Solved

Disable SSLV2 in Tomcat

Posted on 2009-06-29
8
1,387 Views
Last Modified: 2012-05-07
I need to verify that SSLV2 is not enabled on our Tomcat web server. It is being hosted on a windows 2003 server.
0
Comment
Question by:heco
  • 6
  • 2
8 Comments
 
LVL 9

Expert Comment

by:jfer0x01
ID: 24741528
Hi

I found this on

http://www.experts-exchange.com/Software/Server_Software/Web_Servers/Microsoft_IIS/Q_22837110.html

Create a DWORD value in the following key named Enabled.  Set it to 0 (zero).  Reboot.


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server
0
 

Author Comment

by:heco
ID: 24741573
Thanks for the response. This appears to be for IIS, I need to know how to do it in Tomcat.
0
 
LVL 9

Expert Comment

by:jfer0x01
ID: 24741627
Hi,  

the registry fix may simply disable SSLV2 on Win2k3

the registry key does not point to IIS Subkeys
0
 

Author Comment

by:heco
ID: 24741634
Thanks, I will give it a shot and let you know!
0
What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

 
LVL 9

Accepted Solution

by:
jfer0x01 earned 500 total points
ID: 24741638
Hi,

according to

http://blog.techstacks.com/2008/09/securing-ssl-in-tomcat-part-one-sslv2.html

the author states that SSLv2 is disabled in newer versions of tomcat

and show a method with cURL to prove it
0
 
LVL 9

Expert Comment

by:jfer0x01
ID: 24756023
any luck?
0
 
LVL 9

Expert Comment

by:jfer0x01
ID: 24817546
any progress?
0
 
LVL 9

Expert Comment

by:jfer0x01
ID: 24891049
Hi,

please award points or close question

Jfer
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

We've all had that page pop up telling us there is a problem with the certificate and some of us continue on anyways and others run away to a safer competing site.  But what to do when you get the error - is it your problem or theirs?  What can you …
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now