JBoss Netty : Support for SNI (Server Name Indication) - ssl

Does the SSL implementation in JBoss Netty support Server Name Indication?

It's more or less the same answer as for this question: Java 7 supports SNI, but only from the client side.

Related

Enable TLS 1.3 on IIS 10 windows server 2019

I am unable to enable TLS 1.3 on IIS 10 apps on windows server 2019. I have enable the schannel server TLS DWORD registry. But IIS is still choosing TLS 1.2 as the max supported cipher suite during handshake. I have deployed apps on TLS 1.3 on caddy on the same server with the same certificate.
Windows server 2019 supports TLS 1.3. I tried finding resources for support with IIS 10; they seems to be very old and officially there is no news for this? As anyone managed to do it with any IIS plugin or something?
Windows server 2019 does not support TLS 1.3, Windows server 2022 supported.
More information you can refer to this link: TLS protocol version support.
We are currently running IIS 10 on a W2019 Server and IIS actually supports TLS 1.3 now!
However we are facing the issue that the TLS handshake fails because the client sends unsupported_Extension after the ServerHello…

TLS 1.2 support for camel-ftp version 2.17.0.redhat-630262 - Java 8

I was wondering if TLS 1.2 is supported by "camel-ftp" library for Java. The version used is 2.17.0.redhat-630262. Or should we upgrade the version to the latest for getting TLS 1.2 support? The Java version is 8.
The SSL support is provided by the underlying JDK. Java 8 has TLS V1.2, so this is available to camel -ftp (sftp endpoint). If you set securityProtocol to TLS, you will get the TLS protocols.
You may want to ensure that only the TLS V1.2 protocols are enabled in your jre/lib/security/java.security file, as the older, weaker, TLS versions are enabled by default.

Turn on TLS 1.2

I just received an email from Authorize.net informing that they deactivate connections to their server using TLS1.0 and TLS1.1.
Question are Godaddy SSL and Web Host set for TLS1.2 connections and is there anything need to change for configure TLS1.2 for my site?
How to check which TLS use in my website?
How to check which TLS use in my website?
Use Qualys SSL Labs vulnerability tester to check which TLS version you are using: https://www.ssllabs.com/ssltest/
You may certainly see that you support several versions (this is the most common case).
Question are Godaddy SSL and Web Host set for TLS1.2 connections and is there anything need to change for configure TLS1.2 for my site?
You have nothing to do, web hosting services by GoDaddy are already supporting TLS 1.2 connections (and TLS 1.0 and TLS 1.1 - they do not support SSL v3 nor SSL v2 anymore, and it's a good thing).

Setting Up "Outbound SSL" in JBoss and/or underlying JRE

Looking to port Outbound SSL configuration from Websphere to JBoss. In my case, JBoss is the client. It wants to pass a client cert to a remote machine as part of a 2-way SSL communication.
In Websphere, you explicitly specify...
keystore / keystore password (where are the certs?)
certificate alias (which client cert to apply?)
matching outbound url pattern (when do i apply the client cert?)
You may have many of these configurations. Between these 3 pieces of info, the container can selectively choose when/which client certificate to include when making outbound SSL calls.
What is the JBoss way of doing the same thing as I described above ?
Can this be done by simply configuring your JRE ?
Are there parts of this that cannot be done in JBoss and/or java?
Thanks,
Wade.

HTTPS version 1 vs v2 - differences

What are the major differences between HTTPS 1.x vs HTTPS 2.x?
Is the TLS and SSL part came in version 2.x?
Is HTTP/2 (https://en.wikipedia.org/wiki/HTTP/2) also called HTTPS 2? Is HTTP 1.1 ( https://www.rfc-editor.org/rfc/rfc2068 ) also called HTTPS 1?
There is no HTTPS 1.x or HTTPS 2.x. There are only HTTP 1.0, HTTP 1.1 and HTTP/2. HTTPS means only that any of these HTTP protocols are encapsulated inside a TLS connection.
The TLS part is basically the same for all of these. But there are some restrictions regarding the protocol versions, ciphers and TLS compression when using TLS with HTTP/2, see RFC 7540, section 9.2 for the details. And to make it easier for the server to know the major HTTP protocol version used inside this TLS connection the client should use the ALPN TLS extension to tell the server that it supports HTTP/2.