Weblogic Mitigate POODLE vulnerability after upgrade and still use CBC ciphersApache Httpd and Weblogic configured for SSLPossible to close port 80 and still use port 443?How can I use SSL behind a load balancer and still get the client IP?LDAP over SSL with an EFI Fiery printerDisabled SSLv3 in Tomcat, but Still Showing POODLE VulnerabilitySSL 3 is still enabled after setting registry keys and rebooting Windows 2008 R2I use HPKP, my SSL certificate expired and after renewing my website is inaccessibleServer has “weak cipher setting” according to security audit, replaced offending cipher TLS_RSA_WITH_3DES_EDE_CBC_SHA, but still failing retest audit?How to disable the DES and 3DES ciphers on Oracle WebLogic Server Node Manager Port(5556) in Red hat linux serverDisabling weak protocols and ciphers in Centos with Apache

Voltage Balun 1:1

Why didn't this character get a funeral at the end of Avengers: Endgame?

How can Internet speed be 10 times slower without a router than when using the same connection with a router?

Are pressure-treated posts that have been submerged for a few days ruined?

Can my 2 children, aged 10 and 12, who are US citizens, travel to the USA on expired American passports?

Dangerous workplace travelling

Does expanded replace the romannumeral trick for expansion?

Are the Night's Watch still required?

Why would a military not separate its forces into different branches?

Does "Captain Marvel" contain spoilers for "Avengers: Infinity War"?

SOQL query WHERE filter by specific months

Can there be a single technologically advanced nation, in a continent full of non-technologically advanced nations?

My first c++ game (snake console game)

Endgame puzzle: How to avoid stalemate and win?

What is the closest airport to the center of the city it serves?

Correct way of drawing empty, half-filled and fully filled circles?

Is there precedent or are there procedures for a US president refusing to concede to an electoral defeat?

Can you use "едать" and "игрывать" in the present and future tenses?

How does summation index shifting work?

As a GM, is it bad form to ask for a moment to think when improvising?

Dihedral group D4 composition with custom labels

Should I simplify my writing in a foreign country?

Handling Null values (and equivalents) routinely in Python

Is there a word that describes the unjustified use of a more complex word?



Weblogic Mitigate POODLE vulnerability after upgrade and still use CBC ciphers


Apache Httpd and Weblogic configured for SSLPossible to close port 80 and still use port 443?How can I use SSL behind a load balancer and still get the client IP?LDAP over SSL with an EFI Fiery printerDisabled SSLv3 in Tomcat, but Still Showing POODLE VulnerabilitySSL 3 is still enabled after setting registry keys and rebooting Windows 2008 R2I use HPKP, my SSL certificate expired and after renewing my website is inaccessibleServer has “weak cipher setting” according to security audit, replaced offending cipher TLS_RSA_WITH_3DES_EDE_CBC_SHA, but still failing retest audit?How to disable the DES and 3DES ciphers on Oracle WebLogic Server Node Manager Port(5556) in Red hat linux serverDisabling weak protocols and ciphers in Centos with Apache






.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;








3















I recently upgraded my Weblogic server to 10.3.6 with java 7. So with that I have TLS1.0 - TLS 1.2 enabled via the setEnv.sh. Some of the ciphers I am using to make sure that they are compatible (supported by Weblogic, FF37, Chrome 44, etc) are as follows:



<ciphersuite>TLS_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>
<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
<ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
<ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA256</ciphersuite>
<ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</ciphersuite><ciphersuite>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>


This is in config.xml under the ssl tag. I do have JSSE enabled as well to make sure I can get a TLS1.2 connection.



The supported cipherlist for Weblogic 10.3.6 found here



One issue that I see with SSL Labs is that with these ciphers, I am still possibly vulnerable to POODLE.



An Nmap scan gave me this for what the ciphers are:



| ssl-enum-ciphers:
| SSLv3:
| ciphers:
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.0:
| ciphers:
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.1:
| ciphers:
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| compressors:
| NULL
| TLSv1.2:
| ciphers:
| TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - strong
| TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA - strong
| TLS_RSA_WITH_AES_128_CBC_SHA256 - strong
| compressors:
| NULL
|_ least strength: strong


Before TLS1.1 and TLS1.2 were enabled in setEnv.sh, I did not have this issue, so I am unsure why adding them changed what happened.
Now my question is how do I make sure that I have SSL3 disabled but still able to use some of the CBC ciphers? or have the support I need?



