1
0
-1

Hello team, how are you? One of my servers, running Joget 6, started having problems with sending mail. Apparently, the protocol associated with the joget plugin can no longer contact the server. In a recent version of Joget 7 the problem does not appear. Is there any possibility of doing some kind of update? Will the mail have to be migrated to another service? The information in the log: 

Caused by: javax.mail.MessagingException: Could not connect to SMTP host: smtp.mail.us-west-2.awsapps.com, port: 465;
  nested exception is:
	javax.net.ssl.SSLHandshakeException: No appropriate protocol (protocol is disabled or cipher suites are inappropriate)
	at com.sun.mail.smtp.SMTPTransport.openServer(SMTPTransport.java:2055)
	at com.sun.mail.smtp.SMTPTransport.protocolConnect(SMTPTransport.java:697)
	at javax.mail.Service.connect(Service.java:386)
	at javax.mail.Service.connect(Service.java:245)
	at javax.mail.Service.connect(Service.java:194)
	at javax.mail.Transport.send0(Transport.java:253)
	at javax.mail.Transport.send(Transport.java:124)
	at org.apache.commons.mail.Email.sendMimeMessage(Email.java:1411)
	... 93 more
    CommentAdd your comment...

    2 answers

    1.  
      2
      1
      0

      Hi, what version of v6 are you running? I believe this may have been addressed in 6.0.32 according to the changelog

        CommentAdd your comment...
      1.  
        2
        1
        0

        According to Google, it could be related to your site SSL certificate or TLS setting. Here are some possible resources to solve your issue:

        On another note, the latest OpenJDK disabled the TLS 1 and 1.1 security, see https://aws.amazon.com/blogs/opensource/tls-1-0-1-1-changes-in-openjdk-and-amazon-corretto/ .

        Here is a workaround, you can follow the suggestion in https://stackoverflow.com/questions/38205947/sslhandshakeexception-no-appropriate-protocol .

        For example: the old setting in /etc/java-11-openjdk/security/java.security is:

        jdk.tls.disabledAlgorithms=SSLv3, TLSv1, TLSv1.1, RC4, DES, MD5withRSA, \ DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ include jdk.disabled.namedCurves

        Change it to the following:

        jdk.tls.disabledAlgorithms=SSLv3, RC4, DES, MD5withRSA, \ DH keySize < 1024, EC keySize < 224, 3DES_EDE_CBC, anon, NULL, \ include jdk.disabled.namedCurves

          CommentAdd your comment...