Re: Restricting ciphers

2013-01-13 Thread Tim Whittington
>>As can be seen from your usage of "keystoreType" attribute, you are >>using Java implementation of the Connector, not openssl/APR one. >> >>You should look into Java documentation for their cipher names. >> >>See this thread from October 2009: >>http://markmail.org/message/zn4namfhypyxum23 > > A

Re: Restricting ciphers

2013-01-11 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Martin, On 1/11/13 9:26 PM, Martin Gainty wrote: >> >> 1. The ciphers parameter in Connecter determines the enabled >> cipher suites in the SSLSocket. See >> SSLSocket.setEnabledCipherSuites(). That in turn restricts which >> actual cipher suite ca

RE: Restricting ciphers

2013-01-11 Thread Martin Gainty
standing is there can be NO handshake as there is a mismatch BETWEENSigning Algo already in use (RSA) with the Signing Algorithm identified by the cipher (IDEA) from the ciphers parameter is this not the case? > > Connection between (1) and (2): zero. MG>agreed > > EJP > >

RE: Restricting ciphers

2013-01-11 Thread Esmond Pitt
35 PM To: Tomcat Users List Subject: RE: Restricting ciphers its a simple question what does ciphers parameter in Connector have anything to do with the supported ciphers from the key itself the 2 are disconnected please dont waste my time and anyone elses with insults when you are unable to

Re: Restricting ciphers

2013-01-11 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Martin, On 1/10/13 11:00 PM, Martin Gainty wrote: > > http://security.stackexchange.com/questions/7440/what-ciphers-should-i-use-in-my-web-server-after-i-configure-my-ssl-certificate > > With a RSA key you can nominally use the "RSA" and "DHE_RSA"

Re: Restricting ciphers

2013-01-11 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Martin, On 1/10/13 10:35 PM, Martin Gainty wrote: > its a simple question what does ciphers parameter in Connector > have anything to do with the supported ciphers from the key itself > the 2 are disconnected Supported ciphers may be set in the con

RE: Restricting ciphers

2013-01-10 Thread Martin Gainty
g on the issuing certificate authority key type. your witness Martin __ > From: mgai...@hotmail.com > To: users@tomcat.apache.org > Subject: RE: Restricting ciphers > Date: Thu, 10 Jan 2013 22:35:05 -0500 > > > its a simple question what does ciphers p

RE: Restricting ciphers

2013-01-10 Thread Martin Gainty
___ When Free Speech and Discovery are replaced by Confusion and Obfuscation its time to move > Date: Thu, 10 Jan 2013 18:25:02 -0500 > From: ch...@christopherschultz.net > To: users@tomcat.apache.org > Subject: Re: Restricting ciphers > > -BEGIN

Re: Restricting ciphers

2013-01-10 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Martin, Honestly, I'm not sure why I'm feeding the troll at this point. Maybe I'm trying to atone for some horrible crime I can't remember. On 1/10/13 10:05 AM, Martin Gainty wrote: > terminology : Nobody was arguing about terminology. Next time,

RE: Restricting ciphers

2013-01-10 Thread Martin Gainty
e algorithm name 3)aggregate cipherSuite by determining Signature specific supported ciphers from Signature algorithm name from http://docs.oracle.com/javase/1.5.0/docs/guide/security/jsse/JSSERefGuide.html 4)reference ciphers attribute from Tomcat Date: Thu, 10 Jan 2013 11:44:49 +0400 > Subject

Re: Restricting ciphers

2013-01-09 Thread Konstantin Kolinko
2013/1/10 Baron Fujimoto : > On Wed, Jan 09, 2013 at 01:08:01PM +0400, Konstantin Kolinko wrote: >>2013/1/9 Baron Fujimoto : >>> I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35. >>> My understanding is that the attack applies only to CBC ciphers, and that >>> RC4 ciphers a

Re: Restricting ciphers

2013-01-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Martin, On 1/9/13 6:27 PM, Martin Gainty wrote: > > how does one divine EPR change from APR to AJP or NIO based on > keystoreType? Great, now /you/ are in on the quantum mechanics jokes around here? *sigh* > if we use curl --key-type Private key

Re: Restricting ciphers

2013-01-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Baron, On 1/9/13 5:22 PM, Baron Fujimoto wrote: > On Wed, Jan 09, 2013 at 01:08:01PM +0400, Konstantin Kolinko > wrote: >> You should look into Java documentation for their cipher names. >> >> See this thread from October 2009: >> http://markmail.

RE: Restricting ciphers

2013-01-09 Thread Martin Gainty
? explain this algorithm please Martin __ do not alter this email communication> Date: Wed, 9 Jan 2013 12:22:27 -1000 > From: ba...@hawaii.edu > To: users@tomcat.apache.org > Subject: Re: Restricting ciphers > > On Wed, Jan 09, 2013 a

Re: Restricting ciphers

2013-01-09 Thread Baron Fujimoto
On Wed, Jan 09, 2013 at 01:08:01PM +0400, Konstantin Kolinko wrote: >2013/1/9 Baron Fujimoto : >> I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35. >> My understanding is that the attack applies only to CBC ciphers, and that >> RC4 ciphers are not vulnerable, so I am attemp

Re: Restricting ciphers

2013-01-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Martin, On 1/9/13 8:33 AM, Martin Gainty wrote: > org.apache.tomcat.util.net.AprEndpoint protected String > SSLCipherSuite = "ALL"; public String getSSLCipherSuite() { return > SSLCipherSuite; } public void setSSLCipherSuite(String > SSLCipherSuite)

Re: Restricting ciphers

2013-01-09 Thread Christopher Schultz
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 Baron, On 1/8/13 9:55 PM, Baron Fujimoto wrote: > However, when I test this by attempting connections with a > script[*] You could use 'sslscan' which is available directly from many Linux package managers. You can also use online tools like Qualys

RE: Restricting ciphers

2013-01-09 Thread Martin Gainty
uot;; public String getSSLCipherSuite() { return SSLCipherSuite; } public void setSSLCipherSuite(String SSLCipherSuite) { this.SSLCipherSuite = SSLCipherSuite; } you found a bug! Martin Gainty __ We have awaken a sleeping bear and filled him with a terrible r

Re: Restricting ciphers

2013-01-09 Thread Konstantin Kolinko
2013/1/9 Baron Fujimoto : > I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35. > My understanding is that the attack applies only to CBC ciphers, and that > RC4 ciphers are not vulnerable, so I am attempting to restrict the set of > ciphers that Tomcat uses with the followin

Restricting ciphers

2013-01-08 Thread Baron Fujimoto
I'm attempting to mitigate BEAST (CVE-2011-3389) attacks on Tomcat 6.0.35. My understanding is that the attack applies only to CBC ciphers, and that RC4 ciphers are not vulnerable, so I am attempting to restrict the set of ciphers that Tomcat uses with the following config for a connector: How