How to fix the SSL 3.0 poodle Vulnerability

Source: Internet
Author: User

Google disclosed a security vulnerability in SSL 3.0 on Tuesday.

For more information, visit: https://www.openssl.org /~ Bodo/ssl-poodle.pdf

 

What isSSL3.0 poodleVulnerabilities?

The SSL protocol was developed by Netscape and V3.0 was released in 1996. SSL 3.0 has been in existence for 15 years. Currently, most browsers support this version. Generally, users' browsers use the new security protocol to connect to the server. To maintain compatibility, when the connection to the browser security protocol fails, they attempt to connect to the old security protocol, this includes SSL 3.0.

The principle of the poodle attack is that hackers deliberately create a security protocol connection failure, trigger the browser's downgrade, use SSL 3.0, and then use special measures, the privacy information of a certain byte length is extracted from the secure connection covered by SSL 3.0.

 

 

How can I prevent the SSL3.0-poodle vulnerability?

We recommend that you manually disable SSLv3 support on the client, or disable SSLv3 support on the server, or disable both of them to effectively prevent the impact of the poodle vulnerability on you.

 

Disable SSLv3 support:

 

Nginx:

Ssl_protocols tlsv1 tlsv1.1 tlsv1.2;

Ssl_prefer_server_ciphers on;

Ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384: ECDHE-RSA-AES128-GCM-SHA256: ECDHE-RSA-AES256

Sha384: ECDHE-RSA-AES128-SHA256: ECDHE-RSA-RC4-SHA: ECDHE-RSA-AES256-SHA: DHE-RSA-AES256-SHA: DHE

RSA-AES128-SHA: RC4-SHA :! Anull :! Enull :! Export :! Des :! 3DES :! MD5 :! DSS :! PKS;

Ssl_session_timeout 5 m;

Ssl_session_cache builtin: 1000 shared: SSL: 10 m;

 

Apache:

Sslprotocol all-SSLv2-SSLv3

Sslhonorcipherorder on

Sslciphersuite ECDHE-RSA-AES256-GCM-SHA384: ECDHE-RSA-AES128-GCM-SHA256: ECDHE-RSA-AES256

Sha384: ECDHE-RSA-AES128-SHA256: ECDHE-RSA-RC4-SHA: ECDHE-RSA-AES256-SHA: DHE-RSA-AES256-SHA: DHE

RSA-AES128-SHA: RC4-SHA :! Anull :! MD5 :! DSS

 

Disable client SSLv3 support:

 

Google has said that the chorme browser has used technical means to shield the browser from automatically downgrading to the SSL3.0 link. Manually disable the methods supported by SSL 3.0.

WindowsUser:

1) Close chrome completely

2) copy a shortcut that usually opens the Chrome browser

3) Right-click the new shortcut to go to the properties page.

4) enter the following command at the end of the field in the space after the target: SSL-version-min = tls1

Mac OS XUser:

1) Close chrome completely

2) Find the terminal that comes with the Local Machine (Terminal)

3) enter the following command:/applications/Google \ chrome. APP/contents/MACOs/Google \ chrome -- SSL-version-min = tls1

LinuxUser:

1) Close chrome completely

2) enter the following command in the terminal: Google-chrome-SSL-version-min = tls1

In Firefox, users can enter about: settings by entering about: config in the address bar, and then adjust security. TLS. version. min to 1.

 

Set Method reference from http: // watone. China/news/SSLv3-Poodle.htm

How to fix the SSL 3.0 poodle Vulnerability

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.