2016-01-14 13:27 GMT+03:00 Weare Borg <kernelfr...@gmail.com>:
> Hello friends,
>
> I recently scanned our domain Qualys SSL lab and found out that we have 2
> problems as listed below :
>
> 1) This server is vulnerable to the POODLE attack. If possible, disable SSL
> 3 to mitigate. Grade capped to C
> 2) This server accepts RC4 cipher, but only with older protocol versions.
> Grade capped to B.
>
> Our server runs Debian X64 with Apache 2.2 as a load-balancer and fail-over
> for 2 tomcat instances. So I configured the settings for both Apache and
> Tomcat for both these problems. Here are the changes I made, but I still
> keep getting the two errors I mentioned above. What am I doing wrong?
>
> Changes to mods-available/ssl.conf :
>
> SSLProtocol All -SSLv2 -SSLv3
> SSLHonorCipherOrder on
> SSLCipherSuite ALL:!ADH:!RC4:+HIGH:+MEDIUM:!LOW:!SSLv2:!SSLv3!EXPORT


You are missing ":" between SSLv3 and EXPORT. So actually you are not
disabling SSLv3.

> Changes to 8443 connector for TOmcat :
>
> <Connector port="8443" enableLookups="true"
>> protocol="org.apache.coyote.http11.Http11NioProtocol" SSLEnabled="true"
>> maxThreads="200" compression="off"

How do you proxy your requests?

Usually requests are proxied with AJP protocol, so the above HTTP
connector configuration does not matter.


Best regards,
Konstantin Kolinko

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to