Thanks, man! It's really helpful! On Thu, Nov 13, 2014 at 5:43 PM, Glen Peterson <g...@organicdesign.org> wrote:
> Thank you Mark - that works great! That feature suggestion is not > needed after all. > > I found two places where the Tomcat 8 documentation could be more > helpful. I would be happy to do the following updates if I'm allowed: > > 1. I didn't see "ciphers" on this page at all (maybe it should be > renamed TLS-howto in a post-POODLE world?): > http://tomcat.apache.org/tomcat-8.0-doc/ssl-howto.html > > 2. The "ciphers" section here doesn't mention that it accepts the > OpenSSL syntax: > http://tomcat.apache.org/tomcat-8.0-doc/security-howto.html > > This page has a helpful description of the syntax (what I used to > learn it today): > https://www.openssl.org/docs/apps/ciphers.html > > If you like the ciphers element below, you are welcome to paste it in the > docs. > > > > For anyone interested, this is what I ended up with: > > > ciphers="ALL:!aNULL:!eNULL:!EXPORT:!LOW:!MEDIUM:!3DES:!TLS_RSA_WITH_AES_128_CBC_SHA256:!TLS_RSA_WITH_AES_128_CBC_SHA:!TLS_RSA_WITH_AES_128_GCM_SHA256:@STRENGTH > " > > Maybe someone more familiar with OpenSSL options could do better, but > this is working and should be forward-compatible because it eliminates > weaker ciphers without specifying which stronger ones to use. Note > that without specifying @STRENGTH (which means to sort in decreasing > order by strength), nmap couldn't find > TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 but Qualys did, so sorting seems > to have some effect for certain clients. Even sorted like this, > Qualys still reports that, "the server has no preference." > > Also note, that the new configuration doesn't support IE8 on Windows > XP, but we currently support IE8/Vista and forward. Qualys says IE7 > on Vista still works, so presumably IE8 would work there too. > > On Thu, Nov 13, 2014 at 9:16 AM, Mark Thomas <ma...@apache.org> wrote: > > On 13/11/2014 02:58, Glen Peterson wrote: > >> Tomcat has been one of my favorite pieces of software for about a > >> decade. Thanks to all your generous contributions it just keeps > >> getting better! I appreciate the focus on security in Tomcat 8. > >> > >> Suggestion: > >> ========= > >> Instead of specifying allowed ciphers in the Connector node of > >> server.xml, I'd like to specify dis-allowed/excluced ciphers so that > >> as new, better cipher suites become available we won't have to do > >> anything. Maybe an "excludeCiphers" attribute? > > > > You should be able to do this already in Tomcat 8 if you use the OpenSSl > > syntax. > > > > Mark > > > > > >> > >> Background: > >> ========= > >> We're getting an 'A' on the Qualys TLS test with stand-alone Tomcat, > >> which is pretty cool: > >> https://www.ssllabs.com/ssltest/index.html > >> > >> Mostly, that's because of the following settings (in case this helps > anyone): > >> > >> <Connector port="8443" > >> protocol="org.apache.coyote.http11.Http11NioProtocol" > >> maxThreads="150" SSLEnabled="true" > >> scheme="https" secure="true" > >> clientAuth="false" > >> sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2" > >> compression="on" disableUploadTimeout="true" > >> connectionTimeout="180000" > >> URIEncoding="UTF-8" > >> keystorePass="notTheRealPassword" > >> ciphers="TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256, > >> TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, > >> TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, > >> TLS_DHE_RSA_WITH_AES_128_CBC_SHA256, > >> TLS_DHE_RSA_WITH_AES_128_GCM_SHA256, > >> TLS_DHE_RSA_WITH_AES_128_CBC_SHA, > >> TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA, > >> TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA" /> > >> > >> It seems like just a few years ago there were about 50 cipher suites > >> to choose from. Now there are 12 that work with TLS. Eight of those > >> have Forward Security (the 8 listed above). Presumably those eight > >> will also become outdated over time and new ones will be added to > >> replace them. The problem with specifying ciphers as above is that > >> someone will have to know when and how to manually update the cipher > >> list. > >> > >> With each upgrade of Java, we need to remember to do something like > >> the following: > >> > >> - Delete the ciphers attribute > >> - Restart tomcat > >> - Test here: https://www.ssllabs.com/ssltest/index.html > >> - Copy the list of cipher suites > >> - Delete any that don't support Forward Security > >> - Make a new ciphers attribute. > >> - Verify that the browsers and devices we support will still work. > >> > >> To be honest, I'm not sure if that needs to be done with each Java > >> patch release, or only when Java 9 comes out. If instead of > >> specifying valid ciphers, I specified invalid ones, then the new ones > >> would just flow through the system and become available without me > >> doing anything! > >> > >> Thank you in advance for considering this suggestion. > >> > >> @GlenKPeterson > >> > >> --------------------------------------------------------------------- > >> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > >> For additional commands, e-mail: users-h...@tomcat.apache.org > >> > > > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > > For additional commands, e-mail: users-h...@tomcat.apache.org > > > > > > -- > Glen K. Peterson > (828) 393-0081 > > --------------------------------------------------------------------- > To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org > For additional commands, e-mail: users-h...@tomcat.apache.org > > -- Si le sang ne coule pas assez chaud dans tes veines, je le répandrai sur le sable pour qu'il bouille au soleil.