On Tue, Nov 04, 2014 at 06:54:55AM +0000, Vaghasiya, Nimesh wrote: > We are upgrading to OpenSSL 0.9.8zc on FreeBSD based OS to mitigate POODLE > risk. > Could you please answer our following queries, > > 1. Will 0.9.8zc allow following methods to fallback to SSLv3 ? > SSLv23_method(void), > SSLv23_server_method(void), > SSLv23_client_method(void)
These will "negotiate" (not "fall back" to) SSL 3.0 with systems that are only capable of SSL 3.0 or SSL 2.0, unless you include SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3 in a call to SSL_CTX_set_options(). With the above options only TLS 1.0 or higher is negotiated. POODLE is an attack on browsers that explicitly disable higher protocol versions when connections fail and try with just SSL 3.0. If your application is not doing that, you're reasonably safe, but do disable at least SSLv2. > Does this mean, 0.9.8zc needs to be built with -DOPENSSL_NO_SSL3 > to block downgrading to SSLv3 in SSLv23_* functions ? No, that's overkill. This is not a question for openssl-dev. Redirecting to openssl-users. -- Viktor. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org