On Sat, Jul 04, 2015 at 07:02:50PM +, Kannan Narayanasamy -X (kannanar -
HCL TECHNOLOGIES LIMITED at Cisco) wrote:
> Hi Joy,
>
> Thanks for the steps. I have tried with exclusion option(Command used:
> ./config no-idea no-ssl3 shared --prefix=/Openssl-1/) and getting the below
> error whil
On Behalf Of Joey
Yandle
Sent: Thursday, June 25, 2015 2:52 AM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Openssl Poodle Vulnerability Clarification
The config script takes no-ssl2 and no-ssl3 args:
./config no-ssl2 no-ssl3 ...
On 06/24/2015 11:57 AM, Kannan Narayanasamy -X (ka
Sent: Friday, June 12, 2015 3:37 AM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Openssl Poodle Vulnerability Clarification
On Thu, Jun 11, 2015 at 09:43:24PM +, Kannan Narayanasamy -X (kannanar -
HCL TECHNOLOGIES LIMITED at Cisco) wrote:
Hi All,
To resolve openSSL POODLE vulnerabili
asamy.
-Original Message-
From: openssl-dev [mailto:openssl-dev-boun...@openssl.org] On Behalf Of Kurt
Roeckx
Sent: Friday, June 12, 2015 3:37 AM
To: openssl-dev@openssl.org
Subject: Re: [openssl-dev] Openssl Poodle Vulnerability Clarification
On Thu, Jun 11, 2015 at 09:43:24PM +, K
On Thu, Jun 11, 2015 at 09:43:24PM +, Kannan Narayanasamy -X (kannanar -
HCL TECHNOLOGIES LIMITED at Cisco) wrote:
> Hi All,
>
> To resolve openSSL POODLE vulnerability we need to disable the SSLv3. In our
> application we have using openSSL through Apache. We have disabled using the
> belo
Hi All,
To resolve openSSL POODLE vulnerability we need to disable the SSLv3. In our
application we have using openSSL through Apache. We have disabled using the
below lines.
SSLProtocol all -SSLv2 -SSLv3
We are using 443 as SSL port. The command openssl s_client -connect
:443 -ssl3 shows the