Please wait...

How to protect. SSL 3.0 Protocol Vulnerability and POODLE Attack

How to protect. SSL 3.0 Protocol Vulnerability and POODLE Attack

All systems and applications utilizing the Secure Socket Layer (SSL) 3.0 with cipher-block chaining (CBC) mode ciphers may be vulnerable. However, the POODLE (Padding Oracle On Downgraded Legacy Encryption) attack demonstrates this vulnerability using web browsers and web servers, which is one of the most likely exploitation scenarios.


4143185674_4b32051a96_zHow to protect own server

For Nginx just switch off SSLv3 like this:

was: ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2;
now: ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

Apache

In the configuration file ssl.conf fot module mod_ssl need change string like this

SSLProtocol all -SSLv3 -SSLv2

Postfix

In the files main.cf need to forbid use SSL

smtpd_tls_mandatory_protocols=!SSLv2, !SSLv3

Sendmail

Need to edit .mc file in the section LOCAL_CONFIG chang +SSLv3 to -SSLv3

SSLProtocol -ALL -SSLv2 -SSLv3 +TLSv1

and add !SSLv3

SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!SSLv3

then

# make install & make restart

IMAP и POP3 server Dovecot

In the 10-ssl.conf or dovecot.conf

ssl_protocols = !SSLv3 !SSLv2

HAProxy Load Balancer

In the file haproxy.cfg

frontend name
bind public_ip:443 ssl crt /path/to/certs no-sslv3

Do not forget restart 🙂


Leave comments

You must be logged in to post a comment.