EDIT: I know that CBC ciphers are a no bueno kinda thing... I am open for suggestions for ciphers support TLS1.0+ and for a browser as low as IE 8.










share|improve this question






























    3















    I recently upgraded my Weblogic server to 10.3.6 with java 7. So with that I have TLS1.0 - TLS 1.2 enabled via the setEnv.sh. Some of the ciphers I am using to make sure that they are compatible (supported by Weblogic, FF37, Chrome 44, etc) are as follows:



    <ciphersuite>TLS_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>
    <ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
    <ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
    <ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA256</ciphersuite>
    <ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</ciphersuite><ciphersuite>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>


    This is in config.xml under the ssl tag. I do have JSSE enabled as well to make sure I can get a TLS1.2 connection.



    The supported cipherlist for Weblogic 10.3.6 found here



    One issue that I see with SSL Labs is that with these ciphers, I am still possibly vulnerable to POODLE.



    An Nmap scan gave me this for what the ciphers are:



    | ssl-enum-ciphers:
    | SSLv3:
    | ciphers:
    | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
    | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_RSA_WITH_AES_128_CBC_SHA - strong
    | compressors:
    | NULL
    | TLSv1.0:
    | ciphers:
    | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
    | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_RSA_WITH_AES_128_CBC_SHA - strong
    | compressors:
    | NULL
    | TLSv1.1:
    | ciphers:
    | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
    | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_RSA_WITH_AES_128_CBC_SHA - strong
    | compressors:
    | NULL
    | TLSv1.2:
    | ciphers:
    | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
    | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - strong
    | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
    | TLS_RSA_WITH_AES_128_CBC_SHA - strong
    | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong
    | compressors:
    | NULL
    |_ least strength: strong


    Before TLS1.1 and TLS1.2 were enabled in setEnv.sh, I did not have this issue, so I am unsure why adding them changed what happened.
    Now my question is how do I make sure that I have SSL3 disabled but still able to use some of the CBC ciphers? or have the support I need?



    EDIT: I know that CBC ciphers are a no bueno kinda thing... I am open for suggestions for ciphers support TLS1.0+ and for a browser as low as IE 8.










    share|improve this question


























      3












      3








      3


      2






      I recently upgraded my Weblogic server to 10.3.6 with java 7. So with that I have TLS1.0 - TLS 1.2 enabled via the setEnv.sh. Some of the ciphers I am using to make sure that they are compatible (supported by Weblogic, FF37, Chrome 44, etc) are as follows:



      <ciphersuite>TLS_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>
      <ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
      <ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
      <ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA256</ciphersuite>
      <ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</ciphersuite><ciphersuite>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>


      This is in config.xml under the ssl tag. I do have JSSE enabled as well to make sure I can get a TLS1.2 connection.



      The supported cipherlist for Weblogic 10.3.6 found here



      One issue that I see with SSL Labs is that with these ciphers, I am still possibly vulnerable to POODLE.



      An Nmap scan gave me this for what the ciphers are:



      | ssl-enum-ciphers:
      | SSLv3:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | compressors:
      | NULL
      | TLSv1.0:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | compressors:
      | NULL
      | TLSv1.1:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | compressors:
      | NULL
      | TLSv1.2:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong
      | compressors:
      | NULL
      |_ least strength: strong


      Before TLS1.1 and TLS1.2 were enabled in setEnv.sh, I did not have this issue, so I am unsure why adding them changed what happened.
      Now my question is how do I make sure that I have SSL3 disabled but still able to use some of the CBC ciphers? or have the support I need?



