TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

The POODLE bites again

94 pointsby deepblueoceanover 10 years ago

5 comments

tacomanover 10 years ago
&quot;This seems like a good moment to reiterate that everything less than TLS 1.2 with an AEAD cipher suite is cryptographically broken.&quot;<p>So this means AES-GCM essentially?
评论 #8721314 未加载
huxleyover 10 years ago
Link didn&#x27;t work for me, here is the Google Cache text version:<p><a href="http://webcache.googleusercontent.com/search?q=cache:f01MHrX8LTAJ:https://www.imperialviolet.org/2014/12/08/poodleagain.html&amp;strip=1" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:f01MHrX...</a>
resonantcoreover 10 years ago
We look forward to TLS 1.2 support being the norm. (And then, hopefully, the ratification and adoption of TLS 1.3)<p>A 50% adoption rate is excellent news. Still a long way to go, but that&#x27;s worth toasting over.
评论 #8719959 未加载
cryptbeover 10 years ago
POODLE worked not only against SSLv3, but also against any TLS implementations that check padding in SSLv3&#x27;s style (e.g., just checking the last byte, and ignoring the rest of the padding). SSL accelerators from F5 and A10 were vulnerable. Thus, many of the world&#x27;s largest sites were vulnerable.
eyearequeover 10 years ago
Are there any more details than what this write up contains?