<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CSS11500 ssl-server authentication in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196039#M40010</link>
    <description>&lt;P&gt;I've read the docs regarding a solution for the SSL/TLS renegotiation vulnerability for the CSS devices and I have a question regarding the recommendation of using ssl-server authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the doc it states that with ssl-server authentication configured ssl connections will require the client to exchange a certificate during the ssl handshake process and that the CSS will verify the cert is valid.&amp;nbsp; I'm trying to determine if the client certificate is an x.509 certificate, a standard CA the client would issue or is it change that the cert and key matches what I have configured in my ssl-proxy-list????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have way to many clients to go back and work through a deployment for x.509 so if thats the case is there something else I can do to resolve this vulnerabilty.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Wed, 27 Mar 2013 15:52:08 GMT</pubDate>
    <dc:creator>shday</dc:creator>
    <dc:date>2013-03-27T15:52:08Z</dc:date>
    <item>
      <title>CSS11500 ssl-server authentication</title>
      <link>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196039#M40010</link>
      <description>&lt;P&gt;I've read the docs regarding a solution for the SSL/TLS renegotiation vulnerability for the CSS devices and I have a question regarding the recommendation of using ssl-server authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the doc it states that with ssl-server authentication configured ssl connections will require the client to exchange a certificate during the ssl handshake process and that the CSS will verify the cert is valid.&amp;nbsp; I'm trying to determine if the client certificate is an x.509 certificate, a standard CA the client would issue or is it change that the cert and key matches what I have configured in my ssl-proxy-list????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have way to many clients to go back and work through a deployment for x.509 so if thats the case is there something else I can do to resolve this vulnerabilty.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Wed, 27 Mar 2013 15:52:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196039#M40010</guid>
      <dc:creator>shday</dc:creator>
      <dc:date>2013-03-27T15:52:08Z</dc:date>
    </item>
    <item>
      <title>CSS11500 ssl-server authentication</title>
      <link>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196040#M40011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Client certs are also x.509 type certs and would be issued by CA. Client authentication is also optional and is used by server to confirm the identity of client to which it is talking to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which vulnerability are you referreing to and in which version? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as i know client authentication adds an extra parameter of security but is optional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kanwal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 09:22:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196040#M40011</guid>
      <dc:creator>Kanwaljeet Singh</dc:creator>
      <dc:date>2013-03-28T09:22:08Z</dc:date>
    </item>
    <item>
      <title>CSS11500 ssl-server authentication</title>
      <link>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196041#M40012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Mar 2013 21:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196041#M40012</guid>
      <dc:creator>Jorge Bejarano</dc:creator>
      <dc:date>2013-03-28T21:09:51Z</dc:date>
    </item>
    <item>
      <title>CSS11500 ssl-server authentication</title>
      <link>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196042#M40013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sg0810401 (08.10.4.01)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vulnerability is&amp;nbsp; &lt;/P&gt;&lt;H3&gt;Advisory ID: cisco-sa-20091109-tls&lt;/H3&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Apr 2013 17:48:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css11500-ssl-server-authentication/m-p/2196042#M40013</guid>
      <dc:creator>shday</dc:creator>
      <dc:date>2013-04-03T17:48:32Z</dc:date>
    </item>
  </channel>
</rss>

