We just learned from the OpenSSL official website SSLv3-poodle attack, please pay attention to the majority of users, detailed information please visit: https://www.openssl.org /~ Bodo/ssl-poodle.pdf
This vulnerability runs through all SSLv3 versions. Hackers can use a man-in-the-middle attack or other similar methods (SSL3.0 is used at both ends of the hijacked data encryption ), you can obtain the transmitted data (such as cookies ). No Patches have been released until the post is published.
Wosign is recommended to disable SSLv3 support on the client, or disable SSLv3 support on the server, or disable both.
Disable SSLv3 support:
Nginx:
Ssl_protocols tlsv1 tlsv1.1 tlsv1.2;
Ssl_prefer_server_ciphers on;
Ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384: ECDHE-RSA-AES128-GCM-SHA256: ECDHE-RSA-AES256
Sha384: ECDHE-RSA-AES128-SHA256: ECDHE-RSA-RC4-SHA: ECDHE-RSA-AES256-SHA: DHE-RSA-AES256-SHA: DHE
RSA-AES128-SHA: RC4-SHA :! Anull :! Enull :! Export :! Des :! 3DES :! MD5 :! DSS :! PKS;
Ssl_session_timeout 5 m;
Ssl_session_cache builtin: 1000 shared: SSL: 10 m;
Apache:
Sslprotocol all-SSLv2-SSLv3
Sslhonorcipherorder on
Sslciphersuite ECDHE-RSA-AES256-GCM-SHA384: ECDHE-RSA-AES128-GCM-SHA256: ECDHE-RSA-AES256
Sha384: ECDHE-RSA-AES128-SHA256: ECDHE-RSA-RC4-SHA: ECDHE-RSA-AES256-SHA: DHE-RSA-AES256-SHA: DHE
RSA-AES128-SHA: RC4-SHA :! Anull :! MD5 :! DSS
Disable client SSLv3 support:
Google has said that the chorme browser has used technical means to shield the browser from automatically downgrading to the SSL3.0 link. Manually disable the methods supported by SSL 3.0.
Windows users:
1) Close chrome completely
2) copy a shortcut that usually opens the Chrome browser
3) Right-click the new shortcut to go to the properties page.
4) enter the following command at the end of the field in the space after the target: SSL-version-min = tls1
Mac OS X users:
1) Close chrome completely
2) Find the terminal that comes with the Local Machine (Terminal)
3) enter the following command:/applications/Google \ chrome. APP/contents/MACOs/Google \ chrome -- SSL-version-min = tls1
Linux users:
1) Close chrome completely
2) enter the following command in the terminal: Google-chrome-SSL-version-min = tls1
In Firefox, users can enter about: settings by entering about: config in the address bar, and then adjust security. TLS. version. min to 1.
How to fix SSL 3.0 heartbleed Vulnerability