-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Mark and James,

On 2/6/19 04:04, Mark Thomas wrote:
> On 05/02/2019 23:49, James H. H. Lampert wrote:
>> We've just received word from a customer that they had two 
>> vulnerabilities flagged on a security scan of the box their
>> Tomcat server is running on.
>> 
>> 38628 - TLS 1.0 still supported. Ok, assuming that the box and
>> the JVM can go up to a more current TLS level, and a more current
>> cipher, what do I need to set? On other boxes, I've added a
>> "ciphers" clause to the Connector for port 443 in the server.xml,
>> but what about the TLS?
> 
> On the TLS Connector:
> 
> sslEnabledProtocols="TLSv1.1,TLSv1.2"

Unless you will *fail* your security evaluation, you might want to
keep TLSv1.0 enabled.

>> 17369 - HTTP Security Header Not Detected. This, I don't get:
>> what I've been able to find on this one talks about a security
>> header missing on port 80; the Tomcat server (at least the one 
>> we're responsible for) doesn't even have 80 (or 8080) open at
>> all. If I remember right, though, there are other HTTP(S) servers
>> running on that box; is it perhaps one of the others?
> 
> It looks like this one:
> 
> https://community.qualys.com/thread/17369-http-security-header-not-det
ected
>
>  While that page talks about port 80, it would apply equally to
> any HTTP[S] connection.

Yes, X-Frame-Options should be set regardless of the protocol.

Try running nikto[1] against your site. It points out all kinds of
little things and (!!) gives you better information than "header not
found".

- -chris

[1] https://cirt.net/Nikto2 (also comes pre-installed in a Kali Linux
livecd, which you can use easily from within a VM guest)
-----BEGIN PGP SIGNATURE-----
Comment: Using GnuPG with Thunderbird - https://www.enigmail.net/
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=D5aV
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to