On Thu, Jun 11, 2015 at 09:43:24PM +0000, Kannan Narayanasamy -X (kannanar - 
HCL TECHNOLOGIES LIMITED at Cisco) wrote:
> Hi All,
> 
> To resolve openSSL POODLE vulnerability we need to disable the SSLv3. In our 
> application we have using openSSL through Apache. We have disabled using the 
> below lines.
> 
> SSLProtocol all -SSLv2 -SSLv3
> 
> We are using 443 as SSL port. The command openssl s_client -connect 
> <IPAddress>:443 -ssl3 shows the handshake failure message for 443 port. But 
> for the ports 3333 and 4444 is connecting using SSLv3. The scanner as well 
> report the high severity risk for those ports. In our application we are 
> using those ports for syslog related tasks. If we change the port some other, 
> then the scanner shows the new port in the list.
> 
> How to disable the SSLv3 connection for those ports as well since may 
> customers are waiting for the fix. Your suggestion is much appreciated. 

There are 2 solutions:
- Change the configuration of syslog to disable SSLv3.  Not sure
  it can actually be configured.
- Build your openssl with SSLv3 disabled.


Kurt

_______________________________________________
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
  • [ope... Kannan Narayanasamy -X (kannanar - HCL TECHNOLOGIES LIMITED at Cisco)
    • ... Kurt Roeckx
      • ... Kannan Narayanasamy -X (kannanar - HCL TECHNOLOGIES LIMITED at Cisco)
        • ... Joey Yandle
          • ... Kannan Narayanasamy -X (kannanar - HCL TECHNOLOGIES LIMITED at Cisco)
            • ... Kurt Roeckx

Reply via email to