Customer has issues using TLS1.2, can that be caused by the certificate we use?

Please fill out the fields below so we can help you better. Note: you must provide your domain name to get help. Domain names for issued certificates are all made public in Certificate Transparency logs (e.g. crt.sh | example.com), so withholding your domain name here does not increase secrecy, but only makes it harder for us to provide help.

My domain is:edi.ibdata.org:4647

I ran this command:
openssl ciphers -v shows all available ciphers, including TLS1.2 but the Altova Flowforceservice does not offer TLS1.2

It produced this output:

My web server is (include version):Altova Flowforce 2024

The operating system my web server runs on is (include version):Ubuntu Focal

My hosting provider, if applicable, is:TransIp VPS

I can login to a root shell on my machine (yes or no, or I don't know):yes

I'm using a control panel to manage my site (no, or provide the name and version of the control panel):also available but SSH is better.

The version of my client is (e.g. output of certbot --version or certbot-auto --version if you're using Certbot):not certbot related i think

Yes, your services certificate will have either an RSA or EC key and these map to different cipher suites when the client is negotiating the TLS connection with you. Both the client and your service have to agree on a cipher suite you both support.

As an example some older versions of Windows Server don't have ECDSA cipher suites enabled, even if TLS 1.2 is enabled. So although they can start to negotiate using TLS1.2 if a matching cipher suites isn't enabled at the client then they wont be able to complete the negotiation.

The most compatible is an RSA key (and associated cipher suites), so if you have clients you can't control then an RSA keyed certificate will provide more compatibility.

3 Likes

Every test we have done ourself using openssl s_client also confirms that TLS1.2 will not work, so this is not limited to just 1 client.. Could it still be the cert then? (this is what openssl reports:)

0 s:CN = DOMAININQUESTION.ORG
i:C = US, O = Let's Encrypt, CN = E5
a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384
v:NotBefore: Jul 26 21:35:31 2025 GMT; NotAfter: Oct 24 21:35:30 2025 GMT
1 s:C = US, O = Let's Encrypt, CN = E5
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256
v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT

Checking the host you originally provided it looks like your server is only configured to support TLS 1.3 - so it's not really the clients fault that TLS1.2 doesn't work.

4 Likes

If you are unable to configure your service to support TLS1.2 and your client doesn't support TLS1.3 (many don't) you could run a reverse proxy on your server to handle the https conversations between the client and the altova service, however it seems highly unlikely that altova doesn't support TLS1.2 at all.

2 Likes

I Totally agree with you here. weird thing is, this machine is running ubuntu focal, and all the ciphers for TLS1.2 are present but we just cannot get it to work so that is why i needed to check if the cause is not the certificate. We use the same certificate on an other proxy as well and on that machine it work like a charm.

I understand that this is clearly not an issue for this forum so i am going to look elsewhere, but it puzzles me, how it can even be done, configureing a linux machine to only support TLS1.3..

(for those who are intrested, the /etc/ssl/openssl.cnf has this in the config:)

[ system_default_sect ]
MinProtocol = TLSv1.2
MaxProtocol = TLSv1.3
CipherString = DEFAULT@SECLEVEL=2

But again, i understand i should not ask for assistance in this matter in this forum, i will ask this in ubuntu forums... .. Thanks for your help though @webprofusion !!! Highly appreciated!

I'd think asking on the Altova Flowforce support / forums would be better. It is the TLS Server that is not accepting TLS 1.2

You should also check the cert chain although this is not causing this problem. You are sending the leaf cert twice

openssl s_client -tls1_3 -connect edi.ibdata.org:4647
--
Certificate chain
 0 s:CN = ibdata.org
   i:C = US, O = Let's Encrypt, CN = E5
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384
   v:NotBefore: Jul 26 21:35:31 2025 GMT; NotAfter: Oct 24 21:35:30 2025 GMT
 1 s:C = US, O = Let's Encrypt, CN = E5
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   a:PKEY: id-ecPublicKey, 384 (bit); sigalg: RSA-SHA256
   v:NotBefore: Mar 13 00:00:00 2024 GMT; NotAfter: Mar 12 23:59:59 2027 GMT
 2 s:CN = ibdata.org
   i:C = US, O = Let's Encrypt, CN = E5
   a:PKEY: id-ecPublicKey, 256 (bit); sigalg: ecdsa-with-SHA384
   v:NotBefore: Jul 26 21:35:31 2025 GMT; NotAfter: Oct 24 21:35:30 2025 GMT
4 Likes

We have already contacted the Altova support, they claim not to do anything with SSL/TLS, they "use" whatever the system has.. so according to them, it is a system limitation...

thanks for the remark on the leaf cert, i will look into that!..

Kind regards,
Beheer

1 Like

You could test if your system can handle tls1.2 with some other server. Even openssl itself

Ex:

sudo openssl s_server -accept 443 -cert /path/fullchain.pem -key /path/privkey.pem

Then from another system use openssl to test connection

sudo openssl s_client -tls1_2 -connect [IP of s_server]:443

You don't have to use port 443

If nothing else this removes Altova from equation when posting at Ubuntu forum or ServerFault or similar.

If this works your question to Altova becomes more focused :slight_smile:

2 Likes

I have checked the proftpd also running on this machine:

openssl s_client -tls1_2 -connect 127.0.0.1:21 -starttls ftp

gave me this.. guess this means we do have to take it up with Altova..
Thanks for your help!

New, TLSv1.2, Cipher is ECDHE-ECDSA-AES256-GCM-SHA384
Server public key is 256 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-ECDSA-AES256-GCM-SHA384
Session-ID: EC28511164C0CCE3C8E1235B5B7576C8E3B16112A874A023C74801387563D910
Session-ID-ctx:
Master-Key: 654BFD0AB2695C14F7912CF74574CAF63FCA3920B763D7F710C3B6354BAC350BF3E175AFF5F7A6C801F02DAC0A9F8D43
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1756817925
Timeout : 7200 (sec)
Verify return code: 0 (ok)
Extended master secret: yes

220 ProFTPD Server ready.

1 Like

This topic was automatically closed 30 days after the last reply. New replies are no longer allowed.