Return-Path: Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: (qmail 10202 invoked from network); 23 Oct 2009 11:54:20 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 23 Oct 2009 11:54:20 -0000 Received: (qmail 52910 invoked by uid 500); 23 Oct 2009 11:54:16 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 52830 invoked by uid 500); 23 Oct 2009 11:54:16 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 52819 invoked by uid 99); 23 Oct 2009 11:54:16 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 23 Oct 2009 11:54:16 +0000 X-ASF-Spam-Status: No, hits=1.2 required=10.0 tests=SPF_NEUTRAL X-Spam-Check-By: apache.org Received-SPF: neutral (nike.apache.org: local policy) Received: from [193.252.22.190] (HELO smtp6.freeserve.com) (193.252.22.190) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 23 Oct 2009 11:54:05 +0000 Received: from me-wanadoo.net (localhost [127.0.0.1]) by mwinf3613.me.freeserve.com (SMTP Server) with ESMTP id 25CFE7000081 for ; Fri, 23 Oct 2009 13:53:45 +0200 (CEST) Received: from me-wanadoo.net (localhost [127.0.0.1]) by mwinf3613.me.freeserve.com (SMTP Server) with ESMTP id 178657000085 for ; Fri, 23 Oct 2009 13:53:45 +0200 (CEST) Received: from mx01.dev.local (unknown [91.109.148.237]) by mwinf3613.me.freeserve.com (SMTP Server) with ESMTP id D75427000081 for ; Fri, 23 Oct 2009 13:53:29 +0200 (CEST) X-ME-UUID: 20091023115329882.D75427000081@mwinf3613.me.freeserve.com Received: from localhost (localhost [127.0.0.1]) by mx01.dev.local (Postfix) with ESMTP id 2F084322B0 for ; Fri, 23 Oct 2009 12:54:16 +0100 (BST) X-Virus-Scanned: Debian amavisd-new at homeinbox.net Received: from mx01.dev.local ([127.0.0.1]) by localhost (mx01.dev.local [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x6ODbwgJB8q8 for ; Fri, 23 Oct 2009 12:54:10 +0100 (BST) Received: from [192.168.0.9] (study03.dev.local [192.168.0.9]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx01.dev.local (Postfix) with ESMTPSA id 26CED3228A for ; Fri, 23 Oct 2009 12:54:10 +0100 (BST) Message-ID: <4AE19925.3050709@apache.org> Date: Fri, 23 Oct 2009 12:53:09 +0100 From: Mark Thomas User-Agent: Thunderbird 2.0.0.23 (Windows/20090812) MIME-Version: 1.0 To: Tomcat Users List Subject: Re: Default SSL ciphers supported by Tomcat 6 References: <934269382.6725261256275909371.JavaMail.root@sz0016a.emeryville.ca.mail.comcast.net> In-Reply-To: <934269382.6725261256275909371.JavaMail.root@sz0016a.emeryville.ca.mail.comcast.net> X-Enigmail-Version: 0.96.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked by ClamAV on apache.org uma_rk@comcast.net wrote: > Yes I saw that statement in the document. I was hoping > someone here could tell me identify the default ciphers used > by JDK6 (which is what I use under Tomcat6). > > This info seems basic enough; but I am unable to find it. Hmm. It doesn't seem that you looked that hard. > I understand this is Tomcat list - I hope I do not get flamed for > asking a JDK question. http://java.sun.com/javase/6/docs/ "Security" leads to http://java.sun.com/javase/6/docs/technotes/guides/security/index.html "Standard Algorithm Names" leads to http://java.sun.com/javase/6/docs/technotes/guides/security/StandardNames.html and finally "Additional JSSE Standard Names" leads to http://java.sun.com/javase/6/docs/technotes/guides/security/StandardNames.html#jssenames# You could also have just searched the archives for the users list. Searching for "default ciphers" would have found this: http://tomcat.markmail.org/search/default+ciphers+list:org%2Eapache%2Etomcat%2Eusers Ignoring your thread, the answer you want is the first one in the list. Mark > > Regards, > > /U > ----- Original Message ----- > From: Charles R Caldarale > To: Tomcat Users List > Sent: Fri, 23 Oct 2009 03:09:34 +0000 (UTC) > Subject: RE: Default SSL ciphers supported by Tomcat 6 > >> From: uma_rk@comcast.net [mailto:uma_rk@comcast.net] >> Subject: Default SSL ciphers supported by Tomcat 6 >> >> I am looking for the default set of SSL(v3) ciphers supported by >> Tomcat 6.0.x. > > It's in the doc: > > "ciphers > > "The comma separated list of encryption ciphers that this socket is allowed to use. By default, the default ciphers for the JVM will be used. Note that this usually means that the weak export grade ciphers will be included in the list of available ciphers. The ciphers are specified using the JSSE cipher naming convention." > > http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html > > Tomcat does not include any encryption capability of its own, unless you're using APR. For that, you'll need to look at the OpenSSL doc. > > - Chuck > > > THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY MATERIAL and is thus for use only by the intended recipient. If you received this in error, please contact the sender and delete the e-mail and its attachments from all computers. > > > --------------------------------------------------------------------- To unsubscribe, e-mail: users-unsubscribe@tomcat.apache.org For additional commands, e-mail: users-help@tomcat.apache.org