Hi Mark,

I was really interested in your advice. I'm glad you answered, thanks!
I'm trying not the disable TLS1.0 because I did a site that is being uses
by unknown people over the internet, and I don't one how many of them are
using a browser that only works with TLS1.0.
Where can I get the list of all available ciphers for Sun JVM 6 update 35?
I would like to get the complete list, and then remove the CBC ones. Right
now I'm using just 3, from which one uses CBC:
ciphers="SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA"
Besides removing the last one, which ones should I add?





On Sat, Sep 15, 2012 at 2:57 AM, Mark Thomas <ma...@apache.org> wrote:

> Brian Braun <brianbr...@gmail.com> wrote:
>
> >Hi,
> >
> >Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for
> >Tomcat
> >7.x?
> >For more info about this attack:
> >http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
> >
> >My toughts and questions, as far as I have investigated this issue:
> >
> >- Disabling the TLS1.0 protocol would be too restrictive, because there
> >are
> >still browser versions in use that don't support TLS1.1 or TLS1.2.
> >- Should we restrict the ciphers in use? If so, which ones should we
> >offer
> >for Tomcat 7.X over JVM1.6 and using a GeoCerts certificate (which
> >means
> >JSSE instead of OpenSSL)?
>
> Any strong ciphers available with your JVM that don't use CBC.
>
> >- Will upgrading to the latest JVM (as of today, Sept 14th 2012) solve
> >this
> >issue?
>
> Unlikely. What it may do is give you more cipher options. Java 7 also - I
> think but haven't check my recollection - supports the later TLS versions.
>
> Mark
>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to