{"id":780,"date":"2014-10-15T21:40:39","date_gmt":"2014-10-15T21:40:39","guid":{"rendered":"https:\/\/qbytes.cloud\/?p=780"},"modified":"2014-10-15T21:40:39","modified_gmt":"2014-10-15T21:40:39","slug":"sslv3-vulnerability-poodle","status":"publish","type":"post","link":"https:\/\/www.qbytes.cloud\/index.php\/2014\/10\/15\/sslv3-vulnerability-poodle\/","title":{"rendered":"SSLv3 Vulnerability (Poodle)"},"content":{"rendered":"<p>According to The Register, a serious vulnerability in SSL v3 will be disclosed tomorrow on October 15th. Some people are recommending disabling SSL v3 in various daemons until further notice.<\/p>\n<p>A vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections to be calculated by a network attacker.<\/p>\n<p>SSL 3.0 is nearly 18 years old, but support for it remains widespread. Most importantly, nearly all browsers support it and, in order to work around bugs in HTTPS servers, browsers will retry failed connections with older protocol versions, including SSL 3.0. Because a network attacker can cause connection failures, they can trigger the use of SSL 3.0 and then exploit this issue.<\/p>\n<p>Disabling SSL 3.0 support, or CBC-mode ciphers with SSL 3.0, is sufficient to mitigate this issue, but presents significant compatibility problems, even today. <\/p>\n<p>Detection (Linux)<\/p>\n<p>The following script can be run against the server in question. The command will return &#8216;SSL 3.0 enabled&#8217; if vulnerable and &#8216;SSL 3.0 disabled&#8217; if not.<\/p>\n<p>_______________<\/p>\n<p>#!\/bin\/bash<br \/>\nret=$(echo Q | timeout 5 openssl s_client -connect &#8220;${1-`hostname`}:${2-443}&#8221; -ssl3 2> \/dev\/null)<br \/>\nif echo &#8220;${ret}&#8221; | grep -q &#8216;Protocol.*SSLv3&#8217;; then<br \/>\n  if echo &#8220;${ret}&#8221; | grep -q &#8216;Cipher.*0000&#8217;; then<br \/>\n    echo &#8220;SSL 3.0 disabled&#8221;<br \/>\n  else<br \/>\n    echo &#8220;SSL 3.0 enabled&#8221;<br \/>\n fi<br \/>\nelse<br \/>\n  echo &#8220;SSL disabled or other error&#8221;<br \/>\nfi<br \/>\n_______________<\/p>\n<p>NOTE: This script takes the hostname of the server to check as the first argument and an optional port as the second. By default it will check the local system, port 443.<br \/>\nResolution<\/p>\n<p>To avoid this vulnerability, Red Hat recommends disabling SSL and using only TLSv1.1 or TLSv1.2. Backwards compatibility can be achieved using TLSv1.0. Many products Red Hat supports have the ability to use SSLv2 or SSLv3 protocols, however it is strongly recommended against.<\/p>\n<p>To mitigate this vulnerability as it affects httpd, set the SSLProtocol directive as follows in \/etc\/httpd\/conf.d\/ssl.conf:<\/p>\n<p>Note: This directive must either be located at the topmost level of the configuration file, or inside the default virtual host configuration for an address.<\/p>\n<p>Option 1: Disable SSLv2 and SSLv3 (Enable everything except SSLv2 and SSLv3)<br \/>\nSSLProtocol All -SSLv2 -SSLv3<\/p>\n<p>Option 2: Disable everything except TLSv1.x<\/p>\n<p>On RHEL 7 or RHEL 6.6 and later:<br \/>\nSSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2<\/p>\n<p>On other platforms:<br \/>\nSSLProtocol -All +TLSv1<\/p>\n<p>Then restart httpd:<\/p>\n<p># service httpd restart<\/p>\n<p>Resources:<br \/>\nFor Microsoft<br \/>\n<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/3009008.aspx\" target=\"_blank\" rel=\"noopener\">https:\/\/technet.microsoft.com\/en-us\/library\/security\/3009008.aspx<\/a><\/p>\n<p><a href=\"https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf<\/a><br \/>\n<a href=\"http:\/\/forums.cpanel.net\/f185\/sslv3-vulnerability-432641.html\" target=\"_blank\" rel=\"noopener\">http:\/\/forums.cpanel.net\/f185\/sslv3-vulnerability-432641.html<\/a><\/p>\n<p><a href=\"http:\/\/googleonlinesecurity.blogspot.co.uk\/2014\/10\/this-poodle-bites-exploiting-ssl-30.html\" target=\"_blank\" rel=\"noopener\">http:\/\/googleonlinesecurity.blogspot.co.uk\/2014\/10\/this-poodle-bites-exploiting-ssl-30.html<\/a><br \/>\nTests<br \/>\nTest your web server for SSLv2<br \/>\n<a href=\"https:\/\/www.ssllabs.com\/ssltest\/index.