Dear Wiki user,

You have subscribed to a wiki page or wiki category on "Tomcat Wiki" for change 
notification.

The "Security/POODLE" page has been changed by OgnjenBlagojevic:
https://wiki.apache.org/tomcat/Security/POODLE

Comment:
Added POODLE vulnerability info

New page:
This Wiki entry serves as a place for all relevant information regarding 
[[http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566|CVE-2014-3566]]
 (aka the POODLE SSL v3 vlunerability). Rather than regurgitating this 
information repeatedly on mailing lists, etc., please make references to this 
page and refer people to it.

== What is POODLE vulnerability? ==

POODLE is a SSL v3 protocol vulnerability. It allows attacker to downgrade 
SSL/TLS protocol to version SSL v3, and then break the cryptographic security 
(e.g. decrypt the trafic, hijack sessions, etc.)


== Prerequisites ==

In order for attack to be successful both client and server must support SSL 
v3, and attacker must be a man-in-the-middle, and must inject malicious 
JavaScript into the client browser.


== Mitigation ==

Disabling SSL v3 on either client side or server side will mitigate this 
vulnerability.

To disable SSL v3, and enable all TLS protocols plus SSLv2Hello pseudo-protocol 
on JSSE connectors add the following attributes to your connector configuration 
in server.xml:

  sslProtocol="TLS" sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1,SSLv2Hello"
  
The same thing could be done on APR connector using following attributes:

  TODO


== On-line testing tools ==

Test your browser here:

  https://www.poodletest.com/

Test your server here:

  https://www.ssllabs.com/ssltest/

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to