Re: [Ikvm-developers] Available cipher suites
Brought to you by:
jfrijters
|
From: Jeroen F. <je...@su...> - 2014-01-16 15:57:22
|
Hi, It's documented in the IKVM release notes that ECC is not implemented. I'm not very knowledgeable on Java crypto, so I don't know if there are alternative implementations that can be plugged in. Regards, Jeroen > -----Original Message----- > From: Yves Langisch [mailto:yv...@la...] > Sent: Thursday, January 16, 2014 15:10 > To: ikv...@li... > Subject: [Ikvm-developers] Available cipher suites > > Hi, > > Using the latest IKVM version it looks like there are no Elliptic Curve > cipher suites (TLS_EC*) available for SSL/TLS connections. > > with -Djavax.net.debug=ssl: > ... > Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA > Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA > Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 > Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA > Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 > Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 > Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA > Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA > Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 > Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA > Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 > Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA > Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA > Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA > Ignoring unsupported cipher suite: > TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 > Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA > Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA > Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 > Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA > Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA > Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 > Ignoring unsupported cipher suite: > TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 > Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 > Ignoring unsupported cipher suite: > TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 > Ignoring unsupported cipher suite: > TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 > Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA > Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 > Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA > ... > > With IKVM I'm unable to connect to a server which exclusively supports > EC ciphers. Using a standard JRE7 I can successfully connect. > > Is there a was to enable the EC ciphers? > > - > Yves > ------------------------------------------------------------------------ > ------ > CenturyLink Cloud: The Leader in Enterprise Cloud Services. > Learn Why More Businesses Are Choosing CenturyLink Cloud For Critical > Workloads, Development Environments & Everything In Between. > Get a Quote or Start a Free Trial Today. > http://pubads.g.doubleclick.net/gampad/clk?id=119420431&iu=/4140/ostg.cl > ktrk > _______________________________________________ > Ikvm-developers mailing list > Ikv...@li... > https://lists.sourceforge.net/lists/listinfo/ikvm-developers |