Skip to main content
Version: 3.14.x.x LTS

Support

Platform support

nevisProxy is implemented in C/C++ and can be deployed on the following operating systems:

PlatformRequires nevisOrbSupport CORBARemote cache support
Suse Linux Enterprise server 10 and 11 64bitnonoMySQL-Cluster
Red Hat Enterprise Linux 5, 6 and 7 (or compatible CentOs) 64bitnonoMySQL-Cluster
(error) As of the beginning of 2018, Solaris is not supported anymore. Use another platform instead.
Solaris 10 sparc 64bitnononone
Solaris 10 ix86 64bitnonoOracle 11

Not supported protocols and ciphers

The table below lists protocols and en- or decryption algorithms (ciphers) that are not supported (anymore) by the Nevis software. *We strive for completeness. However, we cannot guarantee this. Contact us if you think a certain unsupported protocol or cipher is missing in the overview.

Not-supported protocol or cipherRemarks
HTTP/0.9Front-end connections: HTTP/0.9 does not function at all (error) Back-end connections:HTTP/0.9 is not supported, but might still work. We strongly recommend not using HTTP/0.9 at all, neither for front-end nor for back-end connections!
Diffie-Hellman (DH) keys < 1024 bitOpenSSL only supports DH keys of 1024 bit or higher.
SSLv2For over 20 years, OpenSSL has marked SSLv2 as deprecated. As of March 2016, OpenSSL has abandoned the use of SSLv2 completely due to security reasons.
SSL legacy renegotiationWe strongly recommend not using renegotiation features in SSL legacy. The reason for this is that the SSL protocol 3.0 and possibly earlier, as used in among others OpenSSL before 0.9.8l, does not properly associate renegotiation handshakes with an existing connection. This allows man-in-the-middle attackers to insert data into HTTPS (CVE-2009-3555).
All ciphers not supported by the latest OpenSSLClick the following link for an overview of all cipher suites supported by OpenSSL: https://www.openssl.org/docs/man1.0.2/apps/ciphers.html We recommend that you only use ciphers (encryption algorithms) included in this overview.