Fix POODLE SSLv3 Vulnerability
- Secure openssl
- Fix POODLE
- SSLv3 Vulnerability
- Disable SSLv3 Vulnerability
- Secure Openssl
After Heartbleed and Shellshock here comes another SSL vulnerability "POODLE SSLv3 Vulnerability".
POODLE affects SSLv3 or version 3 of the Secure Sockets Layer protocol, which is used to encrypt traffic between a browser and a web site or between a user’s email client and mail server. SSL vulnerability in SSLv3 isn't limited to just webservers like Apache Nginx Litespeed It's in any client or server that uses the SSLv3 protocol: from SSL tunnels to encryption services to remote management interfaces. It’s not as serious as the recent Heartbleed or Shellshock vulnerabilities, it could allow an attacker to hijack and decrypt the session cookie that identifies you to a service like Twitter or Google, and then take over your accounts without needing your password only from same network
The solutions is to disable SSLv3 protocol
Current SSL protocol on most of servers are "ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2"