I think https://bugzilla.redhat.com/show_bug.cgi?id=1022950 is related, if not the same issue.
This is the difference on Jesus' machine when the PKCS11 NSS provider is enabled and when it isn't:
+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 +TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_RSA_WITH_AES_256_CBC_SHA256 +TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384 +TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 +TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA +TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA TLS_RSA_WITH_AES_256_CBC_SHA +TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA +TLS_ECDH_RSA_WITH_AES_256_CBC_SHA TLS_DHE_RSA_WITH_AES_256_CBC_SHA TLS_DHE_DSS_WITH_AES_256_CBC_SHA +TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 +TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 +TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256 +TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 +TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA +TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA TLS_RSA_WITH_AES_128_CBC_SHA +TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA +TLS_ECDH_RSA_WITH_AES_128_CBC_SHA TLS_DHE_RSA_WITH_AES_128_CBC_SHA TLS_DHE_DSS_WITH_AES_128_CBC_SHA +TLS_ECDHE_ECDSA_WITH_RC4_128_SHA +TLS_ECDHE_RSA_WITH_RC4_128_SHA SSL_RSA_WITH_RC4_128_SHA +TLS_ECDH_ECDSA_WITH_RC4_128_SHA +TLS_ECDH_RSA_WITH_RC4_128_SHA +TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA +TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_3DES_EDE_CBC_SHA +TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA +TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA SSL_RSA_WITH_RC4_128_MD5 TLS_EMPTY_RENEGOTIATION_INFO_SCSV TLS_DH_anon_WITH_AES_256_CBC_SHA256 +TLS_ECDH_anon_WITH_AES_256_CBC_SHA TLS_DH_anon_WITH_AES_256_CBC_SHA TLS_DH_anon_WITH_AES_128_CBC_SHA256 +TLS_ECDH_anon_WITH_AES_128_CBC_SHA TLS_DH_anon_WITH_AES_128_CBC_SHA +TLS_ECDH_anon_WITH_RC4_128_SHA SSL_DH_anon_WITH_RC4_128_MD5 +TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA SSL_DH_anon_WITH_3DES_EDE_CBC_SHA TLS_RSA_WITH_NULL_SHA256 +TLS_ECDHE_ECDSA_WITH_NULL_SHA +TLS_ECDHE_RSA_WITH_NULL_SHA SSL_RSA_WITH_NULL_SHA +TLS_ECDH_ECDSA_WITH_NULL_SHA +TLS_ECDH_RSA_WITH_NULL_SHA +TLS_ECDH_anon_WITH_NULL_SHA SSL_RSA_WITH_NULL_MD5 SSL_RSA_WITH_DES_CBC_SHA SSL_DHE_RSA_WITH_DES_CBC_SHA
So, with it enabled, the SSL connection is trying to use TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 and failing because NSS doesn't actually support it.
I didn't get the ECC algorithms on my local RHEL machine (latest 6.4). Has there been a change in NSS?
I think https:/ /bugzilla. redhat. com/show_ bug.cgi? id=1022950 is related, if not the same issue.
