From jtrotter at onetest.com.au Wed Jan 15 21:25:22 2014 From: jtrotter at onetest.com.au (Joshua Trotter - Onetest) Date: Thu, 16 Jan 2014 02:25:22 +0000 Subject: [undertow-dev] SSLContext with Undertow Message-ID: Hi, We are looking at options to customise the SSLContext (to set the Keystore) whilst still making use of the convenience io.undertow.Undertow class to build the server. It seems that the following line in the Undertow start method will ultimately result in JsseSslUtils producing a non-configurable default SSLContext every time. XnioSsl xnioSsl = xnio.getSslProvider(OptionMap.create(Options.USE_DIRECT_BUFFERS, true)); Is creating a configurable SSL channel via the Undertow class supported? Thanks, Josh ________________________________ This e-mail and any attachments may be confidential. You must not disclose or use the information contained in this e-mail if you are not the intended recipient. If you have received this e-mail in error, please notify us immediately and delete the e-mail and all copies. Onetest does not guarantee that this e-mail is virus or error free. The attached files are provided and may only be used on the basis that the user assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not. Onetest is not responsible for any changes made to a document other than those made by Onetest, or for the effect of any changes not made by Onetest on a document's meaning. The content and opinions in non-business e-mail are not necessarily those of Onetest. If this is a commercial electronic message within the meaning of the Spam Act, you may indicate that you do not wish to receive any further commercial electronic messages from Onetest by sending an e-mail to antispam at onetest.com.au. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.jboss.org/pipermail/undertow-dev/attachments/20140116/7a97568a/attachment.html From andrewscully at gmail.com Thu Jan 16 11:47:19 2014 From: andrewscully at gmail.com (Andrew Scully) Date: Thu, 16 Jan 2014 16:47:19 +0000 Subject: [undertow-dev] Undertow configuration issue - enabled-cipher-suites Message-ID: Hello, I'm having an issue when configuring a HTTPS listener for Undertow via the JBOSS standalone.xml method. (Wildfly 8.0.0.CR1). I get the following ecception on startup: 2014-01-16 16:00:34,521 ERROR [org.jboss.msc.service.fail](MSC service thread 1-9) MSC000001: Failed to start service jboss.undertow.listener.https: org.jboss.msc.service.StartException in service jboss.undertow.listener.https: Failed to start service at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1904) at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) at java.lang.Thread.run(Thread.java:724) Caused by: java.lang.ClassCastException: Not a sequence at org.xnio.SequenceOption.cast(SequenceOption.java:57) at org.xnio.SequenceOption.cast(SequenceOption.java:31) at org.xnio.OptionMap.get(OptionMap.java:64) at org.xnio.OptionMap$Builder.copy(OptionMap.java:510) at org.xnio.OptionMap$Builder.addAll(OptionMap.java:522) at org.wildfly.extension.undertow.HttpListenerService.createOpenListener(HttpListenerService.java:91) at org.wildfly.extension.undertow.ListenerService.start(ListenerService.java:122) at org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948) at org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881) ... 3 more My JBOSS Undertow configuration looks like this: By process of elimination, I've found that removing the "enabled-cipher-suites" attribute makes the problem go away, so obviously this is the culprit. The value I'm using for this attribute has simply been copied from our jboss-web configuration, previously "cipher-suite". Am I using the attribute wrong, or is this a bug? Any help greatly appreciated. Cheers, Andy. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.jboss.org/pipermail/undertow-dev/attachments/20140116/e9513c5c/attachment.html From sdouglas at redhat.com Mon Jan 20 03:43:20 2014 From: sdouglas at redhat.com (Stuart Douglas) Date: Mon, 20 Jan 2014 03:43:20 -0500 (EST) Subject: [undertow-dev] Undertow configuration issue - enabled-cipher-suites In-Reply-To: References: Message-ID: <1434114472.2742318.1390207400671.JavaMail.root@redhat.com> This looks like a bug. Can you file a JIRA in the Wildfly JIRA? Thanks, Stuart ----- Original Message ----- > From: "Andrew Scully" > To: undertow-dev at lists.jboss.org > Sent: Thursday, 16 January, 2014 5:47:19 PM > Subject: [undertow-dev] Undertow configuration issue - enabled-cipher-suites > > Hello, > > I'm having an issue when configuring a HTTPS listener for Undertow via the > JBOSS standalone.xml method. > > (Wildfly 8.0.0.CR1). > > I get the following ecception on startup: > 2014-01-16 16:00:34,521 ERROR [org.jboss.msc.service.fail](MSC service thread > 1-9) MSC000001: Failed to start service jboss.undertow.listener.https: > org.jboss.msc.service.StartException in service > jboss.undertow.listener.https: Failed to start service > at > org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1904) > at > java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145) > at > java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) > at java.lang.Thread.run(Thread.java:724) > Caused by: java.lang.ClassCastException: Not a sequence > at org.xnio.SequenceOption.cast(SequenceOption.java:57) > at org.xnio.SequenceOption.cast(SequenceOption.java:31) > at org.xnio.OptionMap.get(OptionMap.java:64) > at org.xnio.OptionMap$Builder.copy(OptionMap.java:510) > at org.xnio.OptionMap$Builder.addAll(OptionMap.java:522) > at > org.wildfly.extension.undertow.HttpListenerService.createOpenListener(HttpListenerService.java:91) > at > org.wildfly.extension.undertow.ListenerService.start(ListenerService.java:122) > at > org.jboss.msc.service.ServiceControllerImpl$StartTask.startService(ServiceControllerImpl.java:1948) > at > org.jboss.msc.service.ServiceControllerImpl$StartTask.run(ServiceControllerImpl.java:1881) > ... 3 more > > My JBOSS Undertow configuration looks like this: > > > > max-regions="10"/> > > > > > > security-realm="ApplicationRealm" > enabled-cipher-suites="TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_RC4_128_SHA,TLS_ECDHE_RSA_WITH_RC4_128_SHA,SSL_RSA_WITH_RC4_128_SHA,TLS_ECDH_ECDSA_WITH_RC4_128_SHA,TLS_ECDH_RSA_WITH_RC4_128_SHA,TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_RSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA,TLS_EMPTY_RENEGOTIATION_INFO_SCSV" > /> > > > prefix="localhost_access_log."/> > > > stack-trace-on-error="local-only"> > > > > > directory-listing="true"/> > > > > By process of elimination, I've found that removing the > "enabled-cipher-suites" attribute makes the problem go away, so obviously > this is the culprit. > > The value I'm using for this attribute has simply been copied from our > jboss-web configuration, previously "cipher-suite". > > Am I using the attribute wrong, or is this a bug? > > Any help greatly appreciated. > > Cheers, Andy. > > _______________________________________________ > undertow-dev mailing list > undertow-dev at lists.jboss.org > https://lists.jboss.org/mailman/listinfo/undertow-dev From tomaz.cerar at gmail.com Tue Jan 21 05:38:30 2014 From: tomaz.cerar at gmail.com (=?UTF-8?B?VG9tYcW+IENlcmFy?=) Date: Tue, 21 Jan 2014 11:38:30 +0100 Subject: [undertow-dev] SSLContext with Undertow In-Reply-To: References: Message-ID: Hey, This was fixed in beta32 which was released yesterday, can you try new API and confirm that it works for you. -- tomaz On Thu, Jan 16, 2014 at 3:25 AM, Joshua Trotter - Onetest < jtrotter at onetest.com.au> wrote: > Hi, > > We are looking at options to customise the SSLContext (to set the > Keystore) whilst still making use of the convenience io.undertow.Undertow > class to build the server. > > It seems that the following line in the Undertow start method will > ultimately result in JsseSslUtils producing a non-configurable default > SSLContext every time. > > XnioSsl xnioSsl = > xnio.getSslProvider(OptionMap.create(Options.USE_DIRECT_BUFFERS, true)); > > Is creating a configurable SSL channel via the Undertow class supported? > > Thanks, > Josh > > ------------------------------ > > This e-mail and any attachments may be confidential. You must not disclose > or use the information contained in this e-mail if you are not the intended > recipient. If you have received this e-mail in error, please notify us > immediately and delete the e-mail and all copies. Onetest does not > guarantee that this e-mail is virus or error free. The attached files are > provided and may only be used on the basis that the user assumes all > responsibility for any loss, damage or consequence resulting directly or > indirectly from the use of the attached files, whether caused by the > negligence of the sender or