The POODLE vulnerability does not affect your SSL Certificates and you do NOT need to reissue/reinstall your SSL Certificates.
DigiCert and other security experts recommend disabling SSL 3.0 or CBC-mode ciphers with SSL 3.0 to protect against this vulnerability.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773393#p27773393:1z9s0dbo said:MyPasswordIs12345678[/url]":1z9s0dbo]It's always nice to read that the one secure thing I've always trusted for online purchases is breachable. Hackers are always hacking and getting access to everyone's credit card numbers but they don't ever seem to use this information on a wide scale. I've actually grown apathetic to these reports because, while unnerving to contemplate, nothing big ever happens. I think the odds of my card getting used for identity fraud is very very low, like .001% chance. I think this holds true for everyone too. It happens, but if it happens to you, you have very bad luck.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773393#p27773393:3v755jd1 said:MyPasswordIs12345678[/url]":3v755jd1]It's always nice to read that the one secure thing I've always trusted for online purchases is breachable. Hackers are always hacking and getting access to everyone's credit card numbers but they don't ever seem to use this information on a wide scale. I've actually grown apathetic to these reports because, while unnerving to contemplate, nothing big ever happens. I think the odds of my card getting used for identity fraud is very very low, like .001% chance. I think this holds true for everyone too. It happens, but if it happens to you, you have very bad luck.
They might well be under normal circumstances, but are you vulnerable to downgrade attacks? What's to stop someone who can MITM you from offering only SSLv3 if both ends will accept that?[url=http://meincmagazine.com/civis/viewtopic.php?p=27773433#p27773433:h34282se said:anonArs[/url]":h34282se][url=http://meincmagazine.com/civis/viewtopic.php?p=27773393#p27773393:h34282se said:MyPasswordIs12345678[/url]":h34282se]It's always nice to read that the one secure thing I've always trusted for online purchases is breachable. Hackers are always hacking and getting access to everyone's credit card numbers but they don't ever seem to use this information on a wide scale. I've actually grown apathetic to these reports because, while unnerving to contemplate, nothing big ever happens. I think the odds of my card getting used for identity fraud is very very low, like .001% chance. I think this holds true for everyone too. It happens, but if it happens to you, you have very bad luck.
Are you sure you are even using SSLv3?
Every https site I've checked so far is using TLS
Unless it's forcibly disabled at at least one end, downgrade attacks are possible.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773433#p27773433:2ihj8qt2 said:anonArs[/url]":2ihj8qt2][url=http://meincmagazine.com/civis/viewtopic.php?p=27773393#p27773393:2ihj8qt2 said:MyPasswordIs12345678[/url]":2ihj8qt2]It's always nice to read that the one secure thing I've always trusted for online purchases is breachable. Hackers are always hacking and getting access to everyone's credit card numbers but they don't ever seem to use this information on a wide scale. I've actually grown apathetic to these reports because, while unnerving to contemplate, nothing big ever happens. I think the odds of my card getting used for identity fraud is very very low, like .001% chance. I think this holds true for everyone too. It happens, but if it happens to you, you have very bad luck.
Are you sure you are even using SSLv3?
Every https site I've checked so far is using TLS
No need for an addon. You can also go to about:config and edit the key security.tls.version.min. The description of what value to put in can be found at http://kb.mozillazine.org/Security.tls. ... ir_effects[url=http://meincmagazine.com/civis/viewtopic.php?p=27773477#p27773477:okvpbhjf said:ChrisSD[/url]"kvpbhjf]I'm glad it's a simple fix for users of modern web browsers. For Firefox you just install the addon, nothing simpler. Unfortunately most users won't know to do this (presumably) and so will be vulnerable until November, assuming they do upgrade then.
Thanks for posting this. What would a failure look like?[url=http://meincmagazine.com/civis/viewtopic.php?p=27773561#p27773561:1nir7wxt said:cozminsky[/url]":1nir7wxt]No need for an addon. You can also go to about:config and edit the key security.tls.version.min. The description of what value to put in can be found at http://kb.mozillazine.org/Security.tls. ... ir_effects[url=http://meincmagazine.com/civis/viewtopic.php?p=27773477#p27773477:1nir7wxt said:ChrisSD[/url]":1nir7wxt]I'm glad it's a simple fix for users of modern web browsers. For Firefox you just install the addon, nothing simpler. Unfortunately most users won't know to do this (presumably) and so will be vulnerable until November, assuming they do upgrade then.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773535#p27773535:2r0ovidb said:slowbuffer[/url]":2r0ovidb]Why not just ban Mallory from the internet?
