-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Baron,

On 1/8/13 9:55 PM, Baron Fujimoto wrote:
> However, when I test this by attempting connections with a
> script[*]

You could use 'sslscan' which is available directly from many Linux
package managers. You can also use online tools like Qualys's
scanner[1], which tells you which vulnerabilities you might have such
as BEAST, CRIME, client-renegotiation, etc.

Worth mentioning: I'm not sure how to do such a thing with the JSSE
SSL implementation, but if you use APR/native with OpenSSL, you want
to enable the "honor server cipher order" flag. Unfortunately, this
won't work quite properly with Tomcat right now due to a series of
prerequisites that need to fall into place for it to work correctly
([2] and [3]).

- -chris

[1] https://www.ssllabs.com/ssltest/index.html
[2] https://issues.apache.org/bugzilla/show_bug.cgi?id=53481
[3] https://issues.apache.org/bugzilla/show_bug.cgi?id=53969
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iEYEAREIAAYFAlDthjcACgkQ9CaO5/Lv0PDrpwCgr19iDh6kKGKN7jjM6WmkfZFe
xH0AniNsKyyjYQnivoCPJmw+koye3AXS
=jvUJ
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to