SlideShare une entreprise Scribd logo
1  sur  8
SSLv3 Poodle Vulnerability
FAQ
By Lalit Kale
Page 2 of 8
Table of Contents
What is SSLv3 vulnerability “Poodle”?..................................................................................................3
Way of exploiting the vulnerability: .....................................................................................................3
How do I detect Poodle attacks on your network?................................................................................3
Which are the applications that may be affected by this vulnerability?..................................................3
Is there any programming/development change needed? ....................................................................3
How to secure impacted web Servers?.................................................................................................4
APACHE..........................................................................................................................................4
IIS..................................................................................................................................................4
NGINX............................................................................................................................................6
How to test the vulnerability is fixed or not?........................................................................................6
Can we do something to make aware of clients about their browser’s vulnerability?..............................6
AfterFix,will there be impactonweb-applicationUsers?Whichare the impactedweb-application
Users?................................................................................................................................................8
Page 3 of 8
What is SSLv3 vulnerability “Poodle”?
POODLE stands for the 'Padding Oracle on Downgraded Legacy Encryption' attack. It is a new
vulnerability in SSLv3 protocol. This is old protocol which is around sunset and not many
systems are using this protocol. POODLE is a protocol-level vulnerability that can't be easily
fixed. As the POODLE vulnerability is actually in the protocol itself, this isn't something that can
be patched out like ‘ShellShock’ and ‘HeartBleed’ vulnerabilities found in OPENSSL protocol in
past.
Way of exploiting the vulnerability:
When attacker tries to access the site supporting SSLv3 using a client (browser) to use SSLv3. By
simulating a failure during the negotiation process, an attacker can force a browser and a server
to renegotiate using an older protocol, right back down to SSLv3. While renegotiation, attacker
can execute any arbitrary command on the target system.
Detailed explanation is available at https://www.openssl.org/~bodo/ssl-poodle.pdf
How do I detect Poodle attacks on your network?
We don’t have any proven way to detect poodle attacks on your network, since the most
probable attack setup involves the attacker luring the victim on their network.
Although, on the server side; we can keep watching for an inordinate amount of requests that
fail on a decryption error. Not all server software will log events for such cases, but this should
be within the possibilities of any decent IDS system.
Which are the applications that may be affected by this vulnerability?
Applications which are using openSSL protocol. In layman’s term, those are generally using
https protocol are exposed for this vulnerability.
Is there any programming/development change needed?
This is protocol level vulnerability hence no programming/development changes are needed.
However, to ensure all applications are working correctly, we need to smoke test impacted
applications.
Page 4 of 8
How to secure impacted web Servers?
We must disable SSL 3 on your servers. For this, follow below recommendations as per web
server.
APACHE
To disable SSLv3 on your Apache server you can configure it using the following.
SSLProtocol All -SSLv2 -SSLv3
This will give you support for TLSv1.0, TLSv1.1 and TLSv1.2, but explicitly removes support for
SSLv2 and SSLv3. Check the config and then restart Apache.
apachectl configtest
sudo service apache2 restart
IIS
Microsoft has released a patch for this fix. Please apply the fix given at
https://support.microsoft.com/kb/187498/en-us
OR
If you want to apply the fix manually, you can follow the following steps.
This one requires some registry tweaks and a server reboot but still isn't all that bad. Microsoft
have a support article with the required information, but all you need to do is modify/create a
registry DWORD value.
HKey_Local_MachineSystemCurrentControlSetControlSecurityProviders
SCHANNELProtocols
Inside protocols you will most likely have an SSL 2.0 key already, so create SSL 3.0 alongside it if
needed. Under that create a Server key and inside there a DWORD value called Enabled with
value 0. Once that's done reboot the server for the changes to take effect.
Before Fix:
Page 5 of 8
After Fix:
Page 6 of 8
NGINX
Disabling SSLv3 support on NginX is also really easy.
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
Similar to the Apache config above, you will get TLSv1.0+ support and no SSL. You can check the
config and restart.
sudo nginx -t
sudo service nginx restart
How to test the vulnerability is fixed or not?
You can verify all web servers using
https://www.ssllabs.com/ssltest/index.html
Please make sure that, you check “Do not show the results on the boards” checkbox.
Can we do something to make aware of clients about their browser’s
vulnerability?
Yes, we can. We can either of the ways can ask users to check at
https://www.ssllabs.com/ssltest/viewMyClient.html
We can convey these through a notice email/popup alert or any other way as suggested by
business. In addition to above, we can always ask to user to use latest browsers.
It is also possible to protect application users from POODLE by asking them to disable SSLv3
support in their browsers. This means that even if the server does offer SSLv3 support, user
browser will never use it, even during a protocol downgrade attack.
Page 7 of 8
FIREFOX
Firefox users can install following add-on to protect themselves.
https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control/
CHROME
Chrome users don't have an option in the GUI to disable SSLv3 as Google removed it due to
confusion over whether SSLv3 or TLSv1 was better with one having a higher numeric value.
Instead you can add the command line flag --ssl-version-min=tls1 to enforce the use of TLS and
prevent any connection using the SSL protocol. In Windows, right click on your Chrome
shortcut, hit Properties and add the command line flag as seen in the image below.
If you use Google Chrome on Mac, Linux, Chrome OS or Android, you can follow these
instructions here.
INTERNET EXPLORER
Fixing up Internet Explorer is also pretty easy. Go to Settings, Internet Options and click on the
advanced tab. Scroll down until you see the Use SSL 3.0 checkbox and uncheck it.
Page 8 of 8
After Fix, will there be impact on web-application Users? Which are the
impacted web-application Users?
After disabling SSLv3 support from Web Servers, systems using IE6 and Windows XP
installations without SP3, will no longer be able to communicate with website.

