Thanks for that very comprehensive answer. I had not considered that but it 
sounds like it should give me the flexibility I need. I’m a Java programmer by 
profession rather then a web guru so it will no doubt take a fair bit of trial 
an error but that’s for pointing me in the right direction.

Dave

> On 4 Oct 2016, at 10:58, Olaf Kock <tom...@olafkock.de> wrote:
> 
> 
> Am 04.10.2016 um 11:23 schrieb Kreuser, Peter:
>> In my opinion weakening the security of the majority of users (there are 
>> seemingly others) is a pretty bad thing to do. My suggestion would be a 
>> different connector on a separate port for the handhelds. Configure this 
>> either on HTTP or a specific supported SSL protocol and ciphers. It would 
>> probably mean to reconfigure the handhelds, to add a hole into the firewall 
>> for the new port, but that could be restricted to the location/subnet of the 
>> handhelds.
>> You will need to get an exemption from the https-requirement for the 
>> handhelds anyways, so that may be a way to get a compensating control.
> 
> Given the situation described, I'd opt for adding an Apache httpd (or
> equivalent webserver of your choice) to the game to handle encryption.
> As Peter suggests, preferably on a different host/port/firewalled
> section. Given that OpenSSL/mod_ssl come with the kitchensink of
> algorithms, it should be straightforward to configure the best algorithm
> that the barcode scanners support.
> 
> This way you can continue to run tomcat8 in a non-weakened configuration
> and totally ignore encryption on that end.
> 
> Personally I prefer this setup anyway: My tomcat installations never
> deal with https, it's always a frontend-webserver. If only because
> mod_rewrite has helped me quickfix an issue in seconds instead of hours.
> And on my installations there's typically no need to encrypt the
> Apache->tomcat traffic (on small installations: because it's localhost
> traffic to begin)
> 
> Sooner or later OP should push for updates to the barcode scanners -
> especially if HTTPS is mandatory. The old algorithms are deprecated for
> a reason and won't protect the data in transit as you expect when just
> seeing https:// on a URL. And the older Windows desktop&server versions
> do not support the newer algorithms. I'm expecting the same for Windows
> Mobile.
> 
> And I can't go without ranting: When "only" HTTPS is a requirement, not
> "data protection according to the latest findings": There's a NULL
> cipher that you could select. It's disabled by default for obvious
> reasons, but it does exactly what you'd expect: Talk https without
> encrypting or signing any of the traffic. ;) (Of course: Use this only
> to question the requirements: If customer wants *proper* encryption
> instead of bandaid, the barcode scanners will need to be *up*graded to
> support proper encryption, rather than the server to be *down*graded)
> 
> Olaf
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 

Reply via email to