Hi Giuseppe,
To enable both TLS 1.2 and TLS 1.3 on the same ssl-context in WildFly, you should specify the protocols attribute like this, using a comma-separated list (not square brackets):
<server-ssl-context name="applicationSSC" cipher-suite-names="TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256"
protocols="TLSv1.3,TLSv1.2" key-manager="applicationKM"/>
However, note that the cipher suites for TLS 1.2 are different from those for 1.3, so you can't use only TLS 1.3 ciphers for both. You either need to:
Define an ssl-context that only uses cipher suites compatible with both protocols (which is very limited),
Or, the recommended approach is to create two separate ssl-contexts for TLSv1.2 and TLSv1.3, each with the appropriate cipher suites, and then associate those with different https-listeners (they can use the same socket-binding).
The official WildFly Elytron documentation provides further details for the server-ssl-context attributes and correct protocol/cipher settings.
Let me know if you need the exact documentation link or more details!
--
You received this message because you are subscribed to the Google Groups "WildFly" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wildfly+u...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wildfly/0f1eee57-41f9-4457-9d81-73f1bd68ea12n%40googlegroups.com.
<server name="default-server">
<https-listener name="tlsv1.3"
socket-binding="https" ssl-context="applicationSSC-TLSv1.3" enable-http2="true"/>
<https-listener name="tlsv1.2"
socket-binding="https" ssl-context="applicationSSC-TLSv1.2" enable-http2="true"/>
[...]
OPVDX001: Validation error in standalone.xml -----------------------------------
|
| 369: cipher-suite-names="TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256"
| 370: protocols="TLSv1.3,TLSv1.2"
| 371: key-manager="applicationKM"/>
| ^^^^ Invalid value TLSv1.3,TLSv1.2 for protocols; legal values are
| [\"SSLv2\", \"SSLv2Hello\", \"SSLv3\", \"TLSv1\", \"TLSv1.1\",
| \"TLSv1.2\", \"TLSv1.3\"]
|
| 372:
| 373: </server-ssl-contexts>
| 374: </tls>
Hi, You need just one http listener with two protocols and protocols separate with space not with comma.<subsystem xmlns="urn:jboss:domain:elytron:..."> ...<tls>TLSv1.2" key-manager="ssl-realm-manager"/>
<key-stores>
<key-store name="ssl-realm">
<credential-reference clear-text="mypassword"/>
<implementation type="JKS"/>
<file path="ssl/myfile.jks" relative-to="jboss.server.config.dir"/>
</key-store>
</key-stores>
<key-managers>
<key-manager name="ssl-realm-manager" key-store="ssl-realm">
<credential-reference clear-text="mypassword"/>
</key-manager>
</key-managers>
<server-ssl-contexts>
<server-ssl-context name="ssl-realm-context" cipher-suite-names="LS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384" protocols="TLSv1.3</server-ssl-contexts>
</tls>
<subsystem xmlns="urn:jboss:domain:undertow:...>
<server name="default-server">
<http-listener name="default" socket-binding="http" record-request-start-time="true" no-request-timeout="60000" redirect-socket="https" enable-http2="true"/>
<https-listener name="https" socket-binding="https" ssl-context="ssl-realm-context" enable-http2="true"/>
Regards,JS--
You received this message because you are subscribed to the Google Groups "WildFly" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wildfly+u...@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/wildfly/2cbfea92d042f4347ed11ef7b9a8a209d3eda7ad.camel%40gmail.com.
Or, the recommended approach is to create two separate ssl-contexts for TLSv1.2 and TLSv1.3, each with the appropriate cipher suites, and then associate those with different https-listeners (they can use the same socket-binding).