Ok. But I feel that the server should ignore the ciphers which it doesn't understand instead of rejecting the connections. Because, you can't expect the server to understand all the ciphers that the browser has. Moreover, the SSL communication will succeed only when both the parties agree upon a common cipher.

Robert Relyea wrote:
Nelson B Bolyard wrote:
Suresh Kumar J wrote, On 2008-09-02 10:55:
 
Hi Nelson,

You are correct that Apache Tomcat web-server(v6.0.13) choked with the
full set of cipher suites implemented in the Windows FF3.0.1. When I
disable the following cipher suites via the "about:config" option, the
web communication started working and the server didn't complain anything.
security.ssl3.dhe_dss_camellia_128_sha
security.ssl3.dhe_dss_camellia_256_sha
security.ssl3.dhe_rsa_camellia_128_sha
security.ssl3.dhe_rsa_camellia_256_sha
security.ssl3.rsa_camellia_128_sha
security.ssl3.rsa_camellia_256_sha

Thanks for pointing me to the right direction.
   
The reason this worked on your RH browser is the RH version does not support camellia. I wonder why apache choked, it boggles the mind that apache would actually reject connections with unrecognized ciphers rather than ignore them. I wonder if it's trying to connect using them but fails for some reason...

bob
bob


_______________________________________________ dev-tech-crypto mailing list dev-tech-crypto@lists.mozilla.org https://lists.mozilla.org/listinfo/dev-tech-crypto


_______________________________________________
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to