You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by bu...@apache.org on 2004/06/20 12:55:38 UTC
DO NOT REPLY [Bug 29695] New: -
regression in SSL cipher strength
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=29695>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=29695
regression in SSL cipher strength
Summary: regression in SSL cipher strength
Product: Tomcat 5
Version: 5.0.24
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: Other
Component: Connector:Coyote
AssignedTo: tomcat-dev@jakarta.apache.org
ReportedBy: hauser@acm.org
4.1.24 through 4.1.27 nicely negotiated AES256 with my recent Mozilla browser.
now that I am on 5.024, I only get AES-128
(irrespective of whether the
className="org.apache.coyote.tomcat5.CoyoteConnector" is present - in the sample
server.xml that attribute is not present, in
http://jakarta.apache.org/tomcat/tomcat-5.0-doc/ssl-howto.html it is, but either
way, the security is reduced :( )
---------------------------------------------------------------------
To unsubscribe, e-mail: tomcat-dev-unsubscribe@jakarta.apache.org
For additional commands, e-mail: tomcat-dev-help@jakarta.apache.org