      EDIT: I know that CBC ciphers are a no bueno kinda thing... I am open for suggestions for ciphers support TLS1.0+ and for a browser as low as IE 8.










      share|improve this question
















      I recently upgraded my Weblogic server to 10.3.6 with java 7. So with that I have TLS1.0 - TLS 1.2 enabled via the setEnv.sh. Some of the ciphers I am using to make sure that they are compatible (supported by Weblogic, FF37, Chrome 44, etc) are as follows:



      <ciphersuite>TLS_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>
      <ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
      <ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA</ciphersuite>
      <ciphersuite>TLS_RSA_WITH_AES_128_CBC_SHA256</ciphersuite>
      <ciphersuite>TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256</ciphersuite><ciphersuite>TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA</ciphersuite>


      This is in config.xml under the ssl tag. I do have JSSE enabled as well to make sure I can get a TLS1.2 connection.



      The supported cipherlist for Weblogic 10.3.6 found here



      One issue that I see with SSL Labs is that with these ciphers, I am still possibly vulnerable to POODLE.



      An Nmap scan gave me this for what the ciphers are:



      | ssl-enum-ciphers:
      | SSLv3:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | compressors:
      | NULL
      | TLSv1.0:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | compressors:
      | NULL
      | TLSv1.1:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | compressors:
      | NULL
      | TLSv1.2:
      | ciphers:
      | TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - strong
      | TLS_RSA_WITH_3DES_EDE_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA - strong
      | TLS_RSA_WITH_AES_128_CBC_SHA256 - strong
      | compressors:
      | NULL
      |_ least strength: strong


      Before TLS1.1 and TLS1.2 were enabled in setEnv.sh, I did not have this issue, so I am unsure why adding them changed what happened.
      Now my question is how do I make sure that I have SSL3 disabled but still able to use some of the CBC ciphers? or have the support I need?



      EDIT: I know that CBC ciphers are a no bueno kinda thing... I am open for suggestions for ciphers support TLS1.0+ and for a browser as low as IE 8.







      ssl tls weblogic poodle






      share|improve this question















      share|improve this question













      share|improve this question




      share|improve this question








      edited Apr 22 '15 at 15:21







      Vnge

















      asked Apr 22 '15 at 14:46









      VngeVnge

      144211




      144211




















          2 Answers
          2






          active

          oldest

          votes


















          0














          Just make sure that you use a higher version of Java than 7u75 (it disables them by default) then I think enabling TLS1.0 only can cause the downgrade for SSLv3 then you could use -Dweblogic.security.SSL.protocolVersion=TLS1 and TLS1.1. You should have disabled CBC a long time ago https://community.qualys.com/thread/9974. So you might have conflicting requirements.






          share|improve this answer























          • Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

            – Vnge
            Apr 22 '15 at 15:19











          • Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

            – Alex H
            Apr 22 '15 at 15:34












          • So if CBC is not that great, why are there a large bunch of ciphers using it?

            – Vnge
            Apr 22 '15 at 15:35











          • That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

            – Alex H
            Apr 22 '15 at 15:37











          • Ah yes, gotcha.

            – Vnge
            Apr 22 '15 at 15:37


















          0














          This is late to answer now, but can be used as future reference, if you are using Weblogic 10.3.6, which is compatible with JDK7. Recently Oracle released JDK 7u131 version which is supporting TLS1.1 and TLS1.2 by default. So you can upgrade JDK to 7u131.






          share|improve this answer

























            Your Answer








            StackExchange.ready(function()
            var channelOptions =
            tags: "".split(" "),
            id: "2"
            ;
            initTagRenderer("".split(" "), "".split(" "), channelOptions);

            StackExchange.using("externalEditor", function()
            // Have to fire editor after snippets, if snippets enabled
            if (StackExchange.settings.snippets.snippetsEnabled)
            StackExchange.using("snippets", function()
            createEditor();
            );

            else
            createEditor();

            );

            function createEditor()
            StackExchange.prepareEditor(
            heartbeatType: 'answer',
            autoActivateHeartbeat: false,
            convertImagesToLinks: true,
            noModals: true,
            showLowRepImageUploadWarning: true,
            reputationToPostImages: 10,
            bindNavPrevention: true,
            postfix: "",
            imageUploader:
            brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
            contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
            allowUrls: true
            ,
            onDemand: true,
            discardSelector: ".discard-answer"
            ,immediatelyShowMarkdownHelp:true
            );



