Displaying 20 results from an estimated 3000 matches similar to: "SSLv3 attack on pop3?"
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Thanks Kelvin
I'm a bit confised tho, is this patch already avaiable? if yes, what is the
parameter that disable ssl into the smb.conf? Maybe the guys from
Enterprise samba have already included the patch into their releases so
it's just a maatter of enabling the flag.
I'm using sernet-samba-4.2.2
Thanks!
2014 Nov 02
1
sslv3 alert handshake failure error
Hi All,
I am using "asterisk-11.12.0" version and I am trying to setup secure call
(TLS + SRTP) between two extensions and while making a call, I got
following error
*CLI> == Using SIP RTP CoS mark 5
-- Executing [6004 at from-office:1] Dial("SIP/6003-00000000",
"SIP/6004,20") in new stack
== Using SIP RTP CoS mark 5
-- Called SIP/6004
SSL certificate
2015 Jul 08
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Good Day All
Sorry if this is a repeated email, but I need some information about how to
disable SSL on a Samba4.2.2 AD domain controller as the nessus scanner is
reporting the POODLE vulnerability and we are not allowed to have any of
that in our environment.
the nessus scan reports poodle vulnerability on all these ports:
443, 636, 3269
I had a look at previous posts but couldn't find a
2008 Nov 13
5
Dovecot error with Symbian mail client
Greetings list,
I have recently acquired an Nokia E71 (which comes with Symbian 3rd
edition, feature pack 3 I believe). Accessing my emails has worked
before, but now, I cannot connect to the mail server any longer.
If I enable verbose_ssl, I get the following error in the log:
SSL_accept() failed: error:140943F2:SSL routines:SSL3_READ_BYTES:sslv3
alert unexpected message [141.84.69.67]
I
2015 Jul 09
0
Samba 4 - disabling SSLv3 to mitigate POODLE effects
No patch available now. Download the source code and modified the source
code yourself, and then compile it.
-----Original Message-----
From: samba-bounces at lists.samba.org [mailto:samba-bounces at lists.samba.org]
On Behalf Of Mario Pio Russo
Sent: Wednesday, July 08, 2015 10:01 PM
To: Kelvin Yip
Cc: samba at lists.samba.org; samba-bounces at lists.samba.org
Subject: Re: [Samba] Samba 4 -
2015 Jul 09
1
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Arg... that's a problem now..
we are not allowed to complie third party software in our dev enviroment,
we are only allowed to use packages (that's why we use sernet-samba, which
in fairness is great!).
any plan to release a proper patch?
___________________________________________________________________________________________
Mario Pio Russo, System Admin SWG IT Services Dublin,
2015 Jul 08
0
Samba 4 - disabling SSLv3 to mitigate POODLE effects
I have file a bug and modified the source code to make samba4 do not use
SSLV3, but I am not able to make a patch to this.
https://bugzilla.samba.org/show_bug.cgi?id=11076
-----Original Message-----
From: samba-bounces at lists.samba.org [mailto:samba-bounces at lists.samba.org]
On Behalf Of Mario Pio Russo
Sent: Wednesday, July 08, 2015 4:48 PM
To: samba at lists.samba.org
Subject: [Samba] Samba
2014 Oct 16
1
CESA-2014:1652 Important CentOS 6 openssl Security Update
CentOS Errata and Security Advisory 2014:1652
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
i386
-----------------------------
5898ac3179dfdd904c352badd79b6f5ec702315f4bc7b8989de8f114304fbd78 openssl-1.0.1e-30.el6_5.2.i686.rpm
dcc5d47340d69f53af592a92282df89ef3bd4705ce34f4a57a93d211e93cfd7d
2014 Oct 16
1
CESA-2014:1652 Important CentOS 6 openssl Security Update
CentOS Errata and Security Advisory 2014:1652
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
-----------------------------
i386
-----------------------------
5898ac3179dfdd904c352badd79b6f5ec702315f4bc7b8989de8f114304fbd78 openssl-1.0.1e-30.el6_5.2.i686.rpm
dcc5d47340d69f53af592a92282df89ef3bd4705ce34f4a57a93d211e93cfd7d
2014 Oct 19
3
Dovecote 1.2.17 poodle
Hi, how do I protect dovecot 1.2.17 against poodle?
