Some legacy systems may still be tied to the older, insecure TLSv1 and TLSv1.1 protocols. Starting with OpenJDK 11.0.11, these protocol versions are disabled by default.
To re-enable, users must perform these steps:
./conf/security/
jdk.tls.disabledAlgorithms
TLSv1
and/or TLSv1.1
javax.net.ssl.SSLHandshakeException: Received fatal alert: handshake_failure
Applications that need to establish secure connections (e.g., HTTPS, SFTP, etc) must run on a Java runtime with a compatible security provider for the Java Cryptography Architecture (JCA). The OpenJDK project contains a default implementation provider - the Java Cryptography Extension (JCE) - in the jdk.crypto.ec
.
If your application requires establishing secure connections, make sure the module jdk.crypto.ec
is included in the assembled Java runtime, or that a 3rd-party provider (e.g., BouncyCastle) is included.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4