            );













            draft saved

            draft discarded


















            StackExchange.ready(
            function ()
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f684691%2fweblogic-mitigate-poodle-vulnerability-after-upgrade-and-still-use-cbc-ciphers%23new-answer', 'question_page');

            );

            Post as a guest















            Required, but never shown

























            2 Answers
            2






            active

            oldest

            votes








            2 Answers
            2






            active

            oldest

            votes









            active

            oldest

            votes






            active

            oldest

            votes









            0














            Just make sure that you use a higher version of Java than 7u75 (it disables them by default) then I think enabling TLS1.0 only can cause the downgrade for SSLv3 then you could use -Dweblogic.security.SSL.protocolVersion=TLS1 and TLS1.1. You should have disabled CBC a long time ago https://community.qualys.com/thread/9974. So you might have conflicting requirements.






            share|improve this answer























            • Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

              – Vnge
              Apr 22 '15 at 15:19











            • Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

              – Alex H
              Apr 22 '15 at 15:34












            • So if CBC is not that great, why are there a large bunch of ciphers using it?

              – Vnge
              Apr 22 '15 at 15:35











            • That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

              – Alex H
              Apr 22 '15 at 15:37











            • Ah yes, gotcha.

              – Vnge
              Apr 22 '15 at 15:37















            0














            Just make sure that you use a higher version of Java than 7u75 (it disables them by default) then I think enabling TLS1.0 only can cause the downgrade for SSLv3 then you could use -Dweblogic.security.SSL.protocolVersion=TLS1 and TLS1.1. You should have disabled CBC a long time ago https://community.qualys.com/thread/9974. So you might have conflicting requirements.






            share|improve this answer























            • Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

              – Vnge
              Apr 22 '15 at 15:19











            • Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

              – Alex H
              Apr 22 '15 at 15:34












            • So if CBC is not that great, why are there a large bunch of ciphers using it?

              – Vnge
              Apr 22 '15 at 15:35











            • That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

              – Alex H
              Apr 22 '15 at 15:37











            • Ah yes, gotcha.

              – Vnge
              Apr 22 '15 at 15:37













            0












            0








            0







            Just make sure that you use a higher version of Java than 7u75 (it disables them by default) then I think enabling TLS1.0 only can cause the downgrade for SSLv3 then you could use -Dweblogic.security.SSL.protocolVersion=TLS1 and TLS1.1. You should have disabled CBC a long time ago https://community.qualys.com/thread/9974. So you might have conflicting requirements.






            share|improve this answer













            Just make sure that you use a higher version of Java than 7u75 (it disables them by default) then I think enabling TLS1.0 only can cause the downgrade for SSLv3 then you could use -Dweblogic.security.SSL.protocolVersion=TLS1 and TLS1.1. You should have disabled CBC a long time ago https://community.qualys.com/thread/9974. So you might have conflicting requirements.







            share|improve this answer












            share|improve this answer



            share|improve this answer










            answered Apr 22 '15 at 15:05









            Alex HAlex H

            1,713918




            1,713918












            • Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

              – Vnge
              Apr 22 '15 at 15:19











            • Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

              – Alex H
              Apr 22 '15 at 15:34












            • So if CBC is not that great, why are there a large bunch of ciphers using it?

              – Vnge
              Apr 22 '15 at 15:35











            • That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

              – Alex H
              Apr 22 '15 at 15:37











            • Ah yes, gotcha.

              – Vnge
              Apr 22 '15 at 15:37

















            • Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

              – Vnge
              Apr 22 '15 at 15:19











            • Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

              – Alex H
              Apr 22 '15 at 15:34












            • So if CBC is not that great, why are there a large bunch of ciphers using it?

              – Vnge
              Apr 22 '15 at 15:35











            • That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

              – Alex H
              Apr 22 '15 at 15:37











            • Ah yes, gotcha.

              – Vnge
              Apr 22 '15 at 15:37
















            Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

            – Vnge
            Apr 22 '15 at 15:19





            Okay, that would make sense. Would you have a suggestion for ciphers to support TLS 1.0+ for Weblogic?

            – Vnge
            Apr 22 '15 at 15:19













            Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

            – Alex H
            Apr 22 '15 at 15:34






            Assuming that you have most of the clients on Windows you can just pick them from here msdn.microsoft.com/en-us/library/windows/desktop/… . Make sure that whatever you chose it is supported by your client computers.

