Re: Work Around for SSLv3 Vulnerability?

2014-10-31 Thread Russ Michaels

if upgrading to Java 7 solves the issue, do also note that this also breaks
SOLR on CF9, or rather CF can no longer communicate with SOLR, so none of
your colelctions will be accessible.
I have contacted Adobe about this, but as usual no response, and with CF9
EOL pending I doubt they ever will.

On Fri, Oct 31, 2014 at 2:52 PM, Pete Freitag  wrote:

>
> The SSL handshake handled by the JVM (though there might be some config
> that takes place in the CF engine, not sure), Java 6 supports only TLS 1.0,
> java 7 adds support for TLS 1.1 and 1.2. The actual crypto parts of it is
> handled by the JCE (java cryptography engine) which if you are running
> Enterprise is RSA Bafe CryptoJ.
>
> That other thing that comes into play is the SSL cipher suite support, so
> it is possible that the JVM and the server cant' find a protocol and cipher
> suite that they both support.
>
> There are also some JVM arguments you can use to tell the JVM which
> protocols to use, here is the reference doc for Java7:
>
> http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/JSSERefGuide.html#Customization
> you might try setting -Dhttps.protocols=TLSv1 not sure if that will help, I
> think the CF engine *may* overrides the property (in some versions of CF).
>
>
>
> --
> Pete Freitag - Adobe Community Professional
> http://foundeo.com/ - ColdFusion Consulting & Products
> http://hackmycf.com - Is your ColdFusion Server Secure?
> http://www.youtube.com/watch?v=ubESB87vl5U - FuseGuard your CFML in 10
> minutes
>
>
> On Thu, Oct 30, 2014 at 9:07 PM, Michael Grant  wrote:
>
> >
> > I'll try that with them, thank you SO much.
> >
> >
>
> 

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:359549
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm


Re: Work Around for SSLv3 Vulnerability?

2014-10-31 Thread Pete Freitag

The SSL handshake handled by the JVM (though there might be some config
that takes place in the CF engine, not sure), Java 6 supports only TLS 1.0,
java 7 adds support for TLS 1.1 and 1.2. The actual crypto parts of it is
handled by the JCE (java cryptography engine) which if you are running
Enterprise is RSA Bafe CryptoJ.

That other thing that comes into play is the SSL cipher suite support, so
it is possible that the JVM and the server cant' find a protocol and cipher
suite that they both support.

There are also some JVM arguments you can use to tell the JVM which
protocols to use, here is the reference doc for Java7:
http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/JSSERefGuide.html#Customization
you might try setting -Dhttps.protocols=TLSv1 not sure if that will help, I
think the CF engine *may* overrides the property (in some versions of CF).



--
Pete Freitag - Adobe Community Professional
http://foundeo.com/ - ColdFusion Consulting & Products
http://hackmycf.com - Is your ColdFusion Server Secure?
http://www.youtube.com/watch?v=ubESB87vl5U - FuseGuard your CFML in 10
minutes


On Thu, Oct 30, 2014 at 9:07 PM, Michael Grant  wrote:

>
> I'll try that with them, thank you SO much.
>
> 

~|
Order the Adobe Coldfusion Anthology now!
http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion
Archive: 
http://www.houseoffusion.com/groups/cf-talk/message.cfm/messageid:359548
Subscription: http://www.houseoffusion.com/groups/cf-talk/subscribe.cfm
Unsubscribe: http://www.houseoffusion.com/groups/cf-talk/unsubscribe.cfm