Re: [Ikvm-developers] Available cipher suites
Brought to you by:
jfrijters
|
From: Yves L. <yv...@la...> - 2014-01-16 19:12:36
|
Thanks, it looks like ECC is natively implemented in the JRE. Solved it by converting the Bouncy Castle provider [1] which provides ECC support. You just need to register the provider (Security.addProvider(new BouncyCastleProvider()). - Yves [1] http://www.bouncycastle.org/ On 16 Jan 2014, at 16:56 , Jeroen Frijters <je...@su...> wrote: > Hi, > > It's documented in the IKVM release notes that ECC is not implemented. > > I'm not very knowledgeable on Java crypto, so I don't know if there are alternative implementations that can be plugged in. > > Regards, > Jeroen > >> -----Original Message----- >> From: Yves Langisch [mailto:yv...@la...] >> Sent: Thursday, January 16, 2014 15:10 >> To: ikv...@li... >> Subject: [Ikvm-developers] Available cipher suites >> >> Hi, >> >> Using the latest IKVM version it looks like there are no Elliptic Curve >> cipher suites (TLS_EC*) available for SSL/TLS connections. >> >> with -Djavax.net.debug=ssl: >> ... >> Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA >> Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA >> Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA >> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 >> Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA >> Ignoring unsupported cipher suite: TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 >> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 >> Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 >> Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_RC4_128_SHA >> Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_RC4_128_SHA >> Ignoring unsupported cipher suite: TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 >> Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA >> Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 >> Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA >> Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA >> Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_RC4_128_SHA >> Ignoring unsupported cipher suite: >> TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 >> Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA >> Ignoring unavailable cipher suite: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA >> Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_256_CBC_SHA256 >> Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA >> Ignoring unavailable cipher suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA >> Ignoring unsupported cipher suite: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 >> Ignoring unsupported cipher suite: >> TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 >> Ignoring unsupported cipher suite: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 >> Ignoring unsupported cipher suite: >> TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 >> Ignoring unsupported cipher suite: >> TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 >> Ignoring unavailable cipher suite: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA >> Ignoring unsupported cipher suite: TLS_RSA_WITH_AES_128_CBC_SHA256 >> Ignoring unavailable cipher suite: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA >> ... >> >> With IKVM I'm unable to connect to a server which exclusively supports >> EC ciphers. Using a standard JRE7 I can successfully connect. >> >> Is there a was to enable the EC ciphers? >> >> - >> Yves >> ------------------------------------------------------------------------ >> ------ >> CenturyLink Cloud: The Leader in Enterprise Cloud Services. >> Learn Why More Businesses Are Choosing CenturyLink Cloud For Critical >> Workloads, Development Environments & Everything In Between. >> Get a Quote or Start a Free Trial Today. >> http://pubads.g.doubleclick.net/gampad/clk?id=119420431&iu=/4140/ostg.cl >> ktrk >> _______________________________________________ >> Ikvm-developers mailing list >> Ikv...@li... >> https://lists.sourceforge.net/lists/listinfo/ikvm-developers |