            – Alex H
            Apr 22 '15 at 15:34














            So if CBC is not that great, why are there a large bunch of ciphers using it?

            – Vnge
            Apr 22 '15 at 15:35





            So if CBC is not that great, why are there a large bunch of ciphers using it?

            – Vnge
            Apr 22 '15 at 15:35













            That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

            – Alex H
            Apr 22 '15 at 15:37





            That article is for Windows,an list of available options, and it has been made some time ago. Meanwhile some vulnerabilities have appeared :)

            – Alex H
            Apr 22 '15 at 15:37













            Ah yes, gotcha.

            – Vnge
            Apr 22 '15 at 15:37





            Ah yes, gotcha.

            – Vnge
            Apr 22 '15 at 15:37













            0














            This is late to answer now, but can be used as future reference, if you are using Weblogic 10.3.6, which is compatible with JDK7. Recently Oracle released JDK 7u131 version which is supporting TLS1.1 and TLS1.2 by default. So you can upgrade JDK to 7u131.






            share|improve this answer





























              0














              This is late to answer now, but can be used as future reference, if you are using Weblogic 10.3.6, which is compatible with JDK7. Recently Oracle released JDK 7u131 version which is supporting TLS1.1 and TLS1.2 by default. So you can upgrade JDK to 7u131.






              share|improve this answer



























                0












                0








                0







                This is late to answer now, but can be used as future reference, if you are using Weblogic 10.3.6, which is compatible with JDK7. Recently Oracle released JDK 7u131 version which is supporting TLS1.1 and TLS1.2 by default. So you can upgrade JDK to 7u131.






                share|improve this answer















                This is late to answer now, but can be used as future reference, if you are using Weblogic 10.3.6, which is compatible with JDK7. Recently Oracle released JDK 7u131 version which is supporting TLS1.1 and TLS1.2 by default. So you can upgrade JDK to 7u131.







                share|improve this answer














                share|improve this answer



                share|improve this answer








                edited Jun 14 '17 at 10:55









                Esa Jokinen

                23.9k23360




                23.9k23360










                answered Jun 13 '17 at 21:01









                AryaArya

                163




                163



























                    draft saved

                    draft discarded
















































                    Thanks for contributing an answer to Server Fault!


                    • Please be sure to answer the question. Provide details and share your research!

                    But avoid


                    • Asking for help, clarification, or responding to other answers.

                    • Making statements based on opinion; back them up with references or personal experience.

                    To learn more, see our tips on writing great answers.




                    draft saved


                    draft discarded














                    StackExchange.ready(
                    function ()
                    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fserverfault.com%2fquestions%2f684691%2fweblogic-mitigate-poodle-vulnerability-after-upgrade-and-still-use-cbc-ciphers%23new-answer', 'question_page');

                    );

