-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Question: no ciphers available with those parameters #156
Comments
Could you specify which ciphers your client supports and which ones should match the server in your config? |
@tolysz: Well, as for client, Firefox and cURL, neither work, I think Firefox supports most, if not all, ciphers known to Did I understand your question correctly? |
Comparing with the example in tls-simpleserver, you could try to add:
|
On the server side, the ciphers are going to be filtered according to what the whole configuration will permit. For example if you want to have a DH based cipher, you need to have setup DH in the TLS structure. Also the filtering happens with what the certificates you have loaded. If you certificates doesn't allow signing with the RSA keys for example, if it will effectively filter out ciphers that requires RSA signing. |
@ocheron's solution actually worked! Thanks! I'm wondering why though, may someone explain? @vincenthz I see, as a beginner in the field of the whole SSL/TLS thing, I couldn't understand how things got together, examples / documentation would really help, thank you! |
At minimum you need to provide the certificate and private key that the server must use to secure the communication. Without this, no key exchange can happen: none of the commonly-used ciphers are applicable and you get the error you reported. As Vincent mentioned, you can get increased security by providing Diffie-Hellman parameters in |
Hey,
First, thank you for creating this.
I'm switching from HsOpenSSL (it doesn't support ALPN), but I'm getting
no ciphers available with those parameters
, here is my code:I generated my certificate and key using openssl:
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -nodes -days 365
I digged into the code, and I see ciphers get filtered out in getCiphers, but I don't understand why all the ciphers get filtered out in my case.
P.S: I think it would be great to have examples, makes usage much easier for users.
The text was updated successfully, but these errors were encountered: