-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Arthur,
On 6/13/15 8:42 PM, Arthur Ramsey wrote: > I have working binaries for Linux x64 and Windows x64 if anyone > needs them. Thanks for offering, but: 1. Anyone running Linux should be able to trivially build their own. 2. Anyone wanting Arthur's binaries should be absolutely sure they trust him. (No offense to Arthur, but accepting binaries from someone on a mailing list is always a big of a red flag.) :) > It should still work with newer versions of tomcat 7 providing the > SSLProtocol is set to TLSv1? SSLProtocol should be set to "TLSv1+TLSv1.1+TLSv1.2", but on certain older versions of Tomcat 7 this won't work. I can't remember exactly when we implemented this, and then there was a bug in the implementation, etc., so you should just upgrade to 7.0.current which definitely works as documented. > The Windows binary has SSLv2 and SSLv3 disabled at compile time. Good, though lots and lots of people still need to support SSLv3. - -chris > > On 6/13/2015 3:30 PM, Arthur Ramsey wrote: >> Building the latest from svn branch 1.1.x seems to work. I had >> to do some modifications to get TLSv1.1 and TLSv1.2 when using >> |SSLProtocol="all" |because I'm using tomcat 7.0.55. >> >> Thanks for the help, Arthur >> >> On 6/11/2015 3:34 PM, Arthur Ramsey wrote: >>> On 06/11/2015 02:35 PM, Christopher Schultz wrote: > Arthur, > > On 6/11/15 2:14 PM, Arthur Ramsey wrote: >>>>>> Is anyone aware of a way to mitigate the Logjam attack >>>>>> with tomcat 7 and java 7? > Disable DHE_EXPORT on the server? >>>> I believe I have, but Qualys SSL Server Test still fails me >>>> on the Logjam check. >>>> >>>> SSLCipherSuite="ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM- SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA - -AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES12 8-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES1 28-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES25 6-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DH E-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES 256-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!3DES:!MD5:!PSK >>>> >>>> > >>>> >>>>>> I use tcnative and openssl-1.0.2a both compiled from >>>>>> source in production today, but I would be open to JSSE >>>>>> too. I believe I need Java 8 to mitigate CVE-2015-4000 >>>>>> with JSSE. > Why? >>>> See >>>> http://stackoverflow.com/questions/30352105/how-to-set-custom-dh-gr oup-in-java-sslengine-to-prevent-logjam-attack > >>>> >>>>>> I don't see anyway to use a unique 2048-bit or greater DH >>>>>> group with tcnative currently. > I believe you are correct; there is a bug in BZ: > https://bz.apache.org/bugzilla/show_bug.cgi?id=56108 > > It looks like 1.1.34 will have this feature. You can build the > current trunk of the 1.1 branch and probably be okay. >>>> Thanks, I'll give it a try. Scary to use in production, but >>>> it may be my best answer. > >>>>>> I'm not sure if there is anything I can do at compile >>>>>> time. I'd rather not change the cipher suites as I want >>>>>> to maintain browser support. > You should disable EXPORT certificates no matter what. Or were you > talking about the DH parameters? >>>> I was talking about DH parameters. > >>>>>> My server configuration passed the Qualys SSL Server Test >>>>>> with flying colors until Logjam, so I would be worried >>>>>> about regressions on other security fixes if I used >>>>>> JSSE. > -chris >>>> >>>> ------------------------------------------------------------------- - -- >>>> >>>> To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org >>>> For additional commands, e-mail: >>>> users-h...@tomcat.apache.org >>>> >>> >>> Thanks, Arthur >> > > > -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJVfuZHAAoJEBzwKT+lPKRYrkAP/0LsRarD3oy3Gu/eT1qRazKq XDZD2ebdpdMnEdaYgNu8xv1T26PerAZSpHStcd+UN+fcjxTeXuIxcRVIHBJ+8Ctu QMZc1Xb3dVUt8f2717m+zd0ACEA2Uzkcl1TDzkrmvSGpEE8/iOltskxnaRxV7nAm ojBp8ksdxfdIrKUviC+lLOqBZfE23BQdL5BA09KqFEPMoMWcDc28aUNAB3Heh05A NEWVgD1WFXV7XLQggv869wF453+vberSpCfDP64UxdwPLpsSH/B0hPfuJg1ap86t g5cUnEmcATIxEtnbkh+kBwjDqvyLzPSG1BUvvZNVUiMCdGjs+WGUX6Indfj4+Fpx nMAMRfbLqR4jJ3HWNkZ70iRzLsmd2XTaVFklgqHGCScjrrqtAQCIq1nGY0ro5MIq dXoJkaQuV0Vw4767r4JuhWewt+OEhSsvrmcMyVrFQtamkVt+Pngr3ufwk+HuVjhB l2+54YVSHAs7wj310vuz8ymI2rQ07AGLEXAHkVKiIB/VoQOVoQjLkMNHTB4Mda0T w+9f9d0op4SOdLhqDyeJd8Hn8cAaEVxk88vFaOo6orFVHGs0BsS1R3PWrx4xj//q IXgJ8Cp0Y1sbZ/8kPtpyLsmg0250BmBj1icRla3EZiVidbVRSlnPQPT+KEAWc8hZ qzgsCk2dvMHi8FFQvK1Y =b2wW -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org For additional commands, e-mail: users-h...@tomcat.apache.org