Uploaded image for project: 'Crowd Data Center'
  1. Crowd Data Center
  2. CWD-4214

Disable SSLv3 in the commented out TLS tomcat configuration

      We can document how users can enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE.

            [CWD-4214] Disable SSLv3 in the commented out TLS tomcat configuration

            Monique Khairuliana (Inactive) made changes -
            Workflow Original: Simplified Crowd Development Workflow v2 - restricted [ 1509795 ] New: JAC Bug Workflow v3 [ 3363960 ]
            Status Original: Resolved [ 5 ] New: Closed [ 6 ]
            vkharisma made changes -
            Link New: This issue relates to CONFCLOUD-35386 [ CONFCLOUD-35386 ]
            Owen made changes -
            Workflow Original: Simplified Crowd Development Workflow v2 [ 1392200 ] New: Simplified Crowd Development Workflow v2 - restricted [ 1509795 ]
            Owen made changes -
            Workflow Original: Crowd Development Workflow v2 [ 792599 ] New: Simplified Crowd Development Workflow v2 [ 1392200 ]
            David Black made changes -
            Link New: This issue is incorporated by CWD-4240 [ CWD-4240 ]
            David Black made changes -
            Fix Version/s New: 2.8.4 [ 54305 ]
            Resolution New: Fixed [ 1 ]
            Status Original: Open [ 1 ] New: Resolved [ 5 ]
            joe made changes -
            Labels Original: no-cvss-required ssl New: bootcamp no-cvss-required ssl
            David Black made changes -
            Description Original: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE. New: We can document how users can enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE.
            David Black made changes -
            Description Original: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration so as to prevent customers being vulnerable to POODLE. New: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE.
            David Black made changes -
            Description Original: We can document how users can re-enable SSLv3 but we should by disable SSLv3 in the commented out tomcat TLS configuration, so as to prevent customers being vulnerable to POODLE. New: We can document how users can re-enable SSLv3 but we should disable SSLv3 in the commented out tomcat TLS configuration so as to prevent customers being vulnerable to POODLE.
            Summary Original: Disable SSLv3 by in the commented out TLS tomcat configuration New: Disable SSLv3 in the commented out TLS tomcat configuration

              Unassigned Unassigned
              dblack David Black
              Affected customers:
              0 This affects my team
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: