Gene Heskett wrote:
> Call me confused.  And I do run my own web page from this machine.  URL 
> in sig.
> Genes Web page <http://geneslinuxbox.net:6309/gene>

That is a non-https page.  Do you operate any https pages requiring
security?  I didn't find any.  If you aren't using https then the
discussion here about the POODLE attach against https isn't relevant.

> First, there is no ~./etc/apache2/mods-available/ssl.conf, but there is a
> /etc/apache2/mods-available/ssl.conf

Right.

> With relatively sparse bits of uncommenting that would appear to be 
> related here:
> 
> SSLCipherSuite AES128+EECDH:AES128+EDH
> SSLHonorCipherOrder on
> SSLProtocol all -SSLv2 -SSLv3
> Header always set Strict-Transport-Security "max-age=63072000; include 
> SubDomains"
> Header alway set X-Frame-Options DENY

If you were operating an ssl site then the above would match the
current recommendations from:

  https://cipherli.st/

But as far as I can see you are not running https.  Therefore
modifying those files is simply creating more work for yourself. :-(

I will note that it is a fast changing environment.  I hate to quote
static lists like that since tomorrow they may be different.  Instead
I like to point to centralized information resources like the
ssllabs.com and cipherli.st sites to coordinate the current wisdom.

> Documentation on this stuff and its interactions is sparse at best 
> despite the fact that I have installed what s/b the correct man pages.

For web servers most of the documentation is on the web.  It is just
the nature of things.

> Some of the above has been edited persuant to anti POODLE instructions 
> found by google.
> 
> So, am I safe, or low hanging fruit with those settings?

As far as I can see you are safe since you are not operating a web
site that uses encryption to secure any pages.  Therefore none of this
discussion applies to you as a web admin.

The question here is whether a POODLE attack can allow a man in the
middle attacker to see the plaintext of an SSL connection.  To
consider the danger lets say a web site requires a login, uses cookies
to maintain a session, and https to keep others from sniffing your
login credentials.  A successful attack could give someone else your
cookie data which they could use to log into that site as you.

But you are talking about your own site that you are maintaining.  If
you are not using SSL then this simply does not apply to you.  If you
are using SSL then it depends upon what, where, why, and so forth.
Someone using it just to add noise to the encrypted data traffic would
always be safe too since it wouldn't be worse than not encrypting it.

The POODLE attack doesn't allow someone to directly break into your
web server.  The attack is about listening to encrypted traffic.
Information gained by sniffing may allow further attacks however.

If someone were using something like SquirrelMail or Roundcube or
Mailpile for a webmail interface for example then they should be
directly concerned over this type of attack.  Someone targeting them
might be able to log into the web as them and send email as them.  And
the same for most other web login interfaces.  (Many people are in
terror over the idea of someone logging into Facebook as them.
Research Firesheep.)

Bob

Attachment: signature.asc
Description: Digital signature

Reply via email to