-
Suggestion
-
Resolution: Unresolved
-
None
-
None
Problem Definition
Remove TLSv1.1 as it is vulnerable to downgrade attacks since it uses SHA-1 hash to protect exchanged messages' integrity. Even authentication of handshakes is done based on SHA-1, which makes it easier for an attacker to impersonate a server for MITM attacks. This takes precedence as TLSv1.1 has been removed from the server.xml but is still accepted during a vulnerability scan.
Suggested Solution
Have as default the secure TLSv1.3, and then add, if needed, TLSv1.1 and TLSv1.2.
Workaround
This can be setup as shown in the How to change the SSL/TLS protocols used by Tomcat, but this request will improve the default security.
Form Name |
---|