> @@ -0,0 +1,73 @@
> +---
> +author: <a href="http://blog.xebialabs.com/author/aphillips/";>Andrew 
> Phillips</a>
> +comments: true
> +date: 2014-10-22 23:30:00+00:00
> +layout: post
> +slug: poole-jclouds
> +title: What POODLE means for jclouds
> +---

General commentary is that we go into way too much detail and dangerously so, 
since we aren't security experts. This can cause users to get the wrong idea. 
Considering I can't find any java http client that actually has an official 
note like this, so we are first to war, and maybe questionably so for reasons 
discussed earlier.

Oracle, the stewards of the JVM say to [deprecate the use of SSL 3.0 as soon as 
possible](http://www.oracle.com/technetwork/topics/security/poodlecve-2014-3566-2339408.html),
 they don't get into the weeds and in fact patches to the JVM and info about 
them are under a [support 
firewall](https://support.oracle.com/rs?type=doc&id=1935950.1).

Redhat made some commentary on [disabling on java 
servers](https://access.redhat.com/solutions/1232233) which can be used for 
guidance. Note that clearly servers have more at play as they serve browsers, 
which are the primary attack vector.

If you follow that link, you'll see a blurb on clients eventually.
https://access.redhat.com/articles/1232123

Best advice I can give is do not make up advice, just state facts.

This is a MITM attack (quote oracle or red hat for description). Suggest users 
assess their level of impact. Note the component responsible, show an *example* 
of how to affect HttpsUrlConnection, but be clear about who to ask for details 
(javadoc, oracle, openjdk, etc). Note components or configuration that limit 
ssl configuration without suggesting things like "trust-all-certs" should ever 
be used for those concerned with MITM.

Hope this helps.

---
Reply to this email directly or view it on GitHub:
https://github.com/jclouds/jclouds-site/pull/138/files#r19284835

Reply via email to