Alpha Software Mobile Development Tools:   Alpha Anywhere    |   Alpha TransForm subscribe to our YouTube Channel  Follow Us on LinkedIn  Follow Us on Twitter  Follow Us on Facebook

Announcement

Collapse

The Alpha Software Forum Participation Guidelines

The Alpha Software Forum is a free forum created for Alpha Software Developer Community to ask for help, exchange ideas, and share solutions. Alpha Software strives to create an environment where all members of the community can feel safe to participate. In order to ensure the Alpha Software Forum is a place where all feel welcome, forum participants are expected to behave as follows:
  • Be professional in your conduct
  • Be kind to others
  • Be constructive when giving feedback
  • Be open to new ideas and suggestions
  • Stay on topic


Be sure all comments and threads you post are respectful. Posts that contain any of the following content will be considered a violation of your agreement as a member of the Alpha Software Forum Community and will be moderated:
  • Spam.
  • Vulgar language.
  • Quotes from private conversations without permission, including pricing and other sales related discussions.
  • Personal attacks, insults, or subtle put-downs.
  • Harassment, bullying, threatening, mocking, shaming, or deriding anyone.
  • Sexist, racist, homophobic, transphobic, ableist, or otherwise discriminatory jokes and language.
  • Sexually explicit or violent material, links, or language.
  • Pirated, hacked, or copyright-infringing material.
  • Encouraging of others to engage in the above behaviors.


If a thread or post is found to contain any of the content outlined above, a moderator may choose to take one of the following actions:
  • Remove the Post or Thread - the content is removed from the forum.
  • Place the User in Moderation - all posts and new threads must be approved by a moderator before they are posted.
  • Temporarily Ban the User - user is banned from forum for a period of time.
  • Permanently Ban the User - user is permanently banned from the forum.


Moderators may also rename posts and threads if they are too generic or do not property reflect the content.

Moderators may move threads if they have been posted in the incorrect forum.

Threads/Posts questioning specific moderator decisions or actions (such as "why was a user banned?") are not allowed and will be removed.

The owners of Alpha Software Corporation (Forum Owner) reserve the right to remove, edit, move, or close any thread for any reason; or ban any forum member without notice, reason, or explanation.

Community members are encouraged to click the "Report Post" icon in the lower left of a given post if they feel the post is in violation of the rules. This will alert the Moderators to take a look.

Alpha Software Corporation may amend the guidelines from time to time and may also vary the procedures it sets out where appropriate in a particular case. Your agreement to comply with the guidelines will be deemed agreement to any changes to it.



Bonus TIPS for Successful Posting

Try a Search First
It is highly recommended that a Search be done on your topic before posting, as many questions have been answered in prior posts. As with any search engine, the shorter the search term, the more "hits" will be returned, but the more specific the search term is, the greater the relevance of those "hits". Searching for "table" might well return every message on the board while "tablesum" would greatly restrict the number of messages returned.

When you do post
First, make sure you are posting your question in the correct forum. For example, if you post an issue regarding Desktop applications on the Mobile & Browser Applications board , not only will your question not be seen by the appropriate audience, it may also be removed or relocated.

The more detail you provide about your problem or question, the more likely someone is to understand your request and be able to help. A sample database with a minimum of records (and its support files, zipped together) will make it much easier to diagnose issues with your application. Screen shots of error messages are especially helpful.

When explaining how to reproduce your problem, please be as detailed as possible. Describe every step, click-by-click and keypress-by-keypress. Otherwise when others try to duplicate your problem, they may do something slightly different and end up with different results.

A note about attachments
You may only attach one file to each message. Attachment file size is limited to 2MB. If you need to include several files, you may do so by zipping them into a single archive.

If you forgot to attach your files to your post, please do NOT create a new thread. Instead, reply to your original message and attach the file there.

When attaching screen shots, it is best to attach an image file (.BMP, .JPG, .GIF, .PNG, etc.) or a zip file of several images, as opposed to a Word document containing the screen shots. Because Word documents are prone to viruses, many message board users will not open your Word file, therefore limiting their ability to help you.

Similarly, if you are uploading a zipped archive, you should simply create a .ZIP file and not a self-extracting .EXE as many users will not run your EXE file.
See more
See less

New recommended SSL Cipher List

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

    New recommended SSL Cipher List

    Alpha is now recommending an updated SSL Cipher List, as follows.

    Code:
    ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:AES128:AES256:RC4-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!MD5:!PSK
    This cipher list is based on https://wiki.mozilla.org/Security/Server_Side_TLS as of April 29, 2014. The referenced URL has an explanation of why this is a secure cipher list to use.

    Alpha Anywhere (V12) builds beginning with 2129 will use this new cipher list by default. Users of older releases are encouraged to manually configure their server to use this cipher list.

    Lenny Forziati
    Vice President, Internet Products and Technical Services
    Alpha Software Corporation

    #2
    Re: New recommended SSL Cipher List

    Lenny:

    My client failed their security scan using this string as it does not like the RC4 128 SHA values. I have removed those references and am doing a re-scan to confirm it now passes.

    FYI...

    Comment


      #3
      Re: New recommended SSL Cipher List

      How do you remove the RC4 references? Where does one cipher begin and the next end?

      Comment


        #4
        Re: New recommended SSL Cipher List

        To disable RC4, your cipher-suite syntax should contain ":!RC4:" (negates RC4).

