Hi,
Some time back, to fix POODLE, I tried to fix with cipher suite, but still
I can use the the protocol SSLv3.
The server responds with
openssl s_client -connect ip:port -ssl3

So The fix should come using SSL_CTX_set_options. I understand since you
are using the compiled binary, you may not be in a position to use this
API.
May be you can try with the latest version of openssl with the POODLE fix.

regards,
James

On Tue, Apr 7, 2015 at 8:14 AM, Viktor Dukhovni <[email protected]>
wrote:

> On Mon, Apr 06, 2015 at 05:11:22PM -0700, David Rueter wrote:
>
> > I would like to disable SSL3 (to prevent POODLE attacks), but I would
> like
> > to leave TLS1 enabled (particularly DES-CBC3-SHA, AES128-SHA and
> > AES256-SHA).
>
> You're confusing SSLv3 the protocol, with SSLv3 ciphersuites.  To disable
> the protocol set "SSL_OP_NO_SSLv3" via SSL_CTX_set_options().
>
> > Is there no way to disable SSL3 while leaving
> TLS_RSA_WITH_3DES_EDE_CBC_SHA
> > enabled?
>
> Yes, disable the protocol, not the ciphers.
>
> --
>         Viktor.
> _______________________________________________
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to