[
https://issues.apache.org/jira/browse/DIRSERVER-2020?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14215031#comment-14215031
]
Pierre Smits commented on DIRSERVER-2020:
-----------------------------------------
This question was also asked in the user ML, See this thread in the archive:
http://directory.markmail.org/search/?q=poodle#query:poodle%20list%3Aorg.apache.directory.dev+page:1+mid:wxjwdkwtzw7nsmym+state:results
Did your scan reveal that the ApacheDS 2.0 code has this? Could you provide the
result of your scan of the ApacheDS 2.0. implementation?
> Poodle remediation for ApacheDS 2.X
> -----------------------------------
>
> Key: DIRSERVER-2020
> URL: https://issues.apache.org/jira/browse/DIRSERVER-2020
> Project: Directory ApacheDS
> Issue Type: Task
> Components: ldap
> Affects Versions: 2.0.0-M10
> Environment: Production
> Reporter: RakeshAcharya
> Priority: Critical
> Labels: patch
>
> How do we disable SSlv3 protocol for apache DS 2.X ?
> As part of poodle remediation we need to disable SSL v3 ASAP in production
> boxes as the scan showed its vulnerable.
> I cant find any configuration pertaining to the same which I could change .
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)