This is the difference on Jesus' machine when the PKCS11 NSS provider is enabled and when it isn't:
+TLS_ECDHE_ ECDSA_WITH_ AES_256_ CBC_SHA384 RSA_WITH_ AES_256_ CBC_SHA384 WITH_AES_ 256_CBC_ SHA256 ECDSA_WITH_ AES_256_ CBC_SHA384 RSA_WITH_ AES_256_ CBC_SHA384 RSA_WITH_ AES_256_ CBC_SHA256 DSS_WITH_ AES_256_ CBC_SHA256 ECDSA_WITH_ AES_256_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA WITH_AES_ 256_CBC_ SHA ECDSA_WITH_ AES_256_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA RSA_WITH_ AES_256_ CBC_SHA DSS_WITH_ AES_256_ CBC_SHA ECDSA_WITH_ AES_128_ CBC_SHA256 RSA_WITH_ AES_128_ CBC_SHA256 WITH_AES_ 128_CBC_ SHA256 ECDSA_WITH_ AES_128_ CBC_SHA256 RSA_WITH_ AES_128_ CBC_SHA256 RSA_WITH_ AES_128_ CBC_SHA256 DSS_WITH_ AES_128_ CBC_SHA256 ECDSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA WITH_AES_ 128_CBC_ SHA ECDSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA RSA_WITH_ AES_128_ CBC_SHA DSS_WITH_ AES_128_ CBC_SHA ECDSA_WITH_ RC4_128_ SHA RSA_WITH_ RC4_128_ SHA WITH_RC4_ 128_SHA ECDSA_WITH_ RC4_128_ SHA RSA_WITH_ RC4_128_ SHA ECDSA_WITH_ 3DES_EDE_ CBC_SHA RSA_WITH_ 3DES_EDE_ CBC_SHA WITH_3DES_ EDE_CBC_ SHA ECDSA_WITH_ 3DES_EDE_ CBC_SHA RSA_WITH_ 3DES_EDE_ CBC_SHA RSA_WITH_ 3DES_EDE_ CBC_SHA DSS_WITH_ 3DES_EDE_ CBC_SHA WITH_RC4_ 128_MD5 RENEGOTIATION_ INFO_SCSV anon_WITH_ AES_256_ CBC_SHA256 anon_WITH_ AES_256_ CBC_SHA anon_WITH_ AES_256_ CBC_SHA anon_WITH_ AES_128_ CBC_SHA256 anon_WITH_ AES_128_ CBC_SHA anon_WITH_ AES_128_ CBC_SHA anon_WITH_ RC4_128_ SHA anon_WITH_ RC4_128_ MD5 anon_WITH_ 3DES_EDE_ CBC_SHA anon_WITH_ 3DES_EDE_ CBC_SHA WITH_NULL_ SHA256 ECDSA_WITH_ NULL_SHA RSA_WITH_ NULL_SHA WITH_NULL_ SHA ECDSA_WITH_ NULL_SHA RSA_WITH_ NULL_SHA anon_WITH_ NULL_SHA WITH_NULL_ MD5 WITH_DES_ CBC_SHA RSA_WITH_ DES_CBC_ SHA
+TLS_ECDHE_
TLS_RSA_
+TLS_ECDH_
+TLS_ECDH_
TLS_DHE_
TLS_DHE_
+TLS_ECDHE_
+TLS_ECDHE_
TLS_RSA_
+TLS_ECDH_
+TLS_ECDH_
TLS_DHE_
TLS_DHE_
+TLS_ECDHE_
+TLS_ECDHE_
TLS_RSA_
+TLS_ECDH_
+TLS_ECDH_
TLS_DHE_
TLS_DHE_
+TLS_ECDHE_
+TLS_ECDHE_
TLS_RSA_
+TLS_ECDH_
+TLS_ECDH_
TLS_DHE_
TLS_DHE_
+TLS_ECDHE_
+TLS_ECDHE_
SSL_RSA_
+TLS_ECDH_
+TLS_ECDH_
+TLS_ECDHE_
+TLS_ECDHE_
SSL_RSA_
+TLS_ECDH_
+TLS_ECDH_
SSL_DHE_
SSL_DHE_
SSL_RSA_
TLS_EMPTY_
TLS_DH_
+TLS_ECDH_
TLS_DH_
TLS_DH_
+TLS_ECDH_
TLS_DH_
+TLS_ECDH_
SSL_DH_
+TLS_ECDH_
SSL_DH_
TLS_RSA_
+TLS_ECDHE_
+TLS_ECDHE_
SSL_RSA_
+TLS_ECDH_
+TLS_ECDH_
+TLS_ECDH_
SSL_RSA_
SSL_RSA_
SSL_DHE_
So, with it enabled, the SSL connection is trying to use TLS_ECDHE_ ECDSA_WITH_ AES_256_ CBC_SHA384 and failing because NSS doesn't actually support it.
I didn't get the ECC algorithms on my local RHEL machine (latest 6.4). Has there been a change in NSS?