[ 
https://issues.apache.org/jira/browse/DIRSERVER-2020?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14215031#comment-14215031
 ] 

Pierre Smits commented on DIRSERVER-2020:
-----------------------------------------

This question was also asked in the user ML, See this thread in the archive:
http://directory.markmail.org/search/?q=poodle#query:poodle%20list%3Aorg.apache.directory.dev+page:1+mid:wxjwdkwtzw7nsmym+state:results

Did your scan reveal that the ApacheDS 2.0 code has this? Could you provide the 
result of your scan of the ApacheDS 2.0. implementation?



> Poodle remediation for ApacheDS 2.X
> -----------------------------------
>
>                 Key: DIRSERVER-2020
>                 URL: https://issues.apache.org/jira/browse/DIRSERVER-2020
>             Project: Directory ApacheDS
>          Issue Type: Task
>          Components: ldap
>    Affects Versions: 2.0.0-M10
>         Environment: Production
>            Reporter: RakeshAcharya
>            Priority: Critical
>              Labels: patch
>
> How do we disable SSlv3 protocol for apache DS 2.X ?
> As part of poodle remediation we need to disable SSL v3 ASAP in production 
> boxes as the scan showed its vulnerable.
> I cant find any configuration pertaining to the same which I could change .



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to