- Joined
- Feb 27, 2003
- Messages
- 8,138
Update Oct 16th:
A version of OpenSSL has been released which adds support for TLS_FALLBACK_SCSV.
Update openssl and restart your services:
But we do still recommend disabling SSLv3 anyway.
I've found a few sites that support the proper TLS_FALLBACK_SCSV test, so confirm the SSL ports pass, either by support for TLS_FALLBACK_SCSV, or by disalbing SSLv3.
https://www.ssllabs.com/ssltest/index.html
https://www.tinfoilsecurity.com/poodle
---------------------------
Hello,
As many of you area likely already aware, a new vulnerability was discovered in SSLv3 called "Poodle":
http://googleonlinesecurity.blogspot.com.au/2014/10/this-poodle-bites-exploiting-ssl-30.html
As such we've released a new set of ciphers that we recommend everyone change to use:
http://help.directadmin.com/item.php?id=571
I'm hoping to write a simple script you can download and run to make all of these changes for you, but for now, just make the changes to the mentioned files (if you have those files), and restart your services.
There is more info an discussion in this thread:
http://forum.directadmin.com/showthread.php?t=50099
If you'd like to test your ports, I've written this *very* basic php script that simply checks for SSLv3 (not the TLS_FALLBACK_SCSV change):
http://files1.directadmin.com/services/all/ssl_test.php.txt
I don't recommend making this a public URL as it does run command line functions (delete script when you're done)
Save it to a .php file on your system, and access it through apache.
The function "exec" cannot be in the disable_functions list.
Note, your may see TLSv1 and TLSv1.1 not work be reported as "bad", but that context of "bad" just means some older clients may break.
The main goal is to see SSLv3 disabled, but TLS enabled (preferably inclusive of v1 and 1.1)
John
A version of OpenSSL has been released which adds support for TLS_FALLBACK_SCSV.
Update openssl and restart your services:
Code:
yum -y update openssl
I've found a few sites that support the proper TLS_FALLBACK_SCSV test, so confirm the SSL ports pass, either by support for TLS_FALLBACK_SCSV, or by disalbing SSLv3.
https://www.ssllabs.com/ssltest/index.html
https://www.tinfoilsecurity.com/poodle
---------------------------
Hello,
As many of you area likely already aware, a new vulnerability was discovered in SSLv3 called "Poodle":
http://googleonlinesecurity.blogspot.com.au/2014/10/this-poodle-bites-exploiting-ssl-30.html
As such we've released a new set of ciphers that we recommend everyone change to use:
http://help.directadmin.com/item.php?id=571
I'm hoping to write a simple script you can download and run to make all of these changes for you, but for now, just make the changes to the mentioned files (if you have those files), and restart your services.
There is more info an discussion in this thread:
http://forum.directadmin.com/showthread.php?t=50099
If you'd like to test your ports, I've written this *very* basic php script that simply checks for SSLv3 (not the TLS_FALLBACK_SCSV change):
http://files1.directadmin.com/services/all/ssl_test.php.txt
I don't recommend making this a public URL as it does run command line functions (delete script when you're done)
Save it to a .php file on your system, and access it through apache.
The function "exec" cannot be in the disable_functions list.
Note, your may see TLSv1 and TLSv1.1 not work be reported as "bad", but that context of "bad" just means some older clients may break.
The main goal is to see SSLv3 disabled, but TLS enabled (preferably inclusive of v1 and 1.1)
John