Contenu connexe

Plus de Lalit Kale

Application Security Tools
Application Security ToolsApplication Security Tools
Application Security ToolsLalit Kale
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And AnalysisLalit Kale
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The HorizonLalit Kale
 
Coding guidelines
Coding guidelinesCoding guidelines
Coding guidelinesLalit Kale
 
Code review guidelines
Code review guidelinesCode review guidelines
Code review guidelinesLalit Kale
 
State management
State managementState management
State managementLalit Kale
 
Implementing application security using the .net framework
Implementing application security using the .net frameworkImplementing application security using the .net framework
Implementing application security using the .net frameworkLalit Kale
 
Data normailazation
Data normailazationData normailazation
Data normailazationLalit Kale
 
Versioning guidelines for product
Versioning guidelines for productVersioning guidelines for product
Versioning guidelines for productLalit Kale
 
Bowling Game Kata by Robert C. Martin
Bowling Game Kata by Robert C. MartinBowling Game Kata by Robert C. Martin
Bowling Game Kata by Robert C. MartinLalit Kale
 
Domain Driven Design
Domain Driven DesignDomain Driven Design
Domain Driven DesignLalit Kale
 
Web 2.0 concept
Web 2.0 conceptWeb 2.0 concept
Web 2.0 conceptLalit Kale
 
Jump Start To Ooad And Design Patterns
Jump Start To Ooad And Design PatternsJump Start To Ooad And Design Patterns
Jump Start To Ooad And Design PatternsLalit Kale
 
How To Create Strategic Marketing Plan
How To Create Strategic Marketing PlanHow To Create Strategic Marketing Plan
How To Create Strategic Marketing PlanLalit Kale
 
Model Driven Architectures
Model Driven ArchitecturesModel Driven Architectures
Model Driven ArchitecturesLalit Kale
 

Plus de Lalit Kale (16)

Application Security Tools
Application Security ToolsApplication Security Tools
Application Security Tools
 
Threat Modeling And Analysis
Threat Modeling And AnalysisThreat Modeling And Analysis
Threat Modeling And Analysis
 
Application Security-Understanding The Horizon
Application Security-Understanding The HorizonApplication Security-Understanding The Horizon
Application Security-Understanding The Horizon
 
Coding guidelines
Coding guidelinesCoding guidelines
Coding guidelines
 
Code review guidelines
Code review guidelinesCode review guidelines
Code review guidelines
 
State management
State managementState management
State management
 
Implementing application security using the .net framework
Implementing application security using the .net frameworkImplementing application security using the .net framework
Implementing application security using the .net framework
 
Data normailazation
Data normailazationData normailazation
Data normailazation
 
Opps
OppsOpps
Opps
 
Versioning guidelines for product
Versioning guidelines for productVersioning guidelines for product
Versioning guidelines for product
 
Bowling Game Kata by Robert C. Martin
Bowling Game Kata by Robert C. MartinBowling Game Kata by Robert C. Martin
Bowling Game Kata by Robert C. Martin
 
Domain Driven Design
Domain Driven DesignDomain Driven Design
Domain Driven Design
 
Web 2.0 concept
Web 2.0 conceptWeb 2.0 concept
Web 2.0 concept
 
Jump Start To Ooad And Design Patterns
Jump Start To Ooad And Design PatternsJump Start To Ooad And Design Patterns
Jump Start To Ooad And Design Patterns
 
How To Create Strategic Marketing Plan
How To Create Strategic Marketing PlanHow To Create Strategic Marketing Plan
How To Create Strategic Marketing Plan
 
Model Driven Architectures
Model Driven ArchitecturesModel Driven Architectures
Model Driven Architectures
 

Dernier

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Dernier (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

