[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
No Matching Cipher Suite. V7.1
The server we are testing on is at 7.1 and at least Tech Refresh 6+.
All PTFs that are supposed to allow the TLS1.2 protocols to work are
applied.
I have been using HTTPAPI and RPG to call external web services such as
leading2lean and service-now. HTTPAPI is at 1.32.
HTTPAPI documentation says it works up to TLS 1.2. (last build 2/2016)
The HTTPS protocol is only handshaking if L2L sets their server to a
very "unsecure level" below SSL2. L2L (under special request) has been
letting use do it this way for a while. But
Eventually, they are going to require at least TLS??
Service-now web service works but I don't know what protocol level they
are enforcing.
This command causes the handshake failure:
rc = http_url_post([1]url:myPointer:dataSize:ifs:HTTP_TIMEOUT:
HTTP_USERAGENT:
'application/x-www-form-urlencoded');
The error message is "SSL Handshake: (GSKit) No compatible cipher suite
available"
According to our Sys-Op and an expert at the COMMON conference, our
server should be TLS1.2 capable. He thinks it is the application
that's
Not working. Our ciphers don't exactly match L2Ls by name, but the
expert told our Sys-op that doesn't matter??? It doesn't look like we
can even do SSL 2.0.
The GSKIT API includes an https_init(application_name, enabled
protocols (ssl2.0, ssl3.0,tls1.0,1.1,1.2))
ii = https_init(*blanks:*Off:*ON:
*ON: *ON: *ON);
We also tried creating an application certificate and using that in the
program. But no difference. I verified that the https_init returns
without the error code set
Our system value for QSSLCSL:
*RSA_AES_128_CBC_SHA256
*RSA_AES_128_CBC_SHA
*RSA_RC4_128_SHA
*RSA_AES_256_CBC_SHA256
*RSA_AES_256_CBC_SHA
*RSA_3DES_EDE_CBC_SHA
*RSA_DES_CBC_SHA
*RSA_EXPORT_RC4_40_MD5
*RSA_EXPORT_RC2_CBC_40_MD5
*RSA_NULL_SHA256
*RSA_NULL_SHA
*RSA_NULL_MD5
*RSA_RC4_128_MD5
QSSLCSLCTL: *USRDFN
QSSLPCL:
Protocols
*TLSV1.2
*TLSV1.1
*TLSV1
*SSLV3
Ciphers L2L says will handshake are:
Cipher Suites (SSL 3+ suites in server-preferred order; deprecated and
SSL 2 suites at the end)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (0xc030) ECDH secp256r1 (eq.
3072 bits RSA) FS 256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f) ECDH secp256r1 (eq.
3072 bits RSA) FS 128
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (0xc028) ECDH secp256r1 (eq.
3072 bits RSA) FS 256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (0xc027) ECDH secp256r1 (eq.
3072 bits RSA) FS 128
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (0xc014) ECDH secp256r1 (eq. 3072
bits RSA) FS 256
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (0xc013) ECDH secp256r1 (eq. 3072
bits RSA) FS 128
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x9f) DH 2048 bits FS 256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (0x6b) DH 2048 bits FS 256
TLS_DHE_RSA_WITH_AES_256_CBC_SHA (0x39) DH 2048 bits FS
256
TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (0x88) DH 2048 bits FS
256
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x9e) DH 2048 bits FS 128
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (0x67) DH 2048 bits FS 128
TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) DH 2048 bits FS
128
TLS_DHE_RSA_WITH_SEED_CBC_SHA (0x9a) DH 2048 bits FS 128
TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (0x45) DH 2048 bits FS
128
Thanks in advance for the help.
Dave
***************************************************************
Consider the environment before printing this message.
To read the Companies' Information and Confidentiality Notice, follow this link:
https://www.autoliv.com/Pages/disclaimer.aspx
***************************************************************
References
1. url:myPointer:dataSize:ifs:HTTP_TIMEOUT
-----------------------------------------------------------------------
This is the FTPAPI mailing list. To unsubscribe, please go to:
http://www.scottklement.com/mailman/listinfo/ftpapi
-----------------------------------------------------------------------