Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • Home
  • SEARCH
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 43903
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 10, 20262026-05-10T15:34:06+00:00 2026-05-10T15:34:06+00:00

I’m trying to create a self signed certificate for use with Apache Tomcat 6.

  • 0

I’m trying to create a self signed certificate for use with Apache Tomcat 6. Every certificate I can make always results in the browser connecting with AES-128. The customer would like me to demonstrate that I can create a connection at AES-256.

I’ve tried java’s keytool and openssl. I’ve tried with a variety of parameters, but can’t seem to specify anything about the keysize, just the signature size.

How can I get the browser-tomcat connection to use AES-256 with a self signed certificate?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. 2026-05-10T15:34:07+00:00Added an answer on May 10, 2026 at 3:34 pm

    Okie doke, I think I just figured this out.

    As I said above, the key bit of knowledge is that the cert doesn’t matter, so long as it’s generated with an algorithm that supports AES 256-bit encryption (e.g., RSA). Just to make sure that we’re on the same page, for my testing, I generated my self-signed cert using the following:

    keytool -genkey -alias tomcat -keyalg RSA 

    Now, you have to make sure that your Java implementation on your server supports AES-256, and this is the tricky bit. I did my testing on an OS X (OS 10.5) box, and when I checked to see the list of ciphers that it supported by default, AES-256 was NOT on the list, which is why using that cert I generated above only was creating an AES-128 connection between my browser and Tomcat. (Well, technically, TLS_RSA_WITH_AES_256_CBC_SHA was not on the list — that’s the cipher that you want, according to this JDK 5 list.)

    For completeness, here’s the short Java app I created to check my box’s supported ciphers:

    import java.util.Arrays; import javax.net.ssl.SSLSocketFactory;  public class CipherSuites {   public static void main(String[] args) {     SSLSocketFactory sslsf = (SSLSocketFactory) SSLSocketFactory.getDefault();     String[] ciphers = sslsf.getDefaultCipherSuites();     Arrays.sort(ciphers);     for (String cipher : ciphers) {       System.out.println(cipher);     }   } } 

    It turns out that JDK 5, which is what this OS X box has installed by default, needs the ‘Unlimited Strength Jurisdiction Policy Files’ installed in order to tell Java that it’s OK to use the higher-bit encryption levels; you can find those files here (scroll down and look at the top of the ‘Other Downloads’ section). I’m not sure offhand if JDK 6 needs the same thing done, but the same policy files for JDK 6 are available here, so I assume it does. Unzip that file, read the README to see how to install the files where they belong, and then check your supported ciphers again… I bet AES-256 is now on the list.

    If it is, you should be golden; just restart Tomcat, connect to your SSL instance, and I bet you’ll now see an AES-256 connection.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 51k
  • Answers 51k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • added an answer If your addition code is correct, and your subtraction isn't,… May 11, 2026 at 6:26 am
  • added an answer The first plan doesn't use index on shows. If you… May 11, 2026 at 6:26 am
  • added an answer You can create a subclass of ViewController and add three… May 11, 2026 at 6:26 am

Top Members

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.