[JBoss JIRA] (ELY-395) Undertow HTTPS listener offers no cipher suite for DEFAULT enabled-cipher-suites
by Darran Lofthouse (JIRA)
[ https://issues.jboss.org/browse/ELY-395?page=com.atlassian.jira.plugin.sy... ]
Darran Lofthouse commented on ELY-395:
--------------------------------------
Here is the SSL debug output: -
{noformat}
17:59:26,482 INFO [stdout] (default I/O-10) Using SSLEngineImpl.
17:59:26,532 INFO [stdout] (default I/O-10) Allow unsafe renegotiation: false
17:59:26,532 INFO [stdout] (default I/O-10) Allow legacy hello messages: true
17:59:26,532 INFO [stdout] (default I/O-10) Is initial handshake: true
17:59:26,532 INFO [stdout] (default I/O-10) Is secure renegotiation: false
17:59:26,533 INFO [stdout] (default I/O-10) No available cipher suite for TLSv1
17:59:26,533 INFO [stdout] (default I/O-10) No available cipher suite for TLSv1.1
17:59:26,533 INFO [stdout] (default I/O-10) No available cipher suite for TLSv1.2
17:59:26,534 INFO [stdout] (default I/O-10) default I/O-10, fatal error: 80: problem unwrapping net record
17:59:26,534 INFO [stdout] (default I/O-10) javax.net.ssl.SSLHandshakeException: No appropriate protocol (protocol is disabled or cipher suites are inappropriate)
17:59:26,534 INFO [stdout] (default I/O-10) default I/O-10, SEND TLSv1.2 ALERT: fatal, description = internal_error
17:59:26,535 INFO [stdout] (default I/O-10) default I/O-10, WRITE: TLSv1.2 Alert, length = 2
17:59:26,535 INFO [stdout] (default I/O-10) default I/O-10, called closeInbound()
17:59:26,535 INFO [stdout] (default I/O-10) default I/O-10, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Inbound closed before receiving peer's close_notify: possible truncation attack?
17:59:26,536 INFO [stdout] (default I/O-10) default I/O-10, called closeOutbound()
17:59:26,536 INFO [stdout] (default I/O-10) default I/O-10, closeOutboundInternal()
17:59:26,539 INFO [stdout] (default I/O-12) Using SSLEngineImpl.
17:59:26,547 INFO [stdout] (default I/O-12) Allow unsafe renegotiation: false
17:59:26,547 INFO [stdout] (default I/O-12) Allow legacy hello messages: true
17:59:26,547 INFO [stdout] (default I/O-12) Is initial handshake: true
17:59:26,547 INFO [stdout] (default I/O-12) Is secure renegotiation: false
17:59:26,547 INFO [stdout] (default I/O-12) No available cipher suite for TLSv1
17:59:26,548 INFO [stdout] (default I/O-12) No available cipher suite for TLSv1.1
17:59:26,548 INFO [stdout] (default I/O-12) No available cipher suite for TLSv1.2
17:59:26,548 INFO [stdout] (default I/O-12) default I/O-12, fatal error: 80: problem unwrapping net record
17:59:26,548 INFO [stdout] (default I/O-12) javax.net.ssl.SSLHandshakeException: No appropriate protocol (protocol is disabled or cipher suites are inappropriate)
17:59:26,549 INFO [stdout] (default I/O-12) default I/O-12, SEND TLSv1.2 ALERT: fatal, description = internal_error
17:59:26,549 INFO [stdout] (default I/O-12) default I/O-12, WRITE: TLSv1.2 Alert, length = 2
17:59:26,549 INFO [stdout] (default I/O-12) default I/O-12, called closeInbound()
17:59:26,549 INFO [stdout] (default I/O-12) default I/O-12, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Inbound closed before receiving peer's close_notify: possible truncation attack?
17:59:26,549 INFO [stdout] (default I/O-12) default I/O-12, called closeOutbound()
17:59:26,549 INFO [stdout] (default I/O-12) default I/O-12, closeOutboundInternal()
17:59:26,551 INFO [stdout] (default I/O-14) Using SSLEngineImpl.