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773609#p27773609:1169rxbc said:gpriatko[/url]":1169rxbc]> Every https site I've checked so far is using TLS
Which TLS?
SSLv3 and TLS1.0 are equally at risk.
TLS1.1 isn't a pretty sight.
TLS1.2 is where we need to be.
Major sites have already converted in the last few hours.
Akamai was going to block SSLv3, TLS1.0, and TLS1.1 next week. They've moved that up to 'right now'. Going to be some long bridge calls tonight ;-)
Thanks. Unlike the add-on, that setting works on android too. There does not appear to be a way to secure Chrome on Android, so I'll guess I'll stick with Firefox there to.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773561#p27773561:2v8y9w1f said:cozminsky[/url]":2v8y9w1f]No need for an addon. You can also go to about:config and edit the key security.tls.version.min. The description of what value to put in can be found at http://kb.mozillazine.org/Security.tls. ... ir_effects[url=http://meincmagazine.com/civis/viewtopic.php?p=27773477#p27773477:2v8y9w1f said:ChrisSD[/url]":2v8y9w1f]I'm glad it's a simple fix for users of modern web browsers. For Firefox you just install the addon, nothing simpler. Unfortunately most users won't know to do this (presumably) and so will be vulnerable until November, assuming they do upgrade then.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773613#p27773613:pgisgh55 said:Rosyna[/url]"gisgh55]
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773535#p27773535:pgisgh55 said:slowbuffer[/url]"gisgh55]Why not just ban Mallory from the internet?
according to the UN, internet access is a fundamental human right.
No matter what Mallory does to Bob or Alice.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773639#p27773639:2bpdvm1i said:ChrisSD[/url]":2bpdvm1i]Thanks. Unlike the add-on, that setting works on android too. There does not appear to be a way to secure Chrome on Android, so I'll guess I'll stick with Firefox there to.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773561#p27773561:2bpdvm1i said:cozminsky[/url]":2bpdvm1i]No need for an addon. You can also go to about:config and edit the key security.tls.version.min. The description of what value to put in can be found at http://kb.mozillazine.org/Security.tls. ... ir_effects[url=http://meincmagazine.com/civis/viewtopic.php?p=27773477#p27773477:2bpdvm1i said:ChrisSD[/url]":2bpdvm1i]I'm glad it's a simple fix for users of modern web browsers. For Firefox you just install the addon, nothing simpler. Unfortunately most users won't know to do this (presumably) and so will be vulnerable until November, assuming they do upgrade then.
Hopefully websites will quickly make this a non issue by disabling SSL3 but for the time being I think I'll be extra cautious.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773447#p27773447:p3rqqxgd said:MilleniX[/url]"3rqqxgd]
They might well be under normal circumstances, but are you vulnerable to downgrade attacks? What's to stop someone who can MITM you from offering only SSLv3 if both ends will accept that?[url=http://meincmagazine.com/civis/viewtopic.php?p=27773433#p27773433:p3rqqxgd said:anonArs[/url]"3rqqxgd]
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773393#p27773393:p3rqqxgd said:MyPasswordIs12345678[/url]"3rqqxgd]It's always nice to read that the one secure thing I've always trusted for online purchases is breachable. Hackers are always hacking and getting access to everyone's credit card numbers but they don't ever seem to use this information on a wide scale. I've actually grown apathetic to these reports because, while unnerving to contemplate, nothing big ever happens. I think the odds of my card getting used for identity fraud is very very low, like .001% chance. I think this holds true for everyone too. It happens, but if it happens to you, you have very bad luck.
Are you sure you are even using SSLv3?
Every https site I've checked so far is using TLS
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773647#p27773647:29tutcev said:CaptainTightpants[/url]":29tutcev]According to the page the article referenced (containing instructions on patching IE and Chrome), they tested the top 1MM Alexa sites and listed those not supporting anything better than SSL3 (said list appears below the instructions). Makes for interesting reading with citibank.com right at the top (although it seems not to be the case any longer having just tried it myself under Firefox limited to TLS1.2). Can't imagine Citi will be happy.
EDIT: Looks like there are a LOT of Citi domains there. Watch out you Citi-folk.
