On Mon, Apr 30, 2012 at 12:45 PM, Dr. Stephen Henson <st...@openssl.org> wrote:
> On Sun, Apr 29, 2012, Mike Hoy wrote:
>
>> We use McAfee to scan our website for vulnerabilities. They claim the
>> following:
>>
>> > Configure SSL/TLS servers to only use TLS 1.1 or TLS 1.2 if supported.
>> > Configure SSL/TLS servers to only support cipher suites that do not use
>> > block ciphers. Apply patches if available.
>>
>> I ran #openssl version and it says we are using OpenSSL 0.9.8e-fips-rhel5
>> 01 Jul 2008.
>>
>> Do we need to upgrade our OpenSSL to upgrade our TLS/SSL server? Sorry if
>> the question is way off-base but I am not a system administrator normally.
>> This is new to me. We use CentOS and #yum install openssl claims it is
>> already at the higest version. Any suggestions appreciated.
>>
>
> FYI: this is most likely the BEAST attack it is referring to.

BEAST only applies to CBC...

>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to