SSL v3 Poodle Vulnarability FAQ

  • 2. Page 2 of 8 Table of Contents What is SSLv3 vulnerability “Poodle”?..................................................................................................3 Way of exploiting the vulnerability: .....................................................................................................3 How do I detect Poodle attacks on your network?................................................................................3 Which are the applications that may be affected by this vulnerability?..................................................3 Is there any programming/development change needed? ....................................................................3 How to secure impacted web Servers?.................................................................................................4 APACHE..........................................................................................................................................4 IIS..................................................................................................................................................4 NGINX............................................................................................................................................6 How to test the vulnerability is fixed or not?........................................................................................6 Can we do something to make aware of clients about their browser’s vulnerability?..............................6 AfterFix,will there be impactonweb-applicationUsers?Whichare the impactedweb-application Users?................................................................................................................................................8
  • 3. Page 3 of 8 What is SSLv3 vulnerability “Poodle”? POODLE stands for the 'Padding Oracle on Downgraded Legacy Encryption' attack. It is a new vulnerability in SSLv3 protocol. This is old protocol which is around sunset and not many systems are using this protocol. POODLE is a protocol-level vulnerability that can't be easily fixed. As the POODLE vulnerability is actually in the protocol itself, this isn't something that can be patched out like ‘ShellShock’ and ‘HeartBleed’ vulnerabilities found in OPENSSL protocol in past. Way of exploiting the vulnerability: When attacker tries to access the site supporting SSLv3 using a client (browser) to use SSLv3. By simulating a failure during the negotiation process, an attacker can force a browser and a server to renegotiate using an older protocol, right back down to SSLv3. While renegotiation, attacker can execute any arbitrary command on the target system. Detailed explanation is available at https://www.openssl.org/~bodo/ssl-poodle.pdf How do I detect Poodle attacks on your network? We don’t have any proven way to detect poodle attacks on your network, since the most probable attack setup involves the attacker luring the victim on their network. Although, on the server side; we can keep watching for an inordinate amount of requests that fail on a decryption error. Not all server software will log events for such cases, but this should be within the possibilities of any decent IDS system. Which are the applications that may be affected by this vulnerability? Applications which are using openSSL protocol. In layman’s term, those are generally using https protocol are exposed for this vulnerability. Is there any programming/development change needed? This is protocol level vulnerability hence no programming/development changes are needed. However, to ensure all applications are working correctly, we need to smoke test impacted applications.
  • 4. Page 4 of 8 How to secure impacted web Servers? We must disable SSL 3 on your servers. For this, follow below recommendations as per web server. APACHE To disable SSLv3 on your Apache server you can configure it using the following. SSLProtocol All -SSLv2 -SSLv3 This will give you support for TLSv1.0, TLSv1.1 and TLSv1.2, but explicitly removes support for SSLv2 and SSLv3. Check the config and then restart Apache. apachectl configtest sudo service apache2 restart IIS Microsoft has released a patch for this fix. Please apply the fix given at https://support.microsoft.com/kb/187498/en-us OR If you want to apply the fix manually, you can follow the following steps. This one requires some registry tweaks and a server reboot but still isn't all that bad. Microsoft have a support article with the required information, but all you need to do is modify/create a registry DWORD value. HKey_Local_MachineSystemCurrentControlSetControlSecurityProviders SCHANNELProtocols Inside protocols you will most likely have an SSL 2.0 key already, so create SSL 3.0 alongside it if needed. Under that create a Server key and inside there a DWORD value called Enabled with value 0. Once that's done reboot the server for the changes to take effect. Before Fix:
  • 5. Page 5 of 8 After Fix:
  • 6. Page 6 of 8 NGINX Disabling SSLv3 support on NginX is also really easy. ssl_protocols TLSv1 TLSv1.1 TLSv1.2; Similar to the Apache config above, you will get TLSv1.0+ support and no SSL. You can check the config and restart. sudo nginx -t sudo service nginx restart How to test the vulnerability is fixed or not? You can verify all web servers using https://www.ssllabs.com/ssltest/index.html Please make sure that, you check “Do not show the results on the boards” checkbox. Can we do something to make aware of clients about their browser’s vulnerability? Yes, we can. We can either of the ways can ask users to check at https://www.ssllabs.com/ssltest/viewMyClient.html We can convey these through a notice email/popup alert or any other way as suggested by business. In addition to above, we can always ask to user to use latest browsers. It is also possible to protect application users from POODLE by asking them to disable SSLv3 support in their browsers. This means that even if the server does offer SSLv3 support, user browser will never use it, even during a protocol downgrade attack.
  • 7. Page 7 of 8 FIREFOX Firefox users can install following add-on to protect themselves. https://addons.mozilla.org/en-US/firefox/addon/ssl-version-control/ CHROME Chrome users don't have an option in the GUI to disable SSLv3 as Google removed it due to confusion over whether SSLv3 or TLSv1 was better with one having a higher numeric value. Instead you can add the command line flag --ssl-version-min=tls1 to enforce the use of TLS and prevent any connection using the SSL protocol. In Windows, right click on your Chrome shortcut, hit Properties and add the command line flag as seen in the image below. If you use Google Chrome on Mac, Linux, Chrome OS or Android, you can follow these instructions here. INTERNET EXPLORER Fixing up Internet Explorer is also pretty easy. Go to Settings, Internet Options and click on the advanced tab. Scroll down until you see the Use SSL 3.0 checkbox and uncheck it.
  • 8. Page 8 of 8 After Fix, will there be impact on web-application Users? Which are the impacted web-application Users? After disabling SSLv3 support from Web Servers, systems using IE6 and Windows XP installations without SP3, will no longer be able to communicate with website.