Return-Path: Delivered-To: apmail-tomcat-users-archive@www.apache.org Received: (qmail 25930 invoked from network); 23 Oct 2009 05:32:25 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 23 Oct 2009 05:32:25 -0000 Received: (qmail 19034 invoked by uid 500); 23 Oct 2009 05:32:21 -0000 Delivered-To: apmail-tomcat-users-archive@tomcat.apache.org Received: (qmail 18988 invoked by uid 500); 23 Oct 2009 05:32:21 -0000 Mailing-List: contact users-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Users List" Delivered-To: mailing list users@tomcat.apache.org Received: (qmail 18977 invoked by uid 99); 23 Oct 2009 05:32:21 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 23 Oct 2009 05:32:21 +0000 X-ASF-Spam-Status: No, hits=2.2 required=10.0 tests=HTML_MESSAGE,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of uma_rk@comcast.net designates 76.96.30.40 as permitted sender) Received: from [76.96.30.40] (HELO QMTA04.emeryville.ca.mail.comcast.net) (76.96.30.40) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 23 Oct 2009 05:32:10 +0000 Received: from OMTA20.emeryville.ca.mail.comcast.net ([76.96.30.87]) by QMTA04.emeryville.ca.mail.comcast.net with comcast id w5HQ1c0021smiN4A45Xphy; Fri, 23 Oct 2009 05:31:49 +0000 Received: from sz0016.ev.mail.comcast.net ([76.96.26.64]) by OMTA20.emeryville.ca.mail.comcast.net with comcast id w5Xp1c00M1Nz1ms8g5Xp8y; Fri, 23 Oct 2009 05:31:49 +0000 Date: Fri, 23 Oct 2009 05:31:49 +0000 (UTC) From: uma_rk@comcast.net To: Tomcat Users List Message-ID: <934269382.6725261256275909371.JavaMail.root@sz0016a.emeryville.ca.mail.comcast.net> In-Reply-To: <99C8B2929B39C24493377AC7A121E21F84059CE5BE@USEA-EXCH8.na.uis.unisys.com> Subject: RE: Default SSL ciphers supported by Tomcat 6 MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_Part_350269_352837307.1256275909370" X-Originating-IP: [128.107.239.233] X-Mailer: Zimbra 5.0.18_GA_3076.RHEL5_64 (zclient/5.0.18_GA_3076.RHEL5_64) X-Virus-Checked: Checked by ClamAV on apache.org ------=_Part_350269_352837307.1256275909370 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Yes I saw that statement in the document. I was hoping someone here could tell me identify the default ciphers used by JDK6 (which is what I use under Tomcat6). This info seems basic enough; but I am unable to find it. I understand this is Tomcat list - I hope I do not get flamed for asking a JDK question. Regards, /U ----- Original Message ----- From: Charles R Caldarale To: Tomcat Users List Sent: Fri, 23 Oct 2009 03:09:34 +0000 (UTC) Subject: RE: Default SSL ciphers supported by Tomcat 6 > From: uma_rk@comcast.net [mailto:uma_rk@comcast.net] > Subject: Default SSL ciphers supported by Tomcat 6 > > I am looking for the default set of SSL(v3) ciphers supported by > Tomcat 6.0.x. It's in the doc: "ciphers "The comma separated list of encryption ciphers that this socket is allowed to use. By default, the default ciphers for the JVM will be used. Note that this usually means that the weak export grade ciphers will be included in the list of available ciphers. The ciphers are specified using the JSSE cipher naming convention." http://tomcat.apache.org/tomcat-6.0-doc/ssl-howto.html Tomcat does not include any encryption capability of its own, unless you're using APR. For that, you'll need to look at the OpenSSL doc. - Chuck THIS COMMUNICATION MAY CONTAIN CONFIDENTIAL AND/OR OTHERWISE PROPRIETARY MATERIAL and is thus for use only by the intended recipient. If you received this in error, please contact the sender and delete the e-mail and its attachments from all computers. ------=_Part_350269_352837307.1256275909370--