Thanks a lot for the tip Edward. I will research it. However, I would have
to stop using JSSE in Tomcat and start using APR. Maybe I should, I really
don't know if it is supposed to be better than JSSE but I will investigate.

On Sat, Sep 15, 2012 at 10:10 AM, Edward Bicker <g...@travelin.com> wrote:

> Yeah, but I thought OpenSSL had a patch for this that worked.
> Read...#2635: 1/n-1 record splitting technique for CVE-2011-3389
>
>
> -----Original Message-----
> >From: Brian Braun <brianbr...@gmail.com>
> >Sent: Sep 14, 2012 11:12 PM
> >To: Tomcat Users List <users@tomcat.apache.org>
> >Subject: Is there a REAL solution to the "BEAST attack" (CVE-2011-3389)
> for Tomcat 7.x
> >
> >Hi,
> >
> >Is there a REAL solution to the "BEAST attack" (CVE-2011-3389) for Tomcat
> >7.x?
> >For more info about this attack:
> >http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-3389
> >
> >My toughts and questions, as far as I have investigated this issue:
> >
> >- Disabling the TLS1.0 protocol would be too restrictive, because there
> are
> >still browser versions in use that don't support TLS1.1 or TLS1.2.
> >- Should we restrict the ciphers in use? If so, which ones should we offer
> >for Tomcat 7.X over JVM1.6 and using a GeoCerts certificate (which means
> >JSSE instead of OpenSSL)?
> >- Will upgrading to the latest JVM (as of today, Sept 14th 2012) solve
> this
> >issue?
> >
> >Thanks in advace.
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
>
>

Reply via email to