17:59:26,557 INFO [stdout] (default I/O-14) Allow unsafe renegotiation: false
17:59:26,558 INFO [stdout] (default I/O-14) Allow legacy hello messages: true
17:59:26,558 INFO [stdout] (default I/O-14) Is initial handshake: true
17:59:26,558 INFO [stdout] (default I/O-14) Is secure renegotiation: false
17:59:26,558 INFO [stdout] (default I/O-14) No available cipher suite for TLSv1
17:59:26,558 INFO [stdout] (default I/O-14) No available cipher suite for TLSv1.1
17:59:26,558 INFO [stdout] (default I/O-14) No available cipher suite for TLSv1.2
17:59:26,558 INFO [stdout] (default I/O-14) default I/O-14, fatal error: 80: problem unwrapping net record
17:59:26,559 INFO [stdout] (default I/O-14) javax.net.ssl.SSLHandshakeException: No appropriate protocol (protocol is disabled or cipher suites are inappropriate)
17:59:26,559 INFO [stdout] (default I/O-14) default I/O-14, SEND TLSv1.2 ALERT: fatal, description = internal_error
17:59:26,560 INFO [stdout] (default I/O-14) default I/O-14, WRITE: TLSv1.2 Alert, length = 2
17:59:26,560 INFO [stdout] (default I/O-14) default I/O-14, called closeInbound()
17:59:26,560 INFO [stdout] (default I/O-14) default I/O-14, fatal: engine already closed. Rethrowing javax.net.ssl.SSLException: Inbound closed before receiving peer's close_notify: possible truncation attack?
17:59:26,560 INFO [stdout] (default I/O-14) default I/O-14, called closeOutbound()
17:59:26,560 INFO [stdout] (default I/O-14) default I/O-14, closeOutboundInternal()
{noformat}
> Undertow HTTPS listener offers no cipher suite for DEFAULT enabled-cipher-suites
> --------------------------------------------------------------------------------
>
> Key: ELY-395
> URL: https://issues.jboss.org/browse/ELY-395
> Project: WildFly Elytron
> Issue Type: Bug
> Components: SSL
> Affects Versions: 1.0.2.Final
> Reporter: Ondrej Kotek
> Assignee: Darran Lofthouse
> Fix For: 1.1.0.Beta6
>
>
> No cipher suites are available for handshake with HTTPS Undertow listener.
> According to OpenSSL documentation [1], cipher suites corresponding with ALL:!COMPLEMENTOFDEFAULT:!eNULL cipher string should be available for handshake.
> According to Elytron documentation [2], cipher suites corresponding with ALL:!aNULL:!eNULL cipher string should be available for handshake.
> [1] https://www.openssl.org/docs/manmaster/apps/ciphers.html#CIPHER-STRINGS
> [2] http://wildfly-security.github.io/wildfly-elytron/org/wildfly/security/ss...
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 11 months
[JBoss JIRA] (JGRP-2040) Seeing a OOM in JGroup 3.4
by Bela Ban (JIRA)
[ https://issues.jboss.org/browse/JGRP-2040?page=com.atlassian.jira.plugin.... ]
Bela Ban commented on JGRP-2040:
--------------------------------
http://www.jgroups.org/manual/index.html#TCPPING_Prot
> Seeing a OOM in JGroup 3.4
> --------------------------
>
> Key: JGRP-2040
> URL: https://issues.jboss.org/browse/JGRP-2040
> Project: JGroups
> Issue Type: Bug
> Affects Versions: 3.4
> Environment: Linux Operating System
> Reporter: Kshitiz Saxena
> Assignee: Bela Ban
>
> We are seeing an OOM in our application where thread dump points to JGroup.
> We see the below in thread dumps,
> 3XEHSTTYPE 07:33:24:346241000 GMT j9vm.294 - >setCurrentException index=11 constructorIndex=0 detailMessage=0000000000F61678
> 3XEHSTTYPE 07:33:24:346183000 GMT j9mm.126 - at 0000000050F8CD60 java/lang/Thread.run()V, jit 00007FCF323EA580, pc 00007FCF489E0A36
> 3XEHSTTYPE 07:33:24:346179000 GMT j9mm.126 - at 0000000053644748 *org/jgroups/blocks/TCPConnectionMap$TCPConnection$Receiver.run()*V, jit 0000000000000000, pc 00007FCF3354D334
> 3XEHSTTYPE 07:33:24:346175000 GMT j9mm.101 - J9AllocateIndexableObject() returning NULL! *1650814064 bytes* requested for object of class 0000000050F79700 from memory space 'Generational' id=00007FCF440427C0
> In the thread dump we also see
> WARNING : OutOfMemoryError possibly caused by 1650814064 bytes requested for object of class 0000000050F79700 from memory space 'Generational' id=00007FCF440427C0
> Java Heap Information
> -Xmx (Maximum Java heap size) : 1280m
> -Xms (Initial Java heap size) : 640m
> -Xss (Maximum stack size for Java threads) : 256k
> Total Java heap size: 1.25 GB
> Used Java heap size: 174.27 MB
> Free Java heap size: 1.08 GB
--
This message was sent by Atlassian JIRA
(v6.4.11#64026)
9 years, 11 months