[
https://issues.apache.org/jira/browse/JAMES-385?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14483365#comment-14483365
]
Matthieu Baechler commented on JAMES-385:
-
Does this ticket still need work ?
> Al
[
http://issues.apache.org/jira/browse/JAMES-385?page=comments#action_12324457 ]
Ralf Hauser commented on JAMES-385:
---
the same happens with axis client - see AXIS-2216
> Allow to prevent weak ciphers when using "useTLS"
> -
[
http://issues.apache.org/jira/browse/JAMES-385?page=comments#action_12317910 ]
Stefano Bagnara commented on JAMES-385:
---
So this seems a problem in the current cornerstone and I don't see an easy
workaround from james side.
Will try to understand ho
[
http://issues.apache.org/jira/browse/JAMES-385?page=comments#action_12317897 ]
Ralf Hauser commented on JAMES-385:
---
Stefano,
These new sources unfortunately still have not means to prevent NULL ciphers
from being accepted by the server. My patch might
[
http://issues.apache.org/jira/browse/JAMES-385?page=comments#action_12317846 ]
Stefano Bagnara commented on JAMES-385:
---
For James 3.0 we moved to newer cornerstone libraries.
Please try the latest code from svn.
You can find cornerstone sources her
[
http://issues.apache.org/jira/browse/JAMES-385?page=comments#action_12316328 ]
Ralf Hauser commented on JAMES-385:
---
Until this is fixed in James (avalon/cornerstone,...), is there a possiblity to
configure this globally on a JVM/JRE-wide scale as a work
[
http://issues.apache.org/jira/browse/JAMES-385?page=comments#action_12316068 ]
Ralf Hauser commented on JAMES-385:
---
see http://www.aet.tu-cottbus.de/rt2/Ticket/Display.html?id=1162 for nice tool
that gives you all the ciphers your james accepts.
> Allo