You are viewing a plain text version of this content. The canonical link for it is here.
Posted to users@tomcat.apache.org by Christopher Schultz <ch...@christopherschultz.net> on 2024/04/11 13:25:25 UTC

Re: [OT] Tomcat 9.0.83 - SSL handshake stops working for Google API calls after a while

Marcos,

Marking as "off topic" because this is not Tomcat-related. Please see 
below...

On 4/11/24 08:28, Marcos Peña wrote:
> Hi,
> 
> I am looking for help with a strange issue we are experiencing when 
> trying to use Google APIs from a web application that is deployed on 
> Tomcat 9.0.83.
> 
> After a few hours of the server being up and running, all calls to the 
> Google APIs fail because of SSL handshake errors. Attaching the SSL logs 
> for your reference.
> 
> I see some differences in the ClientHello message. When the handshake 
> fails, all TLSv1.3 ciphers are ignored, there is no "session id" and 
> TLSv1.2 is sent as the only supported version.
> 
> The Tomcat connector configuration is as follows:
> <Connector port="8443" 
> protocol="com.precisionsoftware.tomcat.Http11Nio2Protocol" 
> proxyPort="443" SSLEnabled="true"
>          connectionTimeout="60000"
>          maxThreads="300"
>          minSpareThreads="50"
>          acceptCount="250"
>          maxKeepAliveRequests="1"
> maxPostSize="-1"
>          relaxedQueryChars='[]|{}^&#x5c;&#x60;&quot;&lt;&gt;'
>          enableLookups="true"
> disableUploadTimeout="true"
>          URIEncoding="UTF-8"
>          compression="force"
> scheme="https"
> secure="true"
>          clientAuth="false"
> sslProtocol="TLS"
> sslEnabledProtocols="TLSv1.2+TLSv1.3"
>          keyAlias="1"
>          keystoreFile="../wildcard_odqad.pfx"
>          keystorePass="thepassword"
>          
> ciphers="TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_AES_128_CCM_SHA256,TLS_AES_128_CCM_8_SHA256"/>

This configuration is only relevant for INCOMING connections. It has no 
bearing on your outgoing HTTP / TLS connections.

> I updated Tomcat to use the most recent native library - 2.0.7 - but 
> that did not help. Below an extract from the server log.

Your use (or not) of tcnative is only relevant for incoming connections. 
Without significant work, your outgoing connections will not be using 
tcnative for any TLS communications.

> 2024-04-11 02:12:47,507 INFO 
>   [org.apache.catalina.core.AprLifecycleListener:134] (main) Loaded 
> Apache Tomcat Native library [2.0.7] using APR version [1.7.4].
> 2024-04-11 02:12:47,507 INFO 
>   [org.apache.catalina.core.AprLifecycleListener:134] (main) APR 
> capabilities: IPv6 [true], sendfile [true], accept filters [false], 
> random [true], UDS [true].
> 2024-04-11 02:12:47,507 INFO 
>   [org.apache.catalina.core.AprLifecycleListener:134] (main) APR/OpenSSL 
> configuration: useAprConnector [false], useOpenSSL [true]
> 2024-04-11 02:12:47,514 INFO 
>   [org.apache.catalina.core.AprLifecycleListener:370] (main) OpenSSL 
> successfully initialized [OpenSSL 3.0.13 30 Jan 2024]
> 
> I am not very familiar with the SSL handshake process and do not really 
> understand what can make it stop working.

My guess is that your /outbound/ HTTP connection manager is having its 
configuration changed at runtime. You will have to look at how your 
application establishes these outbound connections to determine why the 
rules are changing.

-chris

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org
For additional commands, e-mail: users-help@tomcat.apache.org


Re: [OT] Tomcat 9.0.83 - SSL handshake stops working for Google API calls after a while

Posted by Christopher Schultz <ch...@christopherschultz.net>.
Marcos,

On 4/11/24 09:52, Marcos Peña wrote:
> Thanks for your replies.
> 
> My bad assuming the connector configuration applied to all connections but
> it makes total sense that applies to incoming connections. That helps a lot.
> 
> I have been trying to solve this problem for several days and I was a bit
> desperate. I could not find anything in the application code that would
> change it at runtime...up to a few minutes ago. I think there is a
> SSLSocketFactory that is changing the ciphers at runtime.

