Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Brian, On 9/15/12 2:59 PM, Brian Braun wrote: > Where can I get the list of all available ciphers for Sun JVM 6 > update 35? Using Java 6u35, run this code (apologies for any poor word wrapping). Enjoy, - -chris import java.util.ArrayList; import j

Re: Is there a REAL solution to the

2012-09-15 Thread Brian Braun
Thanks a lot for the tip Edward. I will research it. However, I would have to stop using JSSE in Tomcat and start using APR. Maybe I should, I really don't know if it is supposed to be better than JSSE but I will investigate. On Sat, Sep 15, 2012 at 10:10 AM, Edward Bicker wrote: > Yeah, but I t

Re: SSL Vulnerability in Tomcat and/or JVM?

2012-09-15 Thread Brian Braun
Thanks a lot Dan. I will do. I just hope all internet visitors will still be able to browse by site. Do you think they will? How important could the CBC ciphers be? On Sat, Sep 15, 2012 at 10:57 AM, Dan Chernoff wrote: > Your only other real option is remove any CBC and diffehelmen ciphers from

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Brian Braun
Well, I'm using JVM1.6 Update 35 (the latest). I want the best encription I can get, while at the same time I want it to be near to 100% compatible with all my possible internet visitor's browsers, and also I want to pass the PCI test that www.secritymetrics.com performs. I have humble requirements

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Mark Thomas
On 15/09/2012 19:59, Brian Braun wrote: > Hi Mark, > > I was really interested in your advice. I'm glad you answered, thanks! > I'm trying not the disable TLS1.0 because I did a site that is being uses > by unknown people over the internet, and I don't one how many of them are > using a browser th

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Brian Braun
Hi Mark, I was really interested in your advice. I'm glad you answered, thanks! I'm trying not the disable TLS1.0 because I did a site that is being uses by unknown people over the internet, and I don't one how many of them are using a browser that only works with TLS1.0. Where can I get the list

Re: SSL Vulnerability in Tomcat and/or JVM?

2012-09-15 Thread Dan Chernoff
Your only other real option is remove any CBC and diffehelmen ciphers from your supported cipher list. This really only leaves you with RC4 ciphers. Dan On Sep 14, 2012, at 5:14 PM, Brian Braun wrote: > Hi Dan, > > Thanks a lot for your response! > Contacting them will not work. I have had fa

Re: Is there a REAL solution to the

2012-09-15 Thread Edward Bicker
Yeah, but I thought OpenSSL had a patch for this that worked. Read...#2635: 1/n-1 record splitting technique for CVE-2011-3389 -Original Message- >From: Brian Braun >Sent: Sep 14, 2012 11:12 PM >To: Tomcat Users List >Subject: Is there a REAL solution to the "BEAST attack" (CVE-2011-338

RE: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Martin Gainty
Good Morning Brian from what Im seeing this is a Redhat Enterprise 4,5,6 bug which effects any of the secure protocols such as sftp, scp and ssl and you would need to implement the RH patch dsiable TLS 1.0 and implement either TLS 1.1 or TLS 1.2 protocols in its place disable applets disable W

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Mark Thomas
Brian Braun wrote: >Hi, > >Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for >Tomcat >7.x? >For more info about this attack: >http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389 > >My toughts and questions, as far as I have investigated this issue: > >- Disabling the TL