[ 
https://issues.apache.org/jira/browse/DERBY-6764?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14188627#comment-14188627
 ] 

Mamta A. Satoor commented on DERBY-6764:
----------------------------------------

Notice the peculiar behavior for IBM jdk 1.5. Not sure if it is a bug with the 
JVM but even after I remove the SSLv3 from the list of enabled protocols, it 
still shows up in the list of enabled protocols.

java version "1.5.0"
 Java(TM) 2 Runtime Environment, Standard Edition (build pwi32devifx-20140415 
(SR16 FP6 ))
 IBM J9 VM (build 2.3, J2RE 1.5.0 IBM J9 2.3 Windows 7 x86-32 
j9vmwi3223ifx-20140401 (JIT enabled)
 J9VM - 20140326_194053_lHdSMr
 JIT - 20130920_46470ifx1_r8
 GC - 20120911_AA)
 JCL - 20140415

Supported protocols are
 SSLv3
 TLS
 TLSv1
 SSL
 SSL_TLS
Enabled protocols are
 SSLv3
 TLS
 TLSv1
 SSL
 SSL_TLS
 This enabled protocols list should not have SSLv3
 TLS
 TLSv1
 SSLv3
 SSL
 SSL_TLS

> analyze impact of poodle security alert on Derby client - server ssl support
> ----------------------------------------------------------------------------
>
>                 Key: DERBY-6764
>                 URL: https://issues.apache.org/jira/browse/DERBY-6764
>             Project: Derby
>          Issue Type: Task
>            Reporter: Myrna van Lunteren
>            Assignee: Mamta A. Satoor
>
> Recently, a security weakness was found in SSLv3, POODLE: SSLv3 vulnerability 
> (CVE-2014-3566)
> Derby supports ssl between the client and network server.
> We should investigate this and decide if we need to change our product, e.g. 
> to eliminate support for SSL in favor of its successor TLS.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to