Re: How to prevent SSLv3/Poodle attack?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2014-10-15 16:11, lst_hoe02@xxxxxxxxx wrote:
> Hello,
> 
> as of today a new exploit against SSL has been revelead which is a
> protocol weakness of ancient SSLv3. The common advice is to disable
> SSLv3 so the question is how to do this with Cyrus without doing too
> much damage.
> 
> The first idea is of course to do something like
> 
> tls_cipher_list: ALL:-SSLv3:-SSLv2

As TLSv1.0, 1.1 and SSLv3 seem share their cipher suites, disabling
SSLv3 ciphers not only disables SSLv3, but also all TLS versions except
1.2, which sadly still breaks a lot of clients.

> in imapd.conf.
> 
> But i wonder if this is the correct fix because our default from Ubuntu
> 12.04 looks like this:
> 
> tls_cipher_list: TLSv1+HIGH:!aNull:@STRENGTH

This should be sufficient to disable SSLv3, have you tested your server?
(e.g. openssl s_client -ssl3 -starttls imap -connect host:143)


-- 
Mit freundlichen Grüßen, / Best Regards,
Sven Schwedas
Systemadministrator
TAO Beratungs- und Management GmbH | Lendplatz 45 | A - 8020 Graz
Mail/XMPP: sven.schwedas@xxxxxx | +43 (0)680 301 7167
http://software.tao.at

Attachment: signature.asc
Description: OpenPGP digital signature

----
Cyrus Home Page: http://www.cyrusimap.org/
List Archives/Info: http://lists.andrew.cmu.edu/pipermail/info-cyrus/
To Unsubscribe:
https://lists.andrew.cmu.edu/mailman/listinfo/info-cyrus

[Index of Archives]     [Cyrus SASL]     [Squirrel Mail]     [Asterisk PBX]     [Video For Linux]     [Photo]     [Yosemite News]     [gtk]     [KDE]     [Gimp on Windows]     [Steve's Art]

  Powered by Linux