That's exactly the kind of thing I would expect to discover given your 
description of the symptoms.

-chris

> On Thu, Apr 11, 2024 at 2:25 PM Christopher Schultz <
> chris@christopherschultz.net> wrote:
> 
>> Marcos,
>>
>> Marking as "off topic" because this is not Tomcat-related. Please see
>> below...
>>
>> On 4/11/24 08:28, Marcos Peña wrote:
>>> Hi,
>>>
>>> I am looking for help with a strange issue we are experiencing when
>>> trying to use Google APIs from a web application that is deployed on
>>> Tomcat 9.0.83.
>>>
>>> After a few hours of the server being up and running, all calls to the
>>> Google APIs fail because of SSL handshake errors. Attaching the SSL logs
>>> for your reference.
>>>
>>> I see some differences in the ClientHello message. When the handshake
>>> fails, all TLSv1.3 ciphers are ignored, there is no "session id" and
>>> TLSv1.2 is sent as the only supported version.
>>>
>>> The Tomcat connector configuration is as follows:
>>> <Connector port="8443"
>>> protocol="com.precisionsoftware.tomcat.Http11Nio2Protocol"
>>> proxyPort="443" SSLEnabled="true"
>>>           connectionTimeout="60000"
>>>           maxThreads="300"
>>>           minSpareThreads="50"
>>>           acceptCount="250"
>>>           maxKeepAliveRequests="1"
>>> maxPostSize="-1"
>>>           relaxedQueryChars='[]|{}^&#x5c;&#x60;&quot;&lt;&gt;'
>>>           enableLookups="true"
>>> disableUploadTimeout="true"
>>>           URIEncoding="UTF-8"
>>>           compression="force"
>>> scheme="https"
>>> secure="true"
>>>           clientAuth="false"
>>> sslProtocol="TLS"
>>> sslEnabledProtocols="TLSv1.2+TLSv1.3"
>>>           keyAlias="1"
>>>           keystoreFile="../wildcard_odqad.pfx"
>>>           keystorePass="thepassword"
>>>
>>>
>> ciphers="TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_AES_128_CCM_SHA256,TLS_AES_128_CCM_8_SHA256"/>
>>
>> This configuration is only relevant for INCOMING connections. It has no
>> bearing on your outgoing HTTP / TLS connections.
>>
>>> I updated Tomcat to use the most recent native library - 2.0.7 - but
>>> that did not help. Below an extract from the server log.
>>
>> Your use (or not) of tcnative is only relevant for incoming connections.
>> Without significant work, your outgoing connections will not be using
>> tcnative for any TLS communications.
>>
>>> 2024-04-11 02:12:47,507 INFO
>>>    [org.apache.catalina.core.AprLifecycleListener:134] (main) Loaded
>>> Apache Tomcat Native library [2.0.7] using APR version [1.7.4].
>>> 2024-04-11 02:12:47,507 INFO
>>>    [org.apache.catalina.core.AprLifecycleListener:134] (main) APR
>>> capabilities: IPv6 [true], sendfile [true], accept filters [false],
>>> random [true], UDS [true].
>>> 2024-04-11 02:12:47,507 INFO
>>>    [org.apache.catalina.core.AprLifecycleListener:134] (main) APR/OpenSSL
>>> configuration: useAprConnector [false], useOpenSSL [true]
>>> 2024-04-11 02:12:47,514 INFO
>>>    [org.apache.catalina.core.AprLifecycleListener:370] (main) OpenSSL
>>> successfully initialized [OpenSSL 3.0.13 30 Jan 2024]
>>>
>>> I am not very familiar with the SSL handshake process and do not really
>>> understand what can make it stop working.
>>
>> My guess is that your /outbound/ HTTP connection manager is having its
>> configuration changed at runtime. You will have to look at how your
>> application establishes these outbound connections to determine why the
>> rules are changing.
>>
>> -chris
>>
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org
>> For additional commands, e-mail: users-help@tomcat.apache.org
>>
>>
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org
For additional commands, e-mail: users-help@tomcat.apache.org


Re: [OT] Tomcat 9.0.83 - SSL handshake stops working for Google API calls after a while

Posted by Marcos Peña <m3...@qad.com.INVALID>.
Thanks for your replies.

