dss

How do I disable a particular cipher suite in openssl?

匿名 (未验证) 提交于 2019-12-03 07:36:14
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I want to secure my server from FREAK attack so I want to disable all the cipher suites that uses export grade RSA key from Openssl. Is there a way to disable a particular cipher suite in openssl? If yes, how do i do it? 回答1: Is there a way to disable a particular cipher suite in openssl? If yes, how do i do it? To answer the direct question of disabling a particular cipher suite, do so by removing it from the cipher suite list passed to SSL_CTX_set_cipher_list or SSL_CTX_set_cipher_list : int rc = SSL_CTX_set_cipher_list(ctx, "ALL:!NULL-MD5

Getting SSLHandshakeException when using Dropbox Java SDK for API v2

匿名 (未验证) 提交于 2019-12-03 02:38:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: In a XPages application I want to make use of the Dropbox Java SDK (2.1.2) for API v2 to get information about my Dropbox account. The following code is used to retrieve the corresponding account object: String atoken = "****" ; DbxRequestConfig rc = new DbxRequestConfig ( "****" ); DbxClientV2 client = new DbxClientV2 ( rc , atoken ); DbxUserUsersRequests users = client . users (); FullAccount acc = users . getCurrentAccount (); // Exception raised here The last line raises the following exception: com . dropbox . core .

SSLHandshakeException: Received fatal alert: handshake_failure when setting ciphers on tomcat 7 server

匿名 (未验证) 提交于 2019-12-03 02:30:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I have a Tomcat7 web-server which I tried to configure to accept secure connections by adding this connector to the server.xml file: I'm using a self-signed certificate generated using this command: %JAVA_HOME%/bin/keytool -genkeypair -keystore c:\opt\engine\conf\tc.keystore -storepass o39UI12z-keypass o39UI12z-dname "cn=Company, ou=Company, o=Com, c=US" -alias server -validity 36500 On the client side I have a spring application that connects with the server using RestTemplate . On application context startup I initalize the restTemplate

Enabled ciphers on Ubuntu OpenJDK 7

匿名 (未验证) 提交于 2019-12-03 02:20:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I wrote the following Java program to dump the enabled ciphers in the JVM: import java.security.KeyStore; import javax.net.ssl.KeyManagerFactory; import javax.net.ssl.SSLContext; import javax.net.ssl.SSLSocket; import javax.net.ssl.TrustManagerFactory; public class ListCiphers { public static void main(String[] args) throws Exception { SSLContext ctx = SSLContext.getInstance("TLSv1"); // Create an empty TrustManagerFactory to avoid loading default CA KeyStore ks = KeyStore.getInstance("JKS"); TrustManagerFactory tmf = TrustManagerFactory

SSLHandshakeException: Received fatal alert: handshake_failure when setting ciphers on tomcat 7 server

匿名 (未验证) 提交于 2019-12-03 02:13:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I have a Tomcat7 web-server which I tried to configure to accept secure connections by adding this connector to the server.xml file: <Connector SSLEnabled="true" acceptCount="100" connectionTimeout="20000" executor="tomcatThreadPool" keyAlias="server" keystoreFile="c:\opt\engine\conf\tc.keystore" keystorePass="o39UI12z" maxKeepAliveRequests="15" port="8443" protocol="HTTP/1.1" redirectPort="8443" scheme="https" secure="true" sslProtocol="TLS"/> I'm using a self-signed certificate generated using this command: %JAVA_HOME%/bin/keytool

How to config local Jetty ssl to avoid weak phermeral DH key error?

匿名 (未验证) 提交于 2019-12-03 01:34:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: I'm using keytool to generate a keystore to config a local development jetty to run ssl keytool . exe - keystore jetty . keystore - alias jetty - genkey - keyalg RSA - sigalg SHA256withRSA Jetty config: <Call name = "addConnector" > <Arg> <New class = "org.eclipse.jetty.server.ssl.SslSelectChannelConnector" > <Arg> <New class = "org.eclipse.jetty.http.ssl.SslContextFactory" > <Set name = "keyStore" > jetty/jetty.keystore </Set> <Set name = "keyStorePassword" > jetty6 </Set> <Set name = "keyManagerPassword" > jetty6 </Set> <Set name

Unable to negotiate with XX.XXX.XX.XX: no matching host key type found. Their offer: ssh-dss

匿名 (未验证) 提交于 2019-12-03 01:23:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I am trying to create a git repository on my web host and clone it on my computer. Here's what I did: I created a repository on the remote server. I generated a key pair: ssh-keygen -t dsa . I added my key to ssh-agent. I copied to the server public key in ~/.ssh . And then, after an attempt to run the command git clone ssh://user@host/path-to-repository , I get an error: Unable to negotiate with XX.XXX.XX.XX: no matching host key type found. Their offer: ssh-dss fatal: Could not read from remote repository. Please make sure you have the

POODLE vulnerability, JBoss and IE

匿名 (未验证) 提交于 2019-12-03 01:23:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 由 翻译 强力驱动 问题: So, I have JBoss 5.1.0 GA, and I read about how I need to disable SSLv3 here: https://access.redhat.com/solutions/1232233 What was not mentioned here was that I also need to get rid of all ciphers that support falling back to SSLv3. When I did that, I got a "green checkmark" on this website https://www.tinfoilsecurity.com/poodle which is basically a confirmation that I've secured my server and SSLv3 is not supported anymore, but now I cannot access my website using IE (all versions of IE). Since I only had 4 ciphers in my cipher