I am using Tomcat 7. I can reproduce the issue even on Native 1.1.30. On Wed, Oct 15, 2014 at 3:00 PM, James Drews <dr...@engr.wisc.edu> wrote:
> That isn't working for tomcat 6, it will only accept TLSv1 for the > SSLProtocol entry, and that results in in using TLS1.0 only. > > > On 10/15/2014 7:48 AM, Giles Coochey wrote: > > On 15/10/2014 13:42, John Blaut wrote: > > Hi > > Following the recent announcement of the SSLv3 POODLE vulnerability > (CVE-2014-3566), when disabling SSLv3 on Tomcat APR/Native using the > following configuration: SSLProtocol="TLSv1", it seems that the effect is > that besides the SSLv3 protocol even the TLSv1.1 and TLSv1.2 protocols no > longer remain available, at least according to the Qualys SSL Labs > test:https://www.ssllabs.com/ssltest/ > > Protocols > TLS 1.2 No > TLS 1.1 No > TLS 1.0 Yes > SSL 3 No > SSL 2 No > > Is there an explanation for this? > What configuration is required in order to disable SSLv3 (and SSLv2 of > course) whilst still retaining support for all TLS 1.0, 1.1 & 1.2? > > > TLS Supports some version of TLS; may support other versions TLSv1 Supports > RFC 2246: TLS version 1.0 <http://www.ietf.org/rfc/rfc2246.txt> ; may > support other versions TLSv1.1 Supports RFC 4346: TLS version 1.1 > <http://www.ietf.org/rfc/rfc4346.txt> ; may support other versions > TLSv1.2 Supports RFC 5246: TLS version 1.2 > <http://www.ietf.org/rfc/rfc5246.txt> ; may support other versions > > http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html#SSLContext-- > Regards, Giles Coochey, CCNP, CCNA, CCNAS NetSecSpec Ltd +44 (0) 8444 > 780677 +44 (0) 7584 634135 http://www.coochey.net > http://www.netsecspec.co.uk gi...@coochey.net > > >