rcampbel3 wrote: 
> The  response to POODLE vuln is generally dropping support for SSLv3 on
> servers and clients. It's 15 years old and has been recommended to be
> deprecated for a while now. So, anywhere in the squeezebox / LMS /
> Plugin code that uses SSL... it needs to be configured or set to be able
> to support TLS 1.0, 1.1, or 1.2, and any use of SSLv2 or SSLv3 should be
> removed. My guess is that there is a config option that needs to be
> changed in something like:
> IO::Socket::SSL
> http://search.cpan.org/~sullr/IO-Socket-SSL-2.000/lib/IO/Socket/SSL.pod#Common_Problems_with_SSL
> 
-*SSL_version*
> Sets the version of the SSL protocol used to transmit data. 'SSLv23'
> uses a handshake compatible with SSL2.0, SSL3.0 and TLS1.x, while
> 'SSLv2', 'SSLv3', 'TLSv1', 'TLSv1_1' or 'TLSv1_2' restrict handshake and
> protocol to the specified version. All values are case-insensitive.
> Instead of 'TLSv1_1' and 'TLSv1_2' one can also use 'TLSv11' and
> 'TLSv12'. Support for 'TLSv1_1' and 'TLSv1_2' requires recent versions
> of Net::SSLeay and openssl.
> 
> Independent from the handshake format you can limit to set of accepted
> SSL versions by adding !version separated by ':'.
> 
> The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
> handshake format is compatible to SSL2.0 and higher, but that the
> successful handshake is limited to TLS1.0 and higher, that is no SSL2.0
> or SSL3.0 because both of these versions have serious security issues
> and should not be used anymore. You can also use !TLSv1_1 and !TLSv1_2
> to disable TLS versions 1.1 and 1.2 while still allowing TLS version
> 1.0.
> 
> Setting the version instead to 'TLSv1' might break interaction with
> older clients, which need and SSL2.0 compatible handshake. On the other
> side some clients just close the connection when they receive a TLS
> version 1.1 request. In this case setting the version to
> 'SSLv23:!SSLv2:!SSLv3:!TLSv1_1:!TLSv1_2' might help.
> -
> 
> or Net::SSLeay
> http://search.cpan.org/~mikem/Net-SSLeay-1.66/lib/Net/SSLeay.pod
> Replace any SSLv2 or SSLv3 functions with TLSv1 equivalents.
> Take note of security recommendations here:
> http://search.cpan.org/~mikem/Net-SSLeay-1.66/lib/Net/SSLeay.pod#SECURITY
> 
> -Ross

A wild guess is that the snag will be in the players themself like 3
years ago .
Some services demands that the security is taking place inside the
player .
https://github.com/Logitech/slimserver/tree/public/7.9/Firmware



--------------------------------------------------------------------
Main hifi: Touch + CIA PS +MeridianG68J MeridianHD621 MeridianG98DH 2 x
MeridianDSP5200 MeridianDSP5200HC 2 xMeridianDSP3100 +Rel Stadium 3
sub.
Bedroom/Office: Boom
Kitchen: Touch + powered Fostex PM0.4
Misc use: Radio (with battery)
iPad1 with iPengHD & SqueezePad
(in storage SB3, reciever ,controller )
server HP proliant micro server N36L with ClearOS Linux

http://people.xiph.org/~xiphmont/demo/neil-young.html
------------------------------------------------------------------------
Mnyb's Profile: http://forums.slimdevices.com/member.php?userid=4143
View this thread: http://forums.slimdevices.com/showthread.php?t=102304

_______________________________________________
discuss mailing list
discuss@lists.slimdevices.com
http://lists.slimdevices.com/mailman/listinfo/discuss

Reply via email to