-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Mark,

On 9/29/16 5:38 AM, Mark Thomas wrote:
> On 28/09/2016 22:14, Christopher Schultz wrote:
>> Mark,
>> 
>> On 9/19/16 4:32 PM, Mark Thomas wrote:
>>> On 19/09/2016 21:20, Christopher Schultz wrote:
>>>> All,
>>>> 
>>>> On 8/31/16 12:45 PM, Christopher Schultz wrote:
>>>>> All,
>>>> 
>>>>> This isn't Tomcat-related, but many folks on this list
>>>>> have this kind of experience, so I'm asking in case anyone
>>>>> knows.
>>>> 
>>>>> I'd like to make an HTTPS connection to a server and, if
>>>>> I'm using non-ephemeral DH key exchange, I'd like to know
>>>>> what the parameters are for that connection. Actually, I
>>>>> don't really care if it's ephemeral or not.
>>>> 
>>>>> What I'm looking for is the ability to make a connection
>>>>> and then warn if the connection is using "weak" DH
>>>>> parameters. Is that something I can check at
>>>>> connection-time? Or is the set of DH parameters (or, more
>>>>> specifically, the *length* of those parameters, in bits)
>>>>> defined by the cipher suite itself?
>>>> 
>>>>> For example, the Qualys community thread has an
>>>>> illustration of the cipher suites that SSLLabs considers
>>>>> "weak" (well, everyone considers them weak... they just
>>>>> have a public tool which complains about them): 
>>>>> https://community.qualys.com/thread/14821
>>>> 
>>>>> They specifically mention e.g. 
>>>>> TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 which is cipher suite
>>>>> 0x9f and mention the DH parameters. Are those parameters'
>>>>> parameters baked-into the cipher suite (meaning they are
>>>>> *always* 1024-bit) or is this a configuration of the server
>>>>> that makes those cipher suites weak due to the specific DH
>>>>> parameter choice?
>>>> 
>>>>> In either case, I'd like to be able to sniff that
>>>>> information from the connection if at all possible. Does
>>>>> anyone know if this can be done, and how?
>>>> 
>>>>> Thanks, -chris
>>>> 
>>>> It seems that this isn't possible.
>>>> 
>>>> Does anyone on the list have the karma required to file an 
>>>> enhancement request for the Java API? Or does everything need
>>>> to be a darned JSR?
>> 
>>> I recommend starting with the security-...@openjdk.java.net
>>> mailing list.
>> 
>>> As far as I know, the process is to raise a bug/enhancement 
>>> request against Java. From my own experience with the memory
>>> leak bugs, it helps a lot if an OpenJDK committer has already
>>> agreed to try and do something about it.
>> 
>> So... crickets so far.
>> 
>> Any suggestions?
> 
> Open an enhancement request and the next time Rory posts to the dev
> list about Java 9 respond with a request to look at your
> enhancement request.
> 
> The more you can tie it back to something that Tomcat needs to
> improve security, the greater the chances of something happening.

Okay.

> That is how I got the memory leak stuff fixed. The advantage I had
> was they were all clear bugs and I had simple tests cases (most of
> the time) to demonstrate them.

Yeah, this is clearly an enhancement request. So, maybe less incentive.

- -chris
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQIcBAEBCAAGBQJX7UbWAAoJEBzwKT+lPKRYSPMP/1KdZsvY2TqUKqYsu0NSebOF
4jaZVdtG/09JUBjS74qVtujqSS2Kn+wxxqljzZJYL5/sekiXJBu4kjGNwFy1azsM
VkpH1es8x/xGunfUYWDSxYDmofHjaOhPRXm0zNN42ZFb/b2ssa5x5I0IB+xBwuuS
PM/wLcbkUmm/RoabVEUO6Eb7SABKIOCokd5SGNDOY8bPb6xeFrjRDKv5U+6U9cIM
XEXVcOY5UvIwBTxa9mCxOB8uHIC3TiEhVecxToFRD5WK7FJ9BfDpBqLBKYdNK+fF
8500tYH8iWYLO1MmBKS3xsppUIiDu2a1xF7TXTQR41nM6NMeNF6TSBQQoUp0N+bU
F6NNKUHRZMNkv6C1XX7t8gFGg/xP1hYw0IvNkkZjKakptnW84bm1P0VY6D+ZI0TS
HOGpkg8jP7oNrsQEX+IK3HjEYRAHT+j0HR8u6q0Zmal3bkqJ9cjXsYMLHUOEgZAB
BFnawEHsvb87mU3E1uK58F3zzBvnyLq1eU4q9gq1BBQ2vZpufIuYnH2u9l3rWQda
ldG5pjZ/zcHkokO8O0OPo8Eu3MOsG4reSHHIITnLH1AlyaMMyOBCkqpnBZttTIMm
gV3QVI5bjpQ3RNhS0nKZkZycmIBvCgbreMo5zpVZsbe7leHh4SPwSU5ccJiL1YOd
8/83xNVMFvBPx4eX3UWZ
=Z14m
-----END PGP SIGNATURE-----

---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to