Closed ju1ius closed 4 years ago
Hello,
Could you paste here (or send to support@blackfire.io) the output of
php -r "var_dump(json_decode(file_get_contents('https://www.howsmyssl.com/a/check'), true));"
?
@iamluc Sure, here it is:
array(10) {
["given_cipher_suites"]=>
array(75) {
[0]=>
string(22) "TLS_AES_256_GCM_SHA384"
[1]=>
string(28) "TLS_CHACHA20_POLY1305_SHA256"
[2]=>
string(22) "TLS_AES_128_GCM_SHA256"
[3]=>
string(37) "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256"
[4]=>
string(39) "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256"
[5]=>
string(37) "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"
[6]=>
string(39) "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"
[7]=>
string(35) "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256"
[8]=>
string(35) "TLS_DHE_DSS_WITH_AES_128_GCM_SHA256"
[9]=>
string(35) "TLS_DHE_DSS_WITH_AES_256_GCM_SHA384"
[10]=>
string(35) "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384"
[11]=>
string(37) "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256"
[12]=>
string(39) "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256"
[13]=>
string(34) "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"
[14]=>
string(36) "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA"
[15]=>
string(37) "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384"
[16]=>
string(39) "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384"
[17]=>
string(34) "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA"
[18]=>
string(36) "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA"
[19]=>
string(35) "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256"
[20]=>
string(32) "TLS_DHE_RSA_WITH_AES_128_CBC_SHA"
[21]=>
string(35) "TLS_DHE_DSS_WITH_AES_128_CBC_SHA256"
[22]=>
string(35) "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256"
[23]=>
string(32) "TLS_DHE_DSS_WITH_AES_256_CBC_SHA"
[24]=>
string(32) "TLS_DHE_RSA_WITH_AES_256_CBC_SHA"
[25]=>
string(31) "TLS_RSA_WITH_AES_128_GCM_SHA256"
[26]=>
string(31) "TLS_RSA_WITH_AES_256_GCM_SHA384"
[27]=>
string(34) "TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8"
[28]=>
string(32) "TLS_ECDHE_ECDSA_WITH_AES_128_CCM"
[29]=>
string(30) "TLS_DHE_RSA_WITH_AES_128_CCM_8"
[30]=>
string(28) "TLS_DHE_RSA_WITH_AES_128_CCM"
[31]=>
string(32) "TLS_DHE_DSS_WITH_AES_128_CBC_SHA"
[32]=>
string(26) "TLS_RSA_WITH_AES_128_CCM_8"
[33]=>
string(24) "TLS_RSA_WITH_AES_128_CCM"
[34]=>
string(31) "TLS_RSA_WITH_AES_128_CBC_SHA256"
[35]=>
string(28) "TLS_RSA_WITH_AES_128_CBC_SHA"
[36]=>
string(34) "TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8"
[37]=>
string(32) "TLS_ECDHE_ECDSA_WITH_AES_256_CCM"
[38]=>
string(30) "TLS_DHE_RSA_WITH_AES_256_CCM_8"
[39]=>
string(28) "TLS_DHE_RSA_WITH_AES_256_CCM"
[40]=>
string(35) "TLS_DHE_DSS_WITH_AES_256_CBC_SHA256"
[41]=>
string(26) "TLS_RSA_WITH_AES_256_CCM_8"
[42]=>
string(24) "TLS_RSA_WITH_AES_256_CCM"
[43]=>
string(31) "TLS_RSA_WITH_AES_256_CBC_SHA256"
[44]=>
string(28) "TLS_RSA_WITH_AES_256_CBC_SHA"
[45]=>
string(45) "TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256"
[46]=>
string(43) "TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
[47]=>
string(41) "TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256"
[48]=>
string(40) "TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384"
[49]=>
string(38) "TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384"
[50]=>
string(36) "TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384"
[51]=>
string(36) "TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384"
[52]=>
string(40) "TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256"
[53]=>
string(38) "TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256"
[54]=>
string(36) "TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256"
[55]=>
string(36) "TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256"
[56]=>
string(44) "TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384"
[57]=>
string(42) "TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384"
[58]=>
string(40) "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256"
[59]=>
string(40) "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256"
[60]=>
string(44) "TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256"
[61]=>
string(42) "TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
[62]=>
string(40) "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256"
[63]=>
string(40) "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256"
[64]=>
string(37) "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA"
[65]=>
string(37) "TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA"
[66]=>
string(37) "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA"
[67]=>
string(37) "TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA"
[68]=>
string(32) "TLS_RSA_WITH_ARIA_256_GCM_SHA384"
[69]=>
string(32) "TLS_RSA_WITH_ARIA_128_GCM_SHA256"
[70]=>
string(36) "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256"
[71]=>
string(36) "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256"
[72]=>
string(33) "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA"
[73]=>
string(33) "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA"
[74]=>
string(33) "TLS_EMPTY_RENEGOTIATION_INFO_SCSV"
}
["ephemeral_keys_supported"]=>
bool(true)
["session_ticket_supported"]=>
bool(true)
["tls_compression_supported"]=>
bool(false)
["unknown_cipher_suite_supported"]=>
bool(false)
["beast_vuln"]=>
bool(false)
["able_to_detect_n_minus_one_splitting"]=>
bool(false)
["insecure_cipher_suites"]=>
array(0) {
}
["tls_version"]=>
string(7) "TLS 1.3"
["rating"]=>
string(13) "Probably Okay"
}
Could you check your openssl version?
You can know it with openssl version
It could be a bug in openssl 1.1.1e (https://github.com/openssl/openssl/issues/11378). So if you are using this version. Please try to downgrade to 1.1.1d or upgrade to 1.1.1f.
Hi, just ran a dist-upgrade today:
$ openssl version
OpenSSL 1.1.1f 31 Mar 2020
And the issue is gone ! :tada: So yeah, could very well relate to the openssl issue you mentioned...
Great news! :tada:
Hi,
I started to get this error after upgrading agent & SDK to 1.32:
The error happens when the client tries to request the url
https://blackfire.io/api/v1/signing