We're planning on doing an offiicial 1.0 release of both trapperkeeper[1]
and trapperkeeper-webserver-jetty9[2] in the not-too-distant future, and in
that announcement e-mail we can highlight some of the new features that
have been added over the last few months.  However, due to the recent
"poodle" security vulnerability announcement, we wanted to go ahead and
send out a heads-up that we've done a v0.9.0 release of
trapperkeeper-webserver-jetty9.  This release addresses the security
vulnerability in the SSLv3 protocol by configuring Jetty to only accept
TLSv1, TLSv1.1, or TLSv1.2 connections by default.

Note that in older versions of trapperkeeper-webserver-jetty9, you can
specify your preferred list of SSL protocols via the `ssl-protocols`
setting[3], but if you upgrade to v0.9.0 then it'll be taken care of by
default.

A more comprehensive 1.0 announcement will be coming in the next month or
two.

[1] https://github.com/puppetlabs/trapperkeeper
[2] https://github.com/puppetlabs/trapperkeeper-webserver-jetty9
[3]
https://github.com/puppetlabs/trapperkeeper-webserver-jetty9/blob/master/doc/jetty-config.md#ssl-protocols

-- 
You received this message because you are subscribed to the Google
Groups "Clojure" group.
To post to this group, send email to clojure@googlegroups.com
Note that posts from new members are moderated - please be patient with your 
first post.
To unsubscribe from this group, send email to
clojure+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/clojure?hl=en
--- 
You received this message because you are subscribed to the Google Groups 
"Clojure" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to clojure+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to