-
Notifications
You must be signed in to change notification settings - Fork 456
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
sslv3 alert unexpected message when running --elliptic_curves #490
Comments
Gary-Lum
changed the title
After updated form JDK 1.7.0_291 to 1.8.0_291
After updated form JDK 1.7.0_291 to 1.8.0_291, Error when running --elliptic_curves:
Feb 5, 2021
nabla-c0d3
changed the title
After updated form JDK 1.7.0_291 to 1.8.0_291, Error when running --elliptic_curves:
sslv3 alert unexpected message when running --elliptic_curves:
Feb 6, 2021
Hello @Gary-Lum do you know what kind of server software triggered this issue? Otherwise I won't be able to fix it. Thanks! |
I've got the same issue maybe:
The HTTP server is using the pre-latest Bouncy Castle versions (BCFIPS and BCJSSE 2.2.1), doesn't occur on older versions of sslyze or BC. |
nabla-c0d3
added a commit
that referenced
this issue
Feb 21, 2021
nabla-c0d3
changed the title
sslv3 alert unexpected message when running --elliptic_curves:
sslv3 alert unexpected message when running --elliptic_curves
Feb 22, 2021
Fixed in v4.0.4. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the bug
A clear and concise description of what the bug is.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
No error before I updated the JDK to 1.8.0_291
Python environment (please complete the following information):
Additional context
TLS 1.2 Cipher Suites:
Attempted to connect using 156 cipher suites.
The server accepted the following 12 cipher suites:
TLS_RSA_WITH_AES_256_GCM_SHA384 256
TLS_RSA_WITH_AES_256_CBC_SHA256 256
TLS_RSA_WITH_AES_256_CBC_SHA 256
TLS_RSA_WITH_AES_128_GCM_SHA256 128
TLS_RSA_WITH_AES_128_CBC_SHA256 128
TLS_RSA_WITH_AES_128_CBC_SHA 128
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA 256 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 128 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 128 ECDH: prime256v1 (256 bits)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA 128 ECDH: prime256v1 (256 bits)
The group of cipher suites supported by the server has the following properties:
Forward Secrecy OK - Supported
Legacy RC4 Algorithm OK - Not Supported
SSL 2.0 Cipher Suites:
Attempted to connect using 7 cipher suites; the server rejected all cipher suites.
Error when running --elliptic_curves:
You can open an issue at https://github.com/nabla-c0d3/sslyze/issues with the following information:
SCAN COMPLETED IN 1.64 S
The text was updated successfully, but these errors were encountered: