| -----BEGIN PGP SIGNED MESSAGE----- |
| Hash: SHA1 |
| |
| |
| Note on CVE-2014-3566 - SSL 3.0 support in Apache CXF, aka the "POODLE" attack: |
| |
| The SSL protocol 3.0 uses non-deterministic CBC padding, which makes it easier |
| for man-in-the-middle attackers to obtain clear text data via a padding-oracle |
| attack, aka the "POODLE" issue: https://access.redhat.com/articles/1232123 |
| |
| The problem with POODLE comes when the connection is downgraded to use SSL 3.0 |
| when higher level TLS comms fail. If an attacker in the middle of a connection |
| can cause this failure then they may be able to force the browser to do |
| exactly what it’s designed to do – fall back to SSL 3.0 and try again. |
| |
| Apache CXF disables support for SSLv3 by default for both clients, as well as |
| Jetty servers configured via CXF's HTTPJ namespace, from the 3.0.3 and 2.7.14 |
| releases. To support SSLv3 it is necessary to specify "SSLv3" for the |
| "secureSocketProtocol" attribute, see the tls configuration link below. |
| |
| References: |
| |
| http://cxf.apache.org/security-advisories.html |
| https://issues.apache.org/jira/browse/CXF-6086 |
| http://cxf.apache.org/docs/tls-configuration.html |
| |
| -----BEGIN PGP SIGNATURE----- |
| Version: GnuPG v1 |
| |
| iQEcBAEBAgAGBQJUkELkAAoJEGe/gLEK1TmDeCcH/RxLLkEr+oEcgWrYa4rKrMPq |
| Sw+62Hzpswi5zYHIH5p2pKuMN9WhvxqsBZKT6SoSHfJ28yvcbiBG78o49O/nLois |
| spUFTMSZAkdHAvg6G0gr5ODXCOxZyCQS9Tjf7cWfkne9sepIveP3RdHs75V+0C9u |
| bxMzkEYRc58ZUD6xDzoGsLhnm0jiIfkCg7sjKH/3j6eG3LV7Blj578GZZmAkRK4E |
| rNxGDX9X7LksdDXi4wB0RW5n3GKRj5WSf7rWgxJQOJ0Zde3WdNALyPxLW9+MN5NK |
| ZuXZ6SvJKKB33/cbyTBlti4PaFpG9D0T6KRvNwsqP42e9MPk/6V+ywR3aa4PU94= |
| =XS57 |
| -----END PGP SIGNATURE----- |