not. Onetest is not responsible for any changes > made to a document other than those made by Onetest, or for the effect of > any changes not made by Onetest on a document's meaning. The content and > opinions in non-business e-mail are not necessarily those of Onetest. If > this is a commercial electronic message within the meaning of the Spam Act, > you may indicate that you do not wish to receive any further commercial > electronic messages from Onetest by sending an e-mail to > antispam at onetest.com.au. > > _______________________________________________ > undertow-dev mailing list > undertow-dev at lists.jboss.org > https://lists.jboss.org/mailman/listinfo/undertow-dev > -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.jboss.org/pipermail/undertow-dev/attachments/20140121/2f5e21a6/attachment.html From jtrotter at onetest.com.au Tue Jan 21 21:58:13 2014 From: jtrotter at onetest.com.au (Joshua Trotter - Onetest) Date: Wed, 22 Jan 2014 02:58:13 +0000 Subject: [undertow-dev] SSLContext with Undertow In-Reply-To: Message-ID: Hey Tomaz, Thanks for the reply, can confirm that this worked for me. Cheers, Josh From: Toma? Cerar > Date: Tuesday, 21 January 2014 8:38 PM To: Josh Trotter > Cc: "undertow-dev at lists.jboss.org" > Subject: Re: [undertow-dev] SSLContext with Undertow Hey, This was fixed in beta32 which was released yesterday, can you try new API and confirm that it works for you. -- tomaz On Thu, Jan 16, 2014 at 3:25 AM, Joshua Trotter - Onetest > wrote: Hi, We are looking at options to customise the SSLContext (to set the Keystore) whilst still making use of the convenience io.undertow.Undertow class to build the server. It seems that the following line in the Undertow start method will ultimately result in JsseSslUtils producing a non-configurable default SSLContext every time. XnioSsl xnioSsl = xnio.getSslProvider(OptionMap.create(Options.USE_DIRECT_BUFFERS, true)); Is creating a configurable SSL channel via the Undertow class supported? Thanks, Josh ________________________________ This e-mail and any attachments may be confidential. You must not disclose or use the information contained in this e-mail if you are not the intended recipient. If you have received this e-mail in error, please notify us immediately and delete the e-mail and all copies. Onetest does not guarantee that this e-mail is virus or error free. The attached files are provided and may only be used on the basis that the user assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not. Onetest is not responsible for any changes made to a document other than those made by Onetest, or for the effect of any changes not made by Onetest on a document's meaning. The content and opinions in non-business e-mail are not necessarily those of Onetest. If this is a commercial electronic message within the meaning of the Spam Act, you may indicate that you do not wish to receive any further commercial electronic messages from Onetest by sending an e-mail to antispam at onetest.com.au. _______________________________________________ undertow-dev mailing list undertow-dev at lists.jboss.org https://lists.jboss.org/mailman/listinfo/undertow-dev ________________________________ This e-mail and any attachments may be confidential. You must not disclose or use the information contained in this e-mail if you are not the intended recipient. If you have received this e-mail in error, please notify us immediately and delete the e-mail and all copies. Onetest does not guarantee that this e-mail is virus or error free. The attached files are provided and may only be used on the basis that the user assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of the attached files, whether caused by the negligence of the sender or not. Onetest is not responsible for any changes made to a document other than those made by Onetest, or for the effect of any changes not made by Onetest on a document's meaning. The content and opinions in non-business e-mail are not necessarily those of Onetest. If this is a commercial electronic message within the meaning of the Spam Act, you may indicate that you do not wish to receive any further commercial electronic messages from Onetest by sending an e-mail to antispam at onetest.com.au. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.jboss.org/pipermail/undertow-dev/attachments/20140122/edca1e58/attachment.html