To elaborate, there is only this single application running on the server. All 
other web applications use Windows IIS. 

I have mentioned that the problem is down to the old software on the scanner 
but it’s a huge international organisation and making a upgrade to their entire 
line of devices is likely to take some time.

However silly it may seem this is a “tick the box” exercise when it comes to 
security - HTTPS - yes/no.

On the assumption that a weak encryption is better than none then I can’t 
really argue with the customer. 

Someone did suggest using Apache HTTP server to do the comms - maybe and IIS 
connector to Tomcat would accomplish the same ?

As I mentioned before I’m a bit of a novice with the server config.

Dave


> On 4 Oct 2016, at 11:29, André Warnier (tomcat) <a...@ice-sa.com> wrote:
> 
> On 04.10.2016 09:53, Garratt, Dave wrote:
> 
>>> On 4 Oct 2016, at 08:48, André Warnier (tomcat) <a...@ice-sa.com> wrote:
>>> 
>>> On 04.10.2016 09:38, Garratt, Dave wrote:
>>>> I have Apache Tomcat 8 working ok with https when I connect to my web page 
>>>> using a recent browser (desktop) or iPhone for example. However this 
>>>> specific application is designed to run on a Motorola MC9090 hand held 
>>>> wireless barcode scanner running a relatively old version of Windows 
>>>> Mobile. The browser on that device can only load the HTTP page and not the 
>>>> HTTPS page, giving a unable to open page message. Speaking to a “expert” 
>>>> on these scanners the consensus of opinion is that the type of encryption 
>>>> used by Apache Tomcat 8 is more up to date than the mobile devices browser 
>>>> can support. As it does not appear likely that the mobile devices are 
>>>> going to be updated any time soon I was wondering if its possible to force 
>>>> Tomcat to accept deprecated protocols rather than be forced to revert to 
>>>> plain HTTP.
>>>> 
>>>> Any ideas or ideally an example of how this might look in a config file 
>>>> would be most appreciated.
>>>> 
>>>> 
>>> 
>>> Naive question : if you are dealing anyway with old devices that cannot be 
>>> replaced by new devices, then why do you not just keep using the 
>>> correspondingly old version of tomcat and of the JVM ?
>>> 
>>> 
> 
>> The requirement for HTTPS is only a recent requirement and the application 
>> is now heavily dependent on Java 8. At this point I don’t know just how old 
>> a version of Tomcat I would need to make it work and I would have to make 
>> significant changes to the code in order to make it Java 6/7 compliant.
>> 
> 
> I was just wondering, basically because the reason for retiring an old SSL 
> protocol is usually that it has been proven insecure and/or buggy. So, there 
> might be a way to do what you are requesting, but it does not seem to make 
> sense that the requirement for HTTPS is recent (and presumably linked to a 
> wish for increased security), yet for these old devices the only way to do 
> it, would be by enabling and old/buggy SSL protocol (and thus potentially 
> weaken other applications running on the same host). There seems to be a bit 
> of a logical thinking contradiction in this, no ?
> 
> To dig a bit deeper : there are two families of "connectors" which can be 
> used by Tomcat :
> - the ones based on the underlying Java JVM's SSL
> - the one based on the underlying APR (Apache Portable Runtime), which use 
> OpenSSL-based logic
> 
> If you wanted to enable an old deprecated protocol under the Java 8 JVM, 
> you'd have to look if this old protocol is even still supported by the Java 8 
> JVM. If not, though luck, because the chances of persuading the vendor of 
> this JVM to change their ways are probably slim to say the least.
> If you wanted to enable an old deprecated protocol in the APR-based 
> connectors, your chances may be a bit better (but not guaranteed), to find a 
> working combination of Tomcat/APR/OpenSSL which allows this and still works. 
> But as time goes on, these things will eventually get upgraded, and your old 
> devices may get the problem again at some unexpected moment.
> You may also be facing issues then, if some security team scans your server, 
> and finds out that it is allowing a deprecated HTTPS protocol (which would 
> show up even for accesses having nothing to do with this application or these 
> devices).
> 
> So if I was looking at this in a top-down way, I would tend to say that if 
> really these old devices need this "functionality", then whenever the server 
> detects that it is talking to one of these devices, it should redirect these 
> calls to some other specific host or service, where the HTTPS protocol has 
> been intentionally weakened to support them, and that this is well-documented 
> and approved.
> And the initial work to set this up, and its support after that, would then 
> be clearly identified and clearly attributable to the support of these old 
> devices, without interference with the new stuff.
> That may also help the decision-makers to determine if the cost of supporting 
> these old devices is worth it or not.
> 
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
> For additional commands, e-mail: users-h...@tomcat.apache.org
> 

Reply via email to