Thanks. As a side issue if people use the url http://about:config does it open to the correct page? (just thinking it might be a useful extension --- turn about:config into a url.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773639#p27773639:35rmg466 said:ChrisSD[/url]":35rmg466]Thanks. Unlike the add-on, that setting works on android too. There does not appear to be a way to secure Chrome on Android, so I'll guess I'll stick with Firefox there to.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773561#p27773561:35rmg466 said:cozminsky[/url]":35rmg466]No need for an addon. You can also go to about:config and edit the key security.tls.version.min. The description of what value to put in can be found at http://kb.mozillazine.org/Security.tls. ... ir_effects[url=http://meincmagazine.com/civis/viewtopic.php?p=27773477#p27773477:35rmg466 said:ChrisSD[/url]":35rmg466]I'm glad it's a simple fix for users of modern web browsers. For Firefox you just install the addon, nothing simpler. Unfortunately most users won't know to do this (presumably) and so will be vulnerable until November, assuming they do upgrade then.
Hopefully websites will quickly make this a non issue by disabling SSL3 but for the time being I think I'll be extra cautious.
Have you tried digging through the advanced settings? There used to be an advanced security option for disabling protocols but I don't know if there's a similar option in newer versions.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773649#p27773649:s6ew4zxc said:Stinkoman[/url]":s6ew4zxc]Anyone know how to disable SSLv3 in Opera? It doesn't seem to support Chrome's --ssl-version-min option.
Not to this attack.[url=http://meincmagazine.com/civis/viewtopic.php?p=27773609#p27773609:imf39o4m said:gpriatko[/url]":imf39o4m]> Every https site I've checked so far is using TLS
Which TLS?
SSLv3 and TLS1.0 are equally at risk.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773671#p27773671:m5bhp96q said:anonArs[/url]":m5bhp96q][url=http://meincmagazine.com/civis/viewtopic.php?p=27773447#p27773447:m5bhp96q said:MilleniX[/url]":m5bhp96q]They might well be under normal circumstances, but are you vulnerable to downgrade attacks? What's to stop someone who can MITM you from offering only SSLv3 if both ends will accept that?[url=http://meincmagazine.com/civis/viewtopic.php?p=27773433#p27773433:m5bhp96q said:anonArs[/url]":m5bhp96q][url=http://meincmagazine.com/civis/viewtopic.php?p=27773393#p27773393:m5bhp96q said:MyPasswordIs12345678[/url]":m5bhp96q]It's always nice to read that the one secure thing I've always trusted for online purchases is breachable. Hackers are always hacking and getting access to everyone's credit card numbers but they don't ever seem to use this information on a wide scale. I've actually grown apathetic to these reports because, while unnerving to contemplate, nothing big ever happens. I think the odds of my card getting used for identity fraud is very very low, like .001% chance. I think this holds true for everyone too. It happens, but if it happens to you, you have very bad luck.
Are you sure you are even using SSLv3?
Every https site I've checked so far is using TLS
If someone is MITM'ing your connection to begin with, wouldn't the issue of using SSLv3 almost become moot then?
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773843#p27773843:l2x4fppj said:Xiao-zhi[/url]":l2x4fppj]Yes, let's ban SSLv3 and be done with it already.
But ..... can we replace it with a FUNDED CONSORTIUM product and not keep blaming the 3 guys supporting the net in their spare time?
EDIT:
I know people are going to react to the above and down-rate so let me elaborate:
1. Although TLF is standardized by IETF, in practice TLF is forked all over the map and still, basically, cobbled together as a open sourced, part-timer project with many independent actors.
2. So what I'm suggesting by my obnoxious FUNDED CONSORTIUM is that major stakeholders kick dollars into a consortium with a full time staff to maintain a free and open-sourced but tested and published reference version of TLF just as is basically the case with shrink-wrapped Linux.
Crazy idea, I realize, but so is the carnival side show we have been watching for the past year at who knows what cost.
Just my two cents.
Don't take it personally.
Downrate if you must, but I think I have a point when I look at the 20+ forks of TLF, which is a ridiculous mess.
[url=http://meincmagazine.com/civis/viewtopic.php?p=27773647#p27773647:1ov3tx5o said:CaptainTightpants[/url]":1ov3tx5o]According to the page the article referenced (containing instructions on patching IE and Chrome), they tested the top 1MM Alexa sites and listed those not supporting anything better than SSL3 (said list appears below the instructions). Makes for interesting reading with citibank.com right at the top (although it seems not to be the case any longer having just tried it myself under Firefox limited to TLS1.2). Can't imagine Citi will be happy.
EDIT: Looks like there are a LOT of Citi domains there. Watch out you Citi-folk.
EDIT 2: According to another post below this may not be a problem, but I'd still be cautious if you use any "citi" domain variations.