        Comment


          #5
          Re: New recommended SSL Cipher List

          My security scanner is saying that I am vulnerable to a new sweet32 attack. Here is their message:

          We were able to manually confirm that your device() terminating at port [443] is accepting DES and 3DES ciphers. Please either disable the ability of the device to accept SSLv3,DES,3DES,RC4 ciphers, filter or close the port or segment your network to isolate the credit card environment from the device accepting the DES and 3DES ciphers and send a network diagram that shows this segmentation. I have attached an example of the Diagram as well.Please log into the www.mycontrolscan.com portal and select "View scan results." From here, you can click on the envelope icon beside the vulnerability, attach the screenshots, and send the dispute to our vulnerability queue.
          As you can see, it has !DES:!3DES:!RC4: So I guess I need to get rid of SSLv3? So how do I do that?

          I have the latest alpha version.

          ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:ECDHE-RSA-RC4-SHA:ECDHE-ECDSA-RC4-SHA:AES128:AES256:RC4-SHA:HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!RC4:!MD5:!PSK

          Comment


            #6
            Re: New recommended SSL Cipher List

            You have replied to a very old thread. SSLv3 (along with SSLv2) was fully removed from Alpha Anywhere in May of 2015. Prior to that, SSLv3 could be turned off in the cipher list, but an SSLv3 handshake would still be offered.

            Also note that the default (recommended) cipher list has changed since the original date of this thread. If you specify no cipher list at all, Alpha Anywhere will always use the current default, which may be updated from time to time as new ciphers are made available and older ones become obsolete.

            Lenny Forziati
            Vice President, Internet Products and Technical Services
            Alpha Software Corporation

            Comment


              #7
              Re: New recommended SSL Cipher List

              Thank you,

              I had never heard that before about removing the cipher list, is that a new feature or has it always been that way? (I have a customer on an older version I'd like to remove the cipher list from too if possible.)

              Comment


                #8
                Re: New recommended SSL Cipher List

                If you are running an older version and remove the cipher list, it will use whatever was the default at the time that version was released. If you are no longer keeping the software current, you should consider manually maintaining a cipher list.

                Lenny Forziati
                Vice President, Internet Products and Technical Services
                Alpha Software Corporation

                Comment


                  #9
                  Re: New recommended SSL Cipher List

                  Sorry, Lenny, last question and I hope this will be helpful for others:

                  Is there a way to make it use the default list every time I upgrade?

                  When I blanked the cipher list, it basically replaced it with the default. I assume that when I upgrade next, it will not then use the cipher list from the new upgrade (if any.)

                  So do I need to blank the cipher list each time I upgrade Alpha, just to be sure I am always current?

                  Comment


                    #10
                    Re: New recommended SSL Cipher List

                    You must be using s significantly older release. In Alpha Anywhere, if you blank out the list, it will stay blank and use the default list. I believe this is also true for V11 and probably even V10.

                    In older versions, the blank value would get populated with a list, and then would not get updated with a newer patch. In these older releases, yes, you could blank it out each time to get the then-current cipher list. But we're talking about a cipher list that would be many years old at this point, so the then-default would likely no longer address current security needs. If you are not maintaining your Application Server to be on the latest release of Alpha Anywhere, you will need to manually maintain the cipher list and your OpenSSL DLLs.

                    Lenny Forziati
                    Vice President, Internet Products and Technical Services
                    Alpha Software Corporation

                    Comment


                      #11
                      Re: New recommended SSL Cipher List

                      Lenny,

                      I am using the latest version of Alpha Anywhere.

                      I blanked the cipher list, then saved and closed the configuration.

                      The next time I went into the configuration, it had the cipher list filled in again. (Although it was definitely an updated and much improved cipher list.)

                      So, if I update Alpha and the new Alpha has a new Cipher list, will it see that I have the old default cipher list in there and update it?

                      What if I skip an update or two of Alpha - and thus maybe even a cipher update - Will Alpha know that I have a 2 versions ago Cipher list and still keep it current for me?

                      Comment


                        #12
                        Re: New recommended SSL Cipher List

                        It appears that there is a bug in the way the cipher list setting is being stored, which is preventing it from properly updating. I just fixed that and it will be included in tomorrow's prerelease. I would not recommend updating to a prerelease just for this though.

                        You can use the Xbasic function httpd_DefaultCipherList() to retrieve the default cipher list at any time. You can use the value that it returns to manually set the list.

                        -Lenny

                        Lenny Forziati
                        Vice President, Internet Products and Technical Services
                        Alpha Software Corporation

                        Comment


                          #13
                          Re: New recommended SSL Cipher List

                          Thank you,

                          I'll just wait for the next full update, then blank the cipher list again.

                          Comment


                            #14
                            Re: New recommended SSL Cipher List

                            Lenny,

                            Could you post the latest recommended Cipher List, please? I know that I can blank out Alpha to get it to refresh the list, but I am not on the most recent Alpha version yet. If I blank it out, will it grab the current recommended list or it will grab the default for that version?

                            My server is getting security errors in Edge and sometimes in Firefox (but never Chrome for some reason.)

                            I have reissued the certificate and it hasn't fixed the issue, so I want to make sure I have the most recent recommended cipher list. I am currently using version 5667.

                            My next step will be to update Alpha, but I have to do it on 5 different servers, so it's not something I do lightly....

                            Comment


                              #15
                              Re: New recommended SSL Cipher List

                              The list has not changed since 5667. If you clear out the value in your server, it will revert to the default for that version, but it is also the current default.

                              You should take the time to understand the specific error you are getting though in order to determine what the appropriate fix is. Many browsers have begun to more aggressively warn about TLS versions for example, and that is not something you can fix by changing the cipher list.

                              Lenny Forziati
                              Vice President, Internet Products and Technical Services
                              Alpha Software Corporation

                              Comment

                              Working...
                              X