Description of problem: When setting AECDH as cipher string instead of setting anonymous Elliptic Curve Diffie Hellman cipher suites, see [1] sets non anonymous ECDH Version-Release number of selected component (if applicable): EAP 6.3.0 How reproducible: always Steps to Reproduce: 1. set as cipher suite AECDH 2. enable debug logging for org.apache.tomcat.util.net.jsse 3. do handshake via openssl s_client a) openssl s_client -connect 127.0.0.1:8443 -cipher AECDH b) openssl s_client -connect 127.0.0.1:8443 -cipher ALL:COMPLEMENTOFALL Actual results: a) handshake fails with enforced AECDH b) In my case actually used cipher is ECDH-RSA-AES256-SHA384 which is not anonymous ECDH Expected results: a) if there are some AECDH ciphers supported in used JDK, handshake is successful b) the used cipher is one of AECDH ciphers if there are some AECDH ciphers supported in used JDK Additional info: AECDH and ECDH requires keystores generated using EC keyalg [1] https://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS
Created attachment 924507 [details] Proposed patch Proposed patch
Integrated in web as r2508.
Should be fixed by component upgrade to 7.5.0.Beta3 1149776
Verified in EAP 6.4.0.DR5