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ssllabs.com\/ssltest\/index.html<\/a><br \/>\nWhat you are looking for is:<br \/>\nTLS 1.2 Yes<br \/>\nTLS 1.1 Yes<br \/>\nTLS 1.0 Yes<br \/>\nSSL 3 No<br \/>\nSSL 2 No<\/p>\n<p>For Nginx &#8211; there are other files to edit:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n\n\/usr\/local\/psa\/admin\/conf\/templates\/default\/server\/nginxVhosts.php\n\/usr\/local\/psa\/admin\/conf\/templates\/default\/nginxDomainVirtualHost.php\n\/usr\/local\/psa\/admin\/conf\/templates\/default\/domain\/nginxDomainVirtualHost.php\n\n<\/pre>\n<p>Rebuild after any changes<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n# \/usr\/local\/psa\/admin\/bin\/httpdmng --reconfigure-all\n<\/pre>\n<p>Other Resources:<\/p>\n<p>CPanel\/WHM<br \/>\n<a href=\"https:\/\/documentation.cpanel.net\/display\/CKB\/How+to+Adjust+Cipher+Protocols\" target=\"_blank\" rel=\"noopener\">https:\/\/documentation.cpanel.net\/display\/CKB\/How+to+Adjust+Cipher+Protocols<\/a><\/p>\n<p><a href=\"http:\/\/www.cpanelkb.net\/fix-poodle-sslv3-vulnerability\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.cpanelkb.net\/fix-poodle-sslv3-vulnerability\/<\/a><br \/>\n<a href=\"http:\/\/thecpaneladmin.com\/disabling-support-for-sslv3-on-a-cpanel-server\/\" target=\"_blank\" rel=\"noopener\">http:\/\/thecpaneladmin.com\/disabling-support-for-sslv3-on-a-cpanel-server\/<\/a><br \/>\nPlesk<br \/>\n<a href=\"http:\/\/kb.sp.parallels.com\/en\/123160\" target=\"_blank\" rel=\"noopener\">http:\/\/kb.sp.parallels.com\/en\/123160<\/a><\/p>\n<p><a href=\"http:\/\/www.percona.com\/blog\/2014\/10\/15\/how-to-close-poodle-sslv3-security-flaw-cve-2014-3566\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.percona.com\/blog\/2014\/10\/15\/how-to-close-poodle-sslv3-security-flaw-cve-2014-3566\/<\/a><br \/>\n<a href=\"http:\/\/bobcares.com\/blog\/protecting-your-cpanel-whm-server-from-sslv3-poodle-vulnerability-guide-to-mitigate-cve-2014-3566-by-disabling-ssl-3-0-in-exim-apache-nginx-pure-ftp-proftpd-dovecot-and-courier-imap\" target=\"_blank\" rel=\"noopener\">http:\/\/bobcares.com\/blog\/protecting-your-cpanel-whm-server-from-sslv3-poodle-vulnerability-guide-to-mitigate-cve-2014-3566-by-disabling-ssl-3-0-in-exim-apache-nginx-pure-ftp-proftpd-dovecot-and-courier-imap<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to The Register, a serious vulnerability in SSL v3 will be disclosed tomorrow on October 15th. Some people are recommending disabling SSL v3 in various daemons until further notice. A vulnerability in the design of SSL version 3.0. This vulnerability allows the plaintext of secure connections to be calculated by a network attacker. SSL &#8230; <a title=\"SSLv3 Vulnerability (Poodle)\" class=\"read-more\" href=\"https:\/\/www.qbytes.cloud\/index.php\/2014\/10\/15\/sslv3-vulnerability-poodle\/\" aria-label=\"Read more about SSLv3 Vulnerability (Poodle)\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,102],"tags":[],"class_list":["post-780","post","type-post","status-publish","format-standard","hentry","category-administration","category-security"],"_links":{"self":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/comments?post=780"}],"version-history":[{"count":0,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/780\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/media?parent=780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/categories?post=780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/tags?post=780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}