search : tls 1.2

select a category, or use search below
(searches all categories and all time range)

displaying top 100 results

TLS 1.2 for ColdFusion 9 and Older
Updating ColdFusion 9 For TLS 1.2 Usage
Comment on Updating ColdFusion 9 For TLS 1.2 Usage by gabrieleb5037809
Wil Genovese ColdFusion 9.0.n will not handle TLS 1.2 when running on Java 1.7 and older. ColdFusion 9.0.n is NOT certified to work on Java 1.8 and there are known issues on Java 1.8. Additionally the Operating system plays a role here as well. Windows Server 2003 will NEVER handle TLS 1.2. End
Wil Genovese Not really. Older Linux versions that are not updated may not work with TLS 1.2. Additionally Java 1.7 with any ColdFusion version is not going to work with TLS 1.2.
Wil Genovese Everyone that wants/needs to be PCI compliant will be disable older TLS and SSL. It's a TLS 1.2+ world!
Wil Genovese Authorize.NET Temporarily Ending TLS 1.1 and TLS 1.0 Support At CF Webtools we have been preparing for this inevitable day for the past few years. We’ve been upgrading our clients servers and services to handle TLS 1.2 calls to Authorize.Net and other third party processors for a while
Comment on Updating ColdFusion 9 For TLS 1.2 Usage by gabrieleb5037809
Comment on Updating ColdFusion 9 For TLS 1.2 Usage by Charlie Arehart
Wil Genovese Update: I had a reason today to test this workaround on ColdFusion 10. It didn't work. I setup a FTP server on one of our servers with TLS 1.2 and setup the proper TLS certificate. I even imported the public certificate in the CF10 Java keystore. All methods failed to make a secure
Comment on Updating ColdFusion 9 For TLS 1.2 Usage by Charlie Arehart
, is your ColdFusion Server Ready? appeared first on ColdFusion. Blog,cfhttp,ColdFusion,security,ssl,tls 1.2
pgn.64.2018.05.17.05.58.04 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 17 May 2018 05:58:21 -0700 (PDT) Date: Thu, 17 May 2018 18:28:04 +0530 (IST) From: xxxxx@gmail.com To: xxxxx@gmail.com Message-ID: Subject: sub body is missing! MIME
_SHA (rsa 2048) - A | TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C | compressors: | NULL | cipher preference: server | warnings: | 64-bit block cipher 3DES vulnerable to SWEET32 attack | TLSv1.2: | ciphers: | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A