On Tue, Nov 04, 2014 at 06:54:55AM +0000, Vaghasiya, Nimesh wrote:

> We are upgrading to OpenSSL 0.9.8zc on FreeBSD based OS to mitigate POODLE 
> risk.
> Could you please answer our following queries,
> 
> 1. Will 0.9.8zc allow following methods to fallback to SSLv3 ?
>      SSLv23_method(void),
>      SSLv23_server_method(void),
>      SSLv23_client_method(void)

These will "negotiate" (not "fall back" to) SSL 3.0 with systems
that are only capable of SSL 3.0 or SSL 2.0, unless you include

        SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3

in a call to SSL_CTX_set_options().  With the above options only
TLS 1.0 or higher is negotiated.  POODLE is an attack on browsers
that explicitly disable higher protocol versions when connections
fail and try with just SSL 3.0.  If your application is not doing
that, you're reasonably safe, but do disable at least SSLv2.

> Does this mean, 0.9.8zc needs to be built with -DOPENSSL_NO_SSL3
> to block downgrading to SSLv3 in SSLv23_* functions ?

No, that's overkill.  This is not a question for openssl-dev.
Redirecting to openssl-users.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to