[TriLUG] TriLUG responds to POODLE

Scott Miller scottlinux at gmail.com
Thu Oct 16 10:45:46 EDT 2014


Thanks! Troy Hunt linked to my blog post as well and that is generating a
ton of traffic:

http://www.troyhunt.com/2014/10/everything-you-need-to-know-about.html



On Thu, Oct 16, 2014 at 10:14 AM, Hrivnak, Michael <mhrivnak at hrivnak.org>
wrote:

> We've disabled SSLv3 for apache on pilot in response to the POODLE
> vulnerability [0]. The impact is that when you visit https://trilug.org,
> your browser (or other client) can no longer connect with SSLv3. I don't
> expect this change to cause problems for anyone, but let us know if it
> does.
>
> If you'd like to do the same on your apache deployments, our own Scott
> Miller described how to do so in a blog post [1] over a year ago. Wise man!
>
> Michael
>
> [0]
>
> https://securityblog.redhat.com/2014/10/15/poodle-a-ssl3-vulnerability-cve-2014-3566/
> [1] https://scottlinux.com/2013/06/18/disable-sslv2-and-sslv3-in-apache/
> --
> This message was sent to: Scott Miller <scottlinux at gmail.com>
> To unsubscribe, send a blank message to trilug-leave at trilug.org from that
> address.
> TriLUG mailing list : http://www.trilug.org/mailman/listinfo/trilug
> Unsubscribe or edit options on the web  :
> http://www.trilug.org/mailman/options/trilug/scottlinux%40gmail.com
> Welcome to TriLUG: http://trilug.org/welcome
>


More information about the TriLUG mailing list