My bad assuming the connector configuration applied to all connections but
it makes total sense that applies to incoming connections. That helps a lot.

I have been trying to solve this problem for several days and I was a bit
desperate. I could not find anything in the application code that would
change it at runtime...up to a few minutes ago. I think there is a
SSLSocketFactory that is changing the ciphers at runtime.

Regards,
Marcos

On Thu, Apr 11, 2024 at 2:25 PM Christopher Schultz <
chris@christopherschultz.net> wrote:

> Marcos,
>
> Marking as "off topic" because this is not Tomcat-related. Please see
> below...
>
> On 4/11/24 08:28, Marcos Peña wrote:
> > Hi,
> >
> > I am looking for help with a strange issue we are experiencing when
> > trying to use Google APIs from a web application that is deployed on
> > Tomcat 9.0.83.
> >
> > After a few hours of the server being up and running, all calls to the
> > Google APIs fail because of SSL handshake errors. Attaching the SSL logs
> > for your reference.
> >
> > I see some differences in the ClientHello message. When the handshake
> > fails, all TLSv1.3 ciphers are ignored, there is no "session id" and
> > TLSv1.2 is sent as the only supported version.
> >
> > The Tomcat connector configuration is as follows:
> > <Connector port="8443"
> > protocol="com.precisionsoftware.tomcat.Http11Nio2Protocol"
> > proxyPort="443" SSLEnabled="true"
> >          connectionTimeout="60000"
> >          maxThreads="300"
> >          minSpareThreads="50"
> >          acceptCount="250"
> >          maxKeepAliveRequests="1"
> > maxPostSize="-1"
> >          relaxedQueryChars='[]|{}^&#x5c;&#x60;&quot;&lt;&gt;'
> >          enableLookups="true"
> > disableUploadTimeout="true"
> >          URIEncoding="UTF-8"
> >          compression="force"
> > scheme="https"
> > secure="true"
> >          clientAuth="false"
> > sslProtocol="TLS"
> > sslEnabledProtocols="TLSv1.2+TLSv1.3"
> >          keyAlias="1"
> >          keystoreFile="../wildcard_odqad.pfx"
> >          keystorePass="thepassword"
> >
> >
> ciphers="TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,TLS_DHE_RSA_WITH_AES_256_GCM_SHA384,TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_AES_128_CCM_SHA256,TLS_AES_128_CCM_8_SHA256"/>
>
> This configuration is only relevant for INCOMING connections. It has no
> bearing on your outgoing HTTP / TLS connections.
>
> > I updated Tomcat to use the most recent native library - 2.0.7 - but
> > that did not help. Below an extract from the server log.
>
> Your use (or not) of tcnative is only relevant for incoming connections.
> Without significant work, your outgoing connections will not be using
> tcnative for any TLS communications.
>
> > 2024-04-11 02:12:47,507 INFO
> >   [org.apache.catalina.core.AprLifecycleListener:134] (main) Loaded
> > Apache Tomcat Native library [2.0.7] using APR version [1.7.4].
> > 2024-04-11 02:12:47,507 INFO
> >   [org.apache.catalina.core.AprLifecycleListener:134] (main) APR
> > capabilities: IPv6 [true], sendfile [true], accept filters [false],
> > random [true], UDS [true].
> > 2024-04-11 02:12:47,507 INFO
> >   [org.apache.catalina.core.AprLifecycleListener:134] (main) APR/OpenSSL
> > configuration: useAprConnector [false], useOpenSSL [true]
> > 2024-04-11 02:12:47,514 INFO
> >   [org.apache.catalina.core.AprLifecycleListener:370] (main) OpenSSL
> > successfully initialized [OpenSSL 3.0.13 30 Jan 2024]
> >
> > I am not very familiar with the SSL handshake process and do not really
> > understand what can make it stop working.
>
> My guess is that your /outbound/ HTTP connection manager is having its
> configuration changed at runtime. You will have to look at how your
> application establishes these outbound connections to determine why the
> rules are changing.
>
> -chris
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org
> For additional commands, e-mail: users-help@tomcat.apache.org
>
>