[ 
https://issues.apache.org/jira/browse/DERBY-6764?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14181484#comment-14181484
 ] 

Rick Hillegas commented on DERBY-6764:
--------------------------------------

The instructions for disabling SSLv3 on Oracle JVMs can be found here: 
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=472751589960646&parent=DOCUMENT&sourceId=1935500.1&id=1935950.1&_afrWindowMode=0&_adf.ctrl-state=1ccqv5t113_4

Derby users who use SSL/TLS should follow these instructions if they are 
running Derby on Oracle JVMs.

> analyze impact of poodle security alert on Derby client - server ssl support
> ----------------------------------------------------------------------------
>
>                 Key: DERBY-6764
>                 URL: https://issues.apache.org/jira/browse/DERBY-6764
>             Project: Derby
>          Issue Type: Task
>            Reporter: Myrna van Lunteren
>
> Recently, a security weakness was found in SSLv3, POODLE: SSLv3 vulnerability 
> (CVE-2014-3566)
> Derby supports ssl between the client and network server.
> We should investigate this and decide if we need to change our product, e.g. 
> to eliminate support for SSL in favor of its successor TLS.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to