                    Post as a guest















                    Required, but never shown





















































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown

































                    Required, but never shown














                    Required, but never shown












                    Required, but never shown







                    Required, but never shown







                    Popular posts from this blog

                    Club Baloncesto Breogán Índice Historia | Pavillón | Nome | O Breogán na cultura popular | Xogadores | Adestradores | Presidentes | Palmarés | Historial | Líderes | Notas | Véxase tamén | Menú de navegacióncbbreogan.galCadroGuía oficial da ACB 2009-10, páxina 201Guía oficial ACB 1992, páxina 183. Editorial DB.É de 6.500 espectadores sentados axeitándose á última normativa"Estudiantes Junior, entre as mellores canteiras"o orixinalHemeroteca El Mundo Deportivo, 16 setembro de 1970, páxina 12Historia do BreogánAlfredo Pérez, o último canoneiroHistoria C.B. BreogánHemeroteca de El Mundo DeportivoJimmy Wright, norteamericano do Breogán deixará Lugo por ameazas de morteResultados de Breogán en 1986-87Resultados de Breogán en 1990-91Ficha de Velimir Perasović en acb.comResultados de Breogán en 1994-95Breogán arrasa al Barça. "El Mundo Deportivo", 27 de setembro de 1999, páxina 58CB Breogán - FC BarcelonaA FEB invita a participar nunha nova Liga EuropeaCharlie Bell na prensa estatalMáximos anotadores 2005Tempada 2005-06 : Tódolos Xogadores da Xornada""Non quero pensar nunha man negra, mais pregúntome que está a pasar""o orixinalRaúl López, orgulloso dos xogadores, presume da boa saúde económica do BreogánJulio González confirma que cesa como presidente del BreogánHomenaxe a Lisardo GómezA tempada do rexurdimento celesteEntrevista a Lisardo GómezEl COB dinamita el Pazo para forzar el quinto (69-73)Cafés Candelas, patrocinador del CB Breogán"Suso Lázare, novo presidente do Breogán"o orixinalCafés Candelas Breogán firma el mayor triunfo de la historiaEl Breogán realizará 17 homenajes por su cincuenta aniversario"O Breogán honra ao seu fundador e primeiro presidente"o orixinalMiguel Giao recibiu a homenaxe do PazoHomenaxe aos primeiros gladiadores celestesO home que nos amosa como ver o Breo co corazónTita Franco será homenaxeada polos #50anosdeBreoJulio Vila recibirá unha homenaxe in memoriam polos #50anosdeBreo"O Breogán homenaxeará aos seus aboados máis veteráns"Pechada ovación a «Capi» Sanmartín e Ricardo «Corazón de González»Homenaxe por décadas de informaciónPaco García volve ao Pazo con motivo do 50 aniversario"Resultados y clasificaciones""O Cafés Candelas Breogán, campión da Copa Princesa""O Cafés Candelas Breogán, equipo ACB"C.B. Breogán"Proxecto social"o orixinal"Centros asociados"o orixinalFicha en imdb.comMario Camus trata la recuperación del amor en 'La vieja música', su última película"Páxina web oficial""Club Baloncesto Breogán""C. B. Breogán S.A.D."eehttp://www.fegaba.com

                    Vilaño, A Laracha Índice Patrimonio | Lugares e parroquias | Véxase tamén | Menú de navegación43°14′52″N 8°36′03″O / 43.24775, -8.60070

                    Cegueira Índice Epidemioloxía | Deficiencia visual | Tipos de cegueira | Principais causas de cegueira | Tratamento | Técnicas de adaptación e axudas | Vida dos cegos | Primeiros auxilios | Crenzas respecto das persoas cegas | Crenzas das persoas cegas | O neno deficiente visual | Aspectos psicolóxicos da cegueira | Notas | Véxase tamén | Menú de navegación54.054.154.436928256blindnessDicionario da Real Academia GalegaPortal das Palabras"International Standards: Visual Standards — Aspects and Ranges of Vision Loss with Emphasis on Population Surveys.""Visual impairment and blindness""Presentan un plan para previr a cegueira"o orixinalACCDV Associació Catalana de Cecs i Disminuïts Visuals - PMFTrachoma"Effect of gene therapy on visual function in Leber's congenital amaurosis"1844137110.1056/NEJMoa0802268Cans guía - os mellores amigos dos cegosArquivadoEscola de cans guía para cegos en Mortágua, PortugalArquivado"Tecnología para ciegos y deficientes visuales. Recopilación de recursos gratuitos en la Red""Colorino""‘COL.diesis’, escuchar los sonidos del color""COL.diesis: Transforming Colour into Melody and Implementing the Result in a Colour Sensor Device"o orixinal"Sistema de desarrollo de sinestesia color-sonido para invidentes utilizando un protocolo de audio""Enseñanza táctil - geometría y color. Juegos didácticos para niños ciegos y videntes""Sistema Constanz"L'ocupació laboral dels cecs a l'Estat espanyol està pràcticament equiparada a la de les persones amb visió, entrevista amb Pedro ZuritaONCE (Organización Nacional de Cegos de España)Prevención da cegueiraDescrición de deficiencias visuais (Disc@pnet)Braillín, un boneco atractivo para calquera neno, con ou sen discapacidade, que permite familiarizarse co sistema de escritura e lectura brailleAxudas Técnicas36838ID00897494007150-90057129528256DOID:1432HP:0000618D001766C10.597.751.941.162C97109C0155020