Bug 1245341 - KVM Viewer for Dell RCSes fails since 1.8.0.51-4.b16.fc22
Summary: KVM Viewer for Dell RCSes fails since 1.8.0.51-4.b16.fc22
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Fedora
Classification: Fedora
Component: java-1.8.0-openjdk
Version: 22
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Deepak Bhole
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
: 1247772 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2015-07-21 19:50 UTC by Fabrice Bellet
Modified: 2015-07-29 18:24 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-07-22 16:55:32 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)
output of "javaws -verbose session.jnlp" (65.33 KB, text/plain)
2015-07-21 19:50 UTC, Fabrice Bellet
no flags Details

Description Fabrice Bellet 2015-07-21 19:50:33 UTC
Created attachment 1054503 [details]
output of "javaws -verbose session.jnlp"

The KVM session viewer java program provided by Dell now fails to connect since I upgraded java-1.8.0-openjdk to version 1:1.8.0.51-4.b16.fc22. Last working version is 1.8.0.45-40.b14.fc22.

The error message from Dell program is "Network connect error". I tried after removing ~/.cache/icedtea-web cache.

Please tell me how I can provide more debugging details. Distro is Fedora-22 with updates-testing enabled, selinux in permissive mode.

Comment 1 jiri vanek 2015-07-22 13:34:38 UTC
Hello Fabrice!

From the log I can see that ITW actually did its job and launched main class.
So the error comes from custom application.
Form side of ITW this would be closed-not a bug, but as the issue is obviously caused by openjdkk update, I will reassign it back to openjdk8.

Omair - in u51 were fixes to  connection, so jdk can be an cause. ITW really does not look liek an cause at all.

Fabrice - the log from ITW is good. But for more investigations more verbose log from your Dell's app  is necessary. Can you enable debugging in this application? Maye via soem <argument> ?

Comment 2 jiri vanek 2015-07-22 13:44:39 UTC
Giving it second though,  Main fixes to connection were in https, where some algorithms were removed.  Fabrice, if you look into java.security you may find list of excluded algorithms. Try to enable them an maybe then your app will work (note, it is not fix, fix is to update servers to use newer algorithms)
Althoug  I have not noted itw to connect to https. BNUt it does not need to mean that app can not connect to https later...

Comment 3 Andrew John Hughes 2015-07-22 13:59:08 UTC
I don't see any https links in the log; where are you seeing these?

RC4 was disabled in the security update because it is flawed. It should only be re-enabled if there is really no other way to update the other end of the connection.

Comment 4 jiri vanek 2015-07-22 14:06:37 UTC
As I had written. https connections are NOT in the logs. But id do not necessary need to mean, that application is  not doing them on its own.

Thats why log of the application is now needed more then log of ITW.


Fabrice, if you willbe abel to enable debugging of your aplication, console of itw (enabled via itw-settings->debuffing) can filter out logs of ITW and show logs only of yours app.

Comment 5 Fabrice Bellet 2015-07-22 14:54:49 UTC
(In reply to jiri vanek from comment #2)
> Giving it second though,  Main fixes to connection were in https, where some
> algorithms were removed.  Fabrice, if you look into java.security you may
> find list of excluded algorithms. Try to enable them an maybe then your app
> will work (note, it is not fix, fix is to update servers to use newer
> algorithms)

that's it :

-jdk.tls.disabledAlgorithms=SSLv3, DH keySize < 768, EC, ECDHE, ECDH
+jdk.tls.disabledAlgorithms=SSLv3, EC, ECDHE, ECDH

Comment 6 Deepak Bhole 2015-07-22 14:57:09 UTC
Hi Fabrice, so does everything work now?

Comment 7 Fabrice Bellet 2015-07-22 16:35:33 UTC
Yes, it works now with this modification to java.security. Thanks for this help!

Comment 8 Deepak Bhole 2015-07-22 16:55:32 UTC
Great, thanks everyone! I will close this bug then.

Comment 9 Andrew John Hughes 2015-07-22 17:14:53 UTC
Ah, so you fell afoul of the fix for the LOGJAM issue (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2015-4000).

I suggest that the other end of the connection is upgraded ASAP, as such short Diffee-Hellman keys are very vulnerable.

Comment 10 Paul Stauffer 2015-07-29 18:24:43 UTC
*** Bug 1247772 has been marked as a duplicate of this bug. ***


Note You need to log in before you can comment on or make changes to this bug.