TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Disabling SSLv3 and RC4

146 pointsby helperover 9 years ago

8 comments

weavieover 9 years ago
If you run an SSL server it is well worth running it through <a href="https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;index.html" rel="nofollow">https:&#x2F;&#x2F;www.ssllabs.com&#x2F;ssltest&#x2F;index.html</a> to spot any config errors. It was this that spotted I had SSLv3 enabled. I would have been completely clueless otherwise.
评论 #10238697 未加载
评论 #10238831 未加载
insertnicknameover 9 years ago
Maybe once major browsers all disable RC4, my bank will finally stop using it. Or maybe they&#x27;ll just sit on their hands and tell people to use IE6. I don&#x27;t know. Anything is possible when they&#x27;re using such a ridiculous TLS config in 2015 (only TLS 1.0, only 3DES and RC4).
评论 #10238008 未加载
评论 #10238308 未加载
评论 #10238417 未加载
评论 #10237961 未加载
评论 #10237691 未加载
评论 #10240736 未加载
ademarreover 9 years ago
This is a good move.<p>As an aside, I thought this was a funny appeal to authority:<p>&gt; <i>SSLv3 has been obsolete for over 16 years and is so full of known problems that the IETF has decided that it must no longer be used.</i> &lt;link to RFC 7568[0]&gt;<p>This blog post was written by Adam Langley, who is also one of the authors of RFC 7568.<p>[0] <a href="https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;rfc7568" rel="nofollow">https:&#x2F;&#x2F;tools.ietf.org&#x2F;html&#x2F;rfc7568</a>
kijinover 9 years ago
The only mainstream browser that doesn&#x27;t support TLSv1 by default is IE6, and it&#x27;s been dead for quite some time.<p>(At one of my API endpoints, I&#x27;m seeing IE6 market share in the range of 0.013%. And this is in South Korea where IE market share is abnormally high to begin with, so I&#x27;m sure the numbers are even lower in most other parts of the world.)<p>So this change has more to do with API clients than browsers. Unfortunately, a lot of API clients are still written for, and run on, grossly outdated platforms. For example, Java 1.4 is as old as IE6, but one still sees it in the wild from time to time.
AhtiKover 9 years ago
Requiring Server Name Indication (SNI) extension is quite significant as if I understand correctly then this blocks Windows XP to access any of the Google services with any version of Internet Explorer.
评论 #10238249 未加载
评论 #10238159 未加载
评论 #10242104 未加载
DiabloD3over 9 years ago
We still need the other side of this: Chrome, Firefox, MSIE, and Safari need to start refusing to negotiate SSLv3 and RC4.
评论 #10237535 未加载
评论 #10237518 未加载
cm2187over 9 years ago
What I don&#x27;t understand is how google can be comfortable to use TLS on their SMTP service given that it is vulnerable to a STARTTLS downgrade MITM attack. It&#x27;s like switching from old encryption to optional encryption.
评论 #10238037 未加载
评论 #10238131 未加载
评论 #10237746 未加载
PaulBurkeover 9 years ago
If you want to get rid of POODLE vulnerability due to SSLv3,<p>Here&#x27;s how you can solve it in Google Chrome, Firefox &amp; IE - <a href="http:&#x2F;&#x2F;bit.ly&#x2F;disable-SSLv3" rel="nofollow">http:&#x2F;&#x2F;bit.ly&#x2F;disable-SSLv3</a>