WS.client.getConfig.getSSLContext.getDefaultSSLParameters.getProtocols.foreach(println(_))
SSLv3
TLSv1--
You received this message because you are subscribed to the Google Groups "play-framework" group.
To unsubscribe from this group and stop receiving emails from it, send an email to play-framewor...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
private[play] def newClient(): AsyncHttpClient = {
/*
Load keystore
*/
var ksis: FileInputStream = null
val ks = KeyStore.getInstance("JKS")
val kmf = KeyManagerFactory.getInstance("SunX509")
val keystorePath = System.getProperty("javax.net.ssl.keyStore")
val keystorePassword = System.getProperty("javax.net.ssl.keyStorePassword")
if (keystorePath != null && !"NONE".equals(keystorePath)) {
ksis = new FileInputStream(keystorePath)
}
try {
ks.load(ksis, keystorePassword.toCharArray)
} finally {
if (ksis != null) { ksis.close(); }
}
kmf.init(ks, keystorePassword.toCharArray)
/*
Load truststore
*/
var tsis: FileInputStream = null
val ts = KeyStore.getInstance("JKS")
val tmf = TrustManagerFactory.getInstance("SunX509")
val truststorePath = System.getProperty("javax.net.ssl.trustStore")
val truststorePassword = System.getProperty("javax.net.ssl.trustStorePassword")
if (truststorePath != null && !"NONE".equals(truststorePath)) {
tsis = new FileInputStream(truststorePath)
}
try {
ts.load(tsis, truststorePassword.toCharArray)
} finally {
if (tsis != null) { tsis.close(); }
}
tmf.init(ts)
/*
Create SSLContext
*/
val ctx = SSLContext.getInstance("TLSv1.2")
ctx.init(kmf.getKeyManagers,tmf.getTrustManagers,null)
val asyncHttpConfig = new AsyncHttpClientConfig.Builder().setSSLContext(ctx)
new AsyncHttpClient(asyncHttpConfig.build())
}--
You received this message because you are subscribed to the Google Groups "play-framework" group.
To unsubscribe from this group and stop receiving emails from it, send an email to play-framewor...@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
Ok, well just a heads up SSLv3 (RFC 6101 - historical), TLSv1.0 (RFC 2246) and TLSv1.1 (RFC 4346) are considered obsolete by IETF. Right now TLSv1.2 is the only approved standard. Also NIST SP 800-131A disallows SHA1 (signing hash for TLSv1.0 and v1.1) after Dec 31, 2013.
I can understand continuing support for SSLv3 and TLSv1 for backwards compatibility, but Play should at some point support TLSv1.2 as well very soon. About 2/3rds of the internet is insecure because other web programmers are still using obsolete security standards.
To unsubscribe from this group and stop receiving emails from it, send an email to play-framework+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/groups/opt_out.
--Will SargentConsultant, Professional ServicesTypesafe, the company behind Play Framework, Akka and Scala