Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-19 Thread Pid *
Martin, You know what a turtle is? p On 15 Sep 2012, at 13:30, Martin Gainty wrote: > > Good Morning Brian > > from what Im seeing this is a Redhat Enterprise 4,5,6 bug which effects any > of the secure protocols such as sftp, scp and ssl and you would need to > implement the RH patch > ds

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Brian, On 9/15/12 2:59 PM, Brian Braun wrote: > Where can I get the list of all available ciphers for Sun JVM 6 > update 35? Using Java 6u35, run this code (apologies for any poor word wrapping). Enjoy, - -chris import java.util.ArrayList; import j

Re: Is there a REAL solution to the

2012-09-15 Thread Brian Braun
Thanks a lot for the tip Edward. I will research it. However, I would have to stop using JSSE in Tomcat and start using APR. Maybe I should, I really don't know if it is supposed to be better than JSSE but I will investigate. On Sat, Sep 15, 2012 at 10:10 AM, Edward Bicker wrote: > Yeah, but I t

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Brian Braun
Well, I'm using JVM1.6 Update 35 (the latest). I want the best encription I can get, while at the same time I want it to be near to 100% compatible with all my possible internet visitor's browsers, and also I want to pass the PCI test that www.secritymetrics.com performs. I have humble requirements

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Mark Thomas
On 15/09/2012 19:59, Brian Braun wrote: > Hi Mark, > > I was really interested in your advice. I'm glad you answered, thanks! > I'm trying not the disable TLS1.0 because I did a site that is being uses > by unknown people over the internet, and I don't one how many of them are > using a browser th

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Brian Braun
Hi Mark, I was really interested in your advice. I'm glad you answered, thanks! I'm trying not the disable TLS1.0 because I did a site that is being uses by unknown people over the internet, and I don't one how many of them are using a browser that only works with TLS1.0. Where can I get the list

Re: Is there a REAL solution to the

2012-09-15 Thread Edward Bicker
Yeah, but I thought OpenSSL had a patch for this that worked. Read...#2635: 1/n-1 record splitting technique for CVE-2011-3389 -Original Message- >From: Brian Braun >Sent: Sep 14, 2012 11:12 PM >To: Tomcat Users List >Subject: Is there a REAL solution to the "BEAST attack" (CVE-2011-338

RE: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Martin Gainty
Good Morning Brian from what Im seeing this is a Redhat Enterprise 4,5,6 bug which effects any of the secure protocols such as sftp, scp and ssl and you would need to implement the RH patch dsiable TLS 1.0 and implement either TLS 1.1 or TLS 1.2 protocols in its place disable applets disable W

Re: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat 7.x

2012-09-15 Thread Mark Thomas
Brian Braun wrote: >Hi, > >Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for >Tomcat >7.x? >For more info about this attack: >http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389 > >My toughts and questions, as far as I have investigated this issue: > >- Disabling the TL