[ 
https://issues.apache.org/jira/browse/DERBY-6764?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14195758#comment-14195758
 ] 

ASF subversion and git services commented on DERBY-6764:
--------------------------------------------------------

Commit 1636509 from [~mamtas] in branch 'code/trunk'
[ https://svn.apache.org/r1636509 ]

DERBY-6764(analyze impact of poodle security alert on Derby client - server ssl 
support)

Removed SSLv3 and SSLv2Hello from list of enabled protocols on the client and 
server side to avoid poodle security breach. Also, changed  NaiveTrustManager 
to use TLS as the default protocol rather than SSL. If NaiveTrustManager used 
SSL, then it won't find any enabled protocols for SSL after the removal of 
SSLv3 and SSLv2Hello. Changing it to TLS makes TLS protocols available for 
communication.

> analyze impact of poodle security alert on Derby client - server ssl support
> ----------------------------------------------------------------------------
>
>                 Key: DERBY-6764
>                 URL: https://issues.apache.org/jira/browse/DERBY-6764
>             Project: Derby
>          Issue Type: Task
>            Reporter: Myrna van Lunteren
>            Assignee: Mamta A. Satoor
>         Attachments: DERBY6764_patch1_diff.txt, DERBY6764_patch1_stat.txt
>
>
> Recently, a security weakness was found in SSLv3, POODLE: SSLv3 vulnerability 
> (CVE-2014-3566)
> Derby supports ssl between the client and network server.
> We should investigate this and decide if we need to change our product, e.g. 
> to eliminate support for SSL in favor of its successor TLS.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to