layout | title | categories | author |
---|---|---|---|
post |
How to fix SSLv3 POODLE vulnerability in Nginx and Apache on Ubuntu 14.04.1 |
Security |
krnflake |
The recently published Poodle attack by Google forces a relapse of an encrypted connection to the long outdated SSLv3 protocol. For reasons of compatibility, almost all browsers still support this outdated protocol. This old protocol isn't really needed anymore. Hence the best protection is: just to turn it off. The worst that can happen is, that older browsers can't establish an encrypted connections, but this does only come into existence in individual cases. This certainly applies to the Internet Explorer 6, which is only rarely used. And who still uses the monster from time immemorial, has to contend with a lot of other problems. Web servers should actually support at least TLS 1.0.
-
Find all virtualhost configuration files which use of the “ssl_protocols” directive:
$ grep -R "ssl_protocols" /etc/nginx/sites-*
-
Edit each file which we found in Step 1) that has the “ssl_protocols” directive:
$ sudo nano /etc/nginx/sites-available/default
-
Now find the following line:
ssl_protocols SSLv3 TLSv1 TLSv1.1 TLSv1.2;
-
And remove the option "SSLv3" so that the line will look like this:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
-
In order to make the change effective restart Nginx:
$ sudo service nginx reload
-
Edit Apache's SSL configuration:
$ sudo nano /etc/apache2/mods-enabled/ssl.conf
-
Find the following line:
SSLProtocol all -SSLv2
-
And add the option "-SSLv3" so that the line will look like this:
SSLProtocol all -SSLv2 -SSLv3
-
In order to make the change effective restart Apache:
$ sudo service apache2 restart