015 13:55:23 -0700 (PDT) Received: by 10.103.99.133 with HTTP; Tue, 13 Oct 2015 13:55:23 -0700 (PDT) In-Reply-To: References: <55DF6697.7010803@christopherschultz.net> <55E0A354.4060606@christopherschultz.net> <55E0BA68.9090800@christopherschultz.net> <55E48B9D.5040102@christopherschultz.net> <561D0A37.6080906@christopherschultz.net> <561D636E.7070805@christopherschultz.net> Date: Tue, 13 Oct 2015 22:55:23 +0200 Message-ID: Subject: Re: [OT] Tomcat 7.0.55/Jre 7u67: SEND TLSv1 ALERT: fatal, description = bad_record_mac From: =?UTF-8?Q?Aur=C3=A9lien_Terrestris?= To: Tomcat Users List Content-Type: multipart/alternative; boundary=001a1144061425fea0052202aa8b --001a1144061425fea0052202aa8b Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable "How do you force Java 8 to use SSLv2Hello?" You can do this when writing your own Java client : calling the SSLSocketFactory to create an SSLSocket and configure with setEnabledProtocols ( https://docs.oracle.com/javase/8/docs/api/javax/net/ssl/SSLSocket.html#setE= nabledProtocols-java.lang.String:A- ) If you have some IIS server on internet which reproduces the problem, I'll try with JTouch ( jtouch.sourceforge.net ) or write a small client. 2015-10-13 22:22 GMT+02:00 Aur=C3=A9lien Terrestris = : > George, > > do you have any network capture that we can see ? > > 2015-10-13 22:10 GMT+02:00 George Stanchev : > >> >> It might be doable with OpenSSL s_client or something. Tough to >> replicate Java's behavior with a non-Java tool, though. >> >> I tried hard with the s_client but it can limit the protocols to one or >> another but it canot mix-and-match (hello 1.2, ok we will do 1.0) like J= ava >> 8 does. Either TLSv1 or TLSv1.2 but not both. Neither can curl which is >> also on top of openssl. >> >> Today, I spent 2.5 hours with a lemming from MS getting basically >> nowhere. I really need an engineer, but they give me those clueless supp= ort >> people that is wasting mine and their time. If someone knows how to >> escalate or a forum where MS developers hang out, I would appreciate it. >> The support person I got today was clueless, went over a script and any >> attempt to explain a little more technical details led to total confusio= n >> and rebooting the script to beginning. Totally frustrating. At least wit= h >> Oracle I got to talk with an actual engineer... >> >> George >> >> >> -----Original Message----- >> From: Christopher Schultz [mailto:chris@christopherschultz.net] >> Sent: Tuesday, October 13, 2015 2:03 PM >> To: Tomcat Users List >> Subject: Re: [OT] Tomcat 7.0.55/Jre 7u67: SEND TLSv1 ALERT: fatal, >> description =3D bad_record_mac >> >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA256 >> >> George, >> >> On 10/13/15 12:35 PM, George Stanchev wrote: >> > [1] states: " JDK 7-9 enables SSLv2Hello on the server side only. >> > (Will not send, but will accept SSLv2Hellos)" >> >> Interesting. This absolutely makes sense, though, since SSL should just >> die. :) >> >> > I've opened support case both MS and already there is a bug filed with >> > Oracle on this and really, to be absolutely certain if the issue is in >> > Java or SChannel, one would have to write a non-Java client that that >> > mimics the handshake messages send from Java with something like >> > OpenSSL or NSS or whatever and see if the bug replicates. >> >> It might be doable with OpenSSL s_client or something. Tough to replicat= e >> Java's behavior with a non-Java tool, though. >> >> > Writing a Java/Java server client could still leave some doubts as one >> > can argue the code reuse could mask the problem - it works but the bug >> > on the client side is hidden by the server containing similar/same bug >> > so the MACs check out... >> > >> > Unfortunately I don't have the time to invest in this more than I >> > already had. And if MS support engineers can pass it on to someone >> > from the windows core team may be we can have some movement forward. >> >> Okay. Thanks for your work so far. >> >> - -chris >> -----BEGIN PGP SIGNATURE----- >> Comment: GPGTools - http://gpgtools.org >> >> iQIcBAEBCAAGBQJWHWNuAAoJEBzwKT+lPKRYgWAP/A8fUJ5Dzu+O46GNWpdobqq0 >> 7ugkb2cQ1VM92Q+22Wtl87GSRPhBS8jwNrBBCJmoyBjRZ/LKVcwtcWLzUIBllXm5 >> t8iorXpQxaps1G0AEEf5tAwHXyN75J2vC9qvRvD6dkekHXHwO3RRqvSCqQjEjeVJ >> XsOdjuIhPwX0B0SN8Apdshvxe98sC9QPn73LNdSM9+j8Ob1vCDHDiMFj60K72Su1 >> E0UmPYEJdhb5D+PvSM/7CMcAlkJYmCl8VlNFWD320ymjObfIMymfOk+kqKLqVItQ >> +r2e20At1qCyeyg2Gcxb4X1ajIhcxdgP7WJYtg57Pwrp4ZVZ6d7RM+CIqt28SfxT >> EtTamDZ8aPYsCKqMWIYRPyLrWaouEuLJEmzweF8B+NxY0svK8vEOiro/vR4LycOZ >> PG5zxuS/QMJR2oEgkeUz9+NhB8nP/qJxMhc40pKGmvZxC7ljM/tP7jTvE1MwmMHE >> P8rX5b3yF8DfMdGZdIlrHJ8wXYSzJdTMJvA5ffXVKaObGMYtAFFDlfupud1iO9ML >> Hh4exxX+/NU7fXt+ot6BLEFAfDD9+z6uOeq+vK6bxaITubFVGIavhowjAgQIBNt3 >> O//p9dJQVKan0db9kqyLpLMrrFYd/cmA8DZDxoY/iaVuoKhJ6blbDMQKi2DlsvgF >> WGDHUsSBZIYTFq5mc7VO >> =3DeyUN >> -----END PGP SIGNATURE----- >> >> --------------------------------------------------------------------- >> To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org >> For additional commands, e-mail: users-help@tomcat.apache.org >> >> > --001a1144061425fea0052202aa8b--