** Tags removed: openssl php
** Tags added: precise
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/1400473
Title:
Apache
** Tags removed: openssl php
** Tags added: precise
** Information type changed from Public to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1400473
Title:
Apache 2.2 on Ubuntu
I have installed the update, and testing with the latest Chrome and IE
browsers on Windows 7 confirms that they now recognize our server as
running TLS1.2!
Thanks for the fix!
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in
I have installed the update, and testing with the latest Chrome and IE
browsers on Windows 7 confirms that they now recognize our server as
running TLS1.2!
Thanks for the fix!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This bug was fixed in the package apache2 - 2.2.22-1ubuntu1.9
---
apache2 (2.2.22-1ubuntu1.9) precise-security; urgency=medium
* SECURITY IMPROVEMENT: add support for ECC keys and ECDH ciphers
(LP: #1197884)
- debian/patches/ecc_support.patch: add support to
This bug was fixed in the package apache2 - 2.2.22-1ubuntu1.9
---
apache2 (2.2.22-1ubuntu1.9) precise-security; urgency=medium
* SECURITY IMPROVEMENT: add support for ECC keys and ECDH ciphers
(LP: #1197884)
- debian/patches/ecc_support.patch: add support to
Im having the same issue. I need to disable TLS1, but cant do this on
apache 2.2.22. Is there a package update or a workaround? I am failing
my PCI because of this.
How can I resolve this?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is
Im having the same issue. I need to disable TLS1, but cant do this on
apache 2.2.22. Is there a package update or a workaround? I am failing
my PCI because of this.
How can I resolve this?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
Support for the TLSv1.1 and TLSv1.2 configuration options was added to
Apache 2.2.24.
The version of Apache in Ubuntu 12.04 is 2.2.22, hence it needs to have
the following commit backported to be able to specifically use TLSv1.1
and TLSV1.2 in the SSLProtocol directive:
Support for the TLSv1.1 and TLSv1.2 configuration options was added to
Apache 2.2.24.
The version of Apache in Ubuntu 12.04 is 2.2.22, hence it needs to have
the following commit backported to be able to specifically use TLSv1.1
and TLSV1.2 in the SSLProtocol directive:
This is a connection to the default configuration of apache on Ubuntu
12.04, showing it does support TLSv1.2:
$ openssl s_client -tls1_2 -connect test-precise:443
snip
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
I get something similar when I run that command for my own domain name:
SSL-Session:
Protocol : TLSv1.2
Cipher: DHE-RSA-AES256-GCM-SHA384
However, I still get the warning in apachectl configtest :
SSLProtocol: Illegal protocol 'TLSv1.2'
Action 'configtest' failed.
I am going to
From the Apache 2.2 documentation:
TLSv1.1 (when using OpenSSL 1.0.1 and later)
A revision of the TLS 1.0 protocol, as defined in RFC 4346.
TLSv1.2 (when using OpenSSL 1.0.1 and later)
A revision of the TLS 1.1 protocol, as defined in RFC 5246.
I suspect that the issue is that the current
From the Apache 2.2 documentation:
TLSv1.1 (when using OpenSSL 1.0.1 and later)
A revision of the TLS 1.0 protocol, as defined in RFC 4346.
TLSv1.2 (when using OpenSSL 1.0.1 and later)
A revision of the TLS 1.1 protocol, as defined in RFC 5246.
I suspect that the issue is that the current
I get something similar when I run that command for my own domain name:
SSL-Session:
Protocol : TLSv1.2
Cipher: DHE-RSA-AES256-GCM-SHA384
However, I still get the warning in apachectl configtest :
SSLProtocol: Illegal protocol 'TLSv1.2'
Action 'configtest' failed.
I am going to
This is a connection to the default configuration of apache on Ubuntu
12.04, showing it does support TLSv1.2:
$ openssl s_client -tls1_2 -connect test-precise:443
snip
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
16 matches
Mail list logo