How to fix pow.sslv3 Security Vulnerabilities (CVE-2014-3566)

Source: Internet
Author: User

How to fix pow.sslv3 Security Vulnerabilities (CVE-2014-3566)

Poacy = Padding Oracle On Downgraded Legacy Encryption

First, this is a late name, but the security problem is still terrible. The newest Security Vulnerability (CVE-2014-3566) code is POODLE, which is an abbreviation. Is the title actually meaningful?

This vulnerability is very similar to Browser Exploit Against ssl tls, but there is no reliable solution unless SSLv3 support is completely disabled. In short, attackers can obtain plaintext data in your encrypted stream.

Let's take a look at how to deal with it. Before Mozilla Security Wiki Serverside TLS, we recommend strict protocol and encryption method restrictions, which deserves our attention.

Apache

Disable SSLv3 and SSLv3 in the SSL configuration of Apache:

SSLProtocol all-SSLv2-SSLv3

Nginx

Only TLS protocol is allowed in Nginx:

Ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

MySQL

It is worth noting that, unless you deploy the sha256_password plug-in MySQL 5.6, plugin for MySQL 5.6 will have to complete SSL/TLS connection negotiation before verifying handshakes, therefore, this attack vector is only a problem-a data stream for effective login access. (Sha256_password provides an option for SSL/TLS authentication)

This makes things more interesting. Unlike Apache and Nginx, there is no way to fully enable and disable the SSL/TLS protocol, but you can specify the encryption specifications for SSL communication.

To delete SSLv3 support in MySQL, make sure that SSLv3 encryption is not used in the configuration.

In this bug, you can find the SSLv3 encryption method list:

Openssl ciphers-v 'default' | awk '/SSLv3 Kx = (RSA | DH (512)/{print $1 }'
DHE-RSA-AES256-SHA
DHE-DSS-AES256-SHA
DHE-RSA-CAMELLIA256-SHA
DHE-DSS-CAMELLIA256-SHA
AES256-SHA
CAMELLIA256-SHA
EDH-RSA-DES-CBC3-SHA
EDH-DSS-DES-CBC3-SHA
DES-CBC3-SHA
DHE-RSA-AES128-SHA
DHE-DSS-AES128-SHA
DHE-RSA-SEED-SHA
DHE-DSS-SEED-SHA
DHE-RSA-CAMELLIA128-SHA
DHE-DSS-CAMELLIA128-SHA
AES128-SHA
SEED-SHA
CAMELLIA128-SHA
RC4-SHA
RC4-MD5
EDH-RSA-DES-CBC-SHA
EDH-DSS-DES-CBC-SHA
DES-CBC-SHA
EXP-EDH-RSA-DES-CBC-SHA
EXP-EDH-DSS-DES-CBC-SHA
EXP-DES-CBC-SHA
EXP-RC2-CBC-MD5
EXP-RC4-MD5

You can disable SSLv3 by deleting the preceding information in the ssl-cipher configuration. Of course, ensuring that MySQL services do not provide general access is by far the most important step in defending against CVE-2014-3566 vulnerabilities.

Here you can learn

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.