Br
/Marc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://dovecot.org/pipermail/dovecot/attachments/20141019/b4152487/attachment-0001.sig>
2014 Nov 04
2
Samba 4 - disabling SSLv3 to mitigate POODLE effects
Hi all,
Am trying to find a way to disable SSLv3 protocol in smb.conf on Samba4.
I am using the following:
tls enabled = yes
tls keyfile = tls/myKey.pem
tls certfile = tls/myCert.pem
tls cafile =
With a self-signed cert.
But when I remote connect from another host using:
openssl s_client -showcerts -connect samba4-dc:636 -ssl3
I get a successful
2014 Oct 16
1
POODLE on CentOS
The following updates address POODLE on CentOS:
CentOS-5:
http://lists.centos.org/pipermail/centos-announce/2014-October/020696.html
CentOS-6.5:
http://lists.centos.org/pipermail/centos-announce/2014-October/020697.html
CentOS-7:
http://lists.centos.org/pipermail/centos-announce/2014-October/020695.html
Please note that the CentOS-6.5 updates are built from:
openssl-1.0.1e-30.el6_5.2.src.rpm
2015 Jul 09
4
Contributing to the CentOS wiki
Hello all,
I'd like to contribute to the CentOS wiki. Per these docs[0], I
should email this list with the following information.
Username: DanielFarrell
Contribution subject: Update CBS Koji Poodle patch docs
Contribution location: http://goo.gl/7Oe9QO (CBS HOWTO#Quickstart)
I'd like to make the docs related to patching Koji for the Poodle
exploit[1] generally more clear. For example,
2014 Oct 15
0
Koji/CBS infra and sslv3/Poodle important notification
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
As most of you already know, there is an important SSLv3 vulnerability
(CVE-2014-3566 - see https://access.redhat.com/articles/1232123) ,
known as Poodle.
While it's easy to disable SSLv3 in the allowed Protocols at the
server level (for example SSLProtocol All -SSLv2 -SSLv3 for apache),
some clients are still defaulting to SSLv3, and Koji
2015 Jan 09
2
dovecot on wheezy, best ssl configuration ?
On 1/9/2015 3:06 AM, Philipp Resch <philipp at devh.de> wrote:
> It seems as if claws mail is preferring SSLv3
And since dovecot is really not affected by the poodle vulnerability, if
you can't upgrade (I believe 2.2 is in the backports repo?), probably
easiest to just reenable SSLv3...
2014 Oct 17
1
POODLE and TLSv1
I read this on the RHN commentary respecting cve-2014-3566:
https://securityblog.redhat.com/2014/10/15/poodle-a-ssl3-vulnerability-cve-2014-3566/:
. . .
The first aspect of POODLE, the SSL 3.0 protocol vulnerability, has already
been fixed through iterative protocol improvements, leading to the current TLS
version, 1.2. It is simply not possible to address this in the context of the
SSL 3.0
2015 Feb 03
3
Another Fedora decision
On Mon, Feb 2, 2015 at 8:02 PM, Kahlil Hodgson
<kahlil.hodgson at dealmax.com.au> wrote:
> On 3 February 2015 at 13:34, PatrickD Garvey <patrickdgarveyt at gmail.com> wrote:
>> Now how about some specific sources you personally used to learn your
>> craft that we can use likewise?
>
> So many places it makes my brain hurt just thinking about it. Google
> and
2015 Mar 15
2
Dovecot 2.1.7 still accepting SSLv3 though disabled?
Hello,
I came across a strange problem with my Dovecot 2.1.7 installation
(updated Debian Wheezy) in regards to SSL/TLS connections.
My configuration is as follows:
$ dovecot -n | grep ssl
service imap-login {
ssl = yes
...
}
ssl_cert = <......
ssl_cipher_list =
2014 Oct 21
2
Testing "dark" SSL sites
So, with all the hubbub around POODLE and ssl, we're preparing a new load
balancer using HAProxy.
So we have a set of unit tests written using PHPUnit, having trouble
validating certificates. How do you test/validate an SSL cert for a prototype
"foo.com" server if it's not actually active at the IP address that matches
DNS for foo.com?
For non-ssl sites, I can specify the
2010 Feb 05
1
About graphics
Hi,
I'm building a graph (barplot) in which the X axis label
disappears.
I tried to use the option mgp of par() and I could not get
the desired result.
Note that want the axis labels horizontally.
caes = c(37,20,19,16,75,103)
names(caes) = c("Pinscher", "Pastor \n Alem?o", "Poodle",
"Rottweiller", "SRD", "Outros")
caess =