blob: e3744b901b9501c3cb59638478ac08310e3a64bb [file] [log] [blame]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Note on CVE-2014-3566 - SSL 3.0 support in Apache CXF, aka the "POODLE" attack:
The SSL protocol 3.0 uses non-deterministic CBC padding, which makes it easier
for man-in-the-middle attackers to obtain clear text data via a padding-oracle
attack, aka the "POODLE" issue: https://access.redhat.com/articles/1232123
The problem with POODLE comes when the connection is downgraded to use SSL 3.0
when higher level TLS comms fail. If an attacker in the middle of a connection
can cause this failure then they may be able to force the browser to do
exactly what its designed to do fall back to SSL 3.0 and try again.
Apache CXF disables support for SSLv3 by default for both clients, as well as
Jetty servers configured via CXF's HTTPJ namespace, from the 3.0.3 and 2.7.14
releases. To support SSLv3 it is necessary to specify "SSLv3" for the
"secureSocketProtocol" attribute, see the tls configuration link below.
References:
http://cxf.apache.org/security-advisories.html
https://issues.apache.org/jira/browse/CXF-6086
http://cxf.apache.org/docs/tls-configuration.html
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJUkELkAAoJEGe/gLEK1TmDeCcH/RxLLkEr+oEcgWrYa4rKrMPq
Sw+62Hzpswi5zYHIH5p2pKuMN9WhvxqsBZKT6SoSHfJ28yvcbiBG78o49O/nLois
spUFTMSZAkdHAvg6G0gr5ODXCOxZyCQS9Tjf7cWfkne9sepIveP3RdHs75V+0C9u
bxMzkEYRc58ZUD6xDzoGsLhnm0jiIfkCg7sjKH/3j6eG3LV7Blj578GZZmAkRK4E
rNxGDX9X7LksdDXi4wB0RW5n3GKRj5WSf7rWgxJQOJ0Zde3WdNALyPxLW9+MN5NK
ZuXZ6SvJKKB33/cbyTBlti4PaFpG9D0T6KRvNwsqP42e9MPk/6V+ywR3aa4PU94=
=XS57
-----END PGP SIGNATURE-----