[Date Prev][Date Next] [Chronological] [Thread] [Top]

RE: POODLE SSLv3 downgrade attack



Pardon my ignorance on the subject, but I need to understand this:

> You've probably all heard about this "new" attack several times by now. Just
> to confirm what's already been stated - this attack only affects HTTP browsers
> that deliberately break the TLS handshake protocol to allow using older SSL
> versions. It does not affect LDAP software at all.

Isn't this configurable?  With the following:

TLSCipherSuite          HIGH:MEDIUM:+TLSv1:+SSLv3:RSA

doesn't this allow SSLv3?   To secure against POODLE, don't we need to remove the SSLv3?

> Also, since version 2.4.14 (released February 2009), OpenLDAP has supported
> TLSProtocolMin slapd config and LDAP_TLS_PROTOCOL_MIN client config directives
> for selecting the minimum version of SSL/TLS to allow. As this feature has
> been available for over 5 years there is no reason for any OpenLDAP
> deployments to be using SSLv3 today.
>
> --
> -- Howard Chu
> CTO, Symas Corp. http://www.symas.com
> Director, Highland Sun http://highlandsun.com/hyc/
> Chief Architect, OpenLDAP http://www.openldap.org/project/
>