[ 
https://issues.apache.org/jira/browse/DERBY-6764?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14183097#comment-14183097
 ] 

Mamta A. Satoor commented on DERBY-6764:
----------------------------------------

Rick, if we decide to change the derby code  so SSLv3 is not an available 
option, would SSLSocket.setEnabledProtocols achieve the goal of removing SSLv3? 
We could get a list of supported protocols using 
SSLSocket.getSupportedProtocols() and remove SSLv3 from it(if it is in the 
list) and then call setEnabledProtocols with the new list. (or is it better to 
use SSLSocket.getEnabledProtocols() to get the list of enabled protocols and 
remove SSLv3 from that list and use this new list for 
SSLSocket.setEnabledProtocols). 
If we go with this path, then I think we will not have to worry about what JVM 
vendor we are working with.

> analyze impact of poodle security alert on Derby client - server ssl support
> ----------------------------------------------------------------------------
>
>                 Key: DERBY-6764
>                 URL: https://issues.apache.org/jira/browse/DERBY-6764
>             Project: Derby
>          Issue Type: Task
>            Reporter: Myrna van Lunteren
>
> Recently, a security weakness was found in SSLv3, POODLE: SSLv3 vulnerability 
> (CVE-2014-3566)
> Derby supports ssl between the client and network server.
> We should investigate this and decide if we need to change our product, e.g. 
> to eliminate support for SSL in favor of its successor TLS.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to