looks so far good, DHE ciphers sadly still not supported but ECDHE now without patches, too few for a vote but for now it looks fine, will give it a load-test tomorrow
(was a hard day with security audits, httpd-2.4.8 testing...)
[harry@srv-rhsoft:~]$ sslscan localhost:8443 | grep Accepted
Accepted TLSv1 256 bits ECDHE-RSA-AES256-SHA
Accepted TLSv1 256 bits AES256-SHA
Accepted TLSv1 256 bits CAMELLIA256-SHA
Accepted TLSv1 168 bits ECDHE-RSA-DES-CBC3-SHA
Accepted TLSv1 168 bits DES-CBC3-SHA
Accepted TLSv1 128 bits ECDHE-RSA-AES128-SHA
Accepted TLSv1 128 bits AES128-SHA
Accepted TLSv1 128 bits CAMELLIA128-SHA
Accepted TLS11 256 bits ECDHE-RSA-AES256-SHA
Accepted TLS11 256 bits AES256-SHA
Accepted TLS11 256 bits CAMELLIA256-SHA
Accepted TLS11 168 bits ECDHE-RSA-DES-CBC3-SHA
Accepted TLS11 168 bits DES-CBC3-SHA
Accepted TLS11 128 bits ECDHE-RSA-AES128-SHA
Accepted TLS11 128 bits AES128-SHA
Accepted TLS11 128 bits CAMELLIA128-SHA
Accepted TLS12 256 bits ECDHE-RSA-AES256-GCM-SHA384
Accepted TLS12 256 bits ECDHE-RSA-AES256-SHA384
Accepted TLS12 256 bits ECDHE-RSA-AES256-SHA
Accepted TLS12 256 bits AES256-GCM-SHA384
Accepted TLS12 256 bits AES256-SHA
Accepted TLS12 256 bits CAMELLIA256-SHA
Accepted TLS12 168 bits ECDHE-RSA-DES-CBC3-SHA
Accepted TLS12 168 bits DES-CBC3-SHA
Accepted TLS12 128 bits ECDHE-RSA-AES128-GCM-SHA256
Accepted TLS12 128 bits ECDHE-RSA-AES128-SHA256
Accepted TLS12 128 bits ECDHE-RSA-AES128-SHA
Accepted TLS12 128 bits AES128-GCM-SHA256
Accepted TLS12 128 bits AES128-SHA
Accepted TLS12 128 bits CAMELLIA128-SHA
Am 08.03.2014 02:51, schrieb Phil Sorber:
> Hello All,
>
> It's been a while since RC0, and we've tracked down quite a few bugs. So I've
> prepared a new release for v4.2.0
> (RC1) which is the last stable release in the 4.x series. This will serve as
> our Long Term Support (LTS) version as
> detailed in our Release Management document:
>
> https://cwiki.apache.org/confluence/display/TS/Release+Management
>
> Changes since 4.1.0:
>
> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310963&version=12324892
>
> A summary of the new features are here:
>
> https://cwiki.apache.org/confluence/display/TS/What%27s+new+in+v4.2.x
>
> Information about upgrading to this release from v3.2.x is available at:
>
> https://cwiki.apache.org/confluence/display/TS/Upgrading+to+v4.0
>
> The cache in this release is compatible with the previous 4.0.x releases.
>
> The artifacts are available for download at:
>
> http://people.apache.org/~sorber/releases/trafficserver/4.2.0-rc1/
>
> -rw-rw-r-- 1 sorber sorber 6670271 Mar 8 01:23
> trafficserver-4.2.0-rc1.tar.bz2
> -rw-rw-r-- 1 sorber sorber 819 Mar 8 01:23
> trafficserver-4.2.0-rc1.tar.bz2.asc
> -rw-rw-r-- 1 sorber sorber 66 Mar 8 01:23
> trafficserver-4.2.0-rc1.tar.bz2.md5
> -rw-rw-r-- 1 sorber sorber 74 Mar 8 01:23
> trafficserver-4.2.0-rc1.tar.bz2.sha1
>
> MD5: a4302d1650eac9bc7d4cab27985668d1
> SHA1: feb1d45fecccbc00fa988e768909a6664a43a354
>
> This corresponds to git:
>
> Hash: a1f0b7d4223064638b3eb4022c47a5964fa9e665
> Tag: 4.2.0-rc1
>
> Which can be verified with the following:
>
> git tag -v 4.2.0-rc1
>
> My code signing key is available here:
>
> http://people.apache.org/~sorber/gpg-code-signing-key.asc
>
> Make sure you refresh from a key server to get all relevant signatures.
>
> The vote is open until Mar 14th 2014 which is one week from today. This
> release is going to be around for a long
> time, so make sure we test this thoroughly!
signature.asc
Description: OpenPGP digital signature
