TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The POODLE bites again

94 点作者 deepblueocean超过 10 年前

5 条评论

tacoman超过 10 年前
&quot;This seems like a good moment to reiterate that everything less than TLS 1.2 with an AEAD cipher suite is cryptographically broken.&quot;<p>So this means AES-GCM essentially?
评论 #8721314 未加载
huxley超过 10 年前
Link didn&#x27;t work for me, here is the Google Cache text version:<p><a href="http://webcache.googleusercontent.com/search?q=cache:f01MHrX8LTAJ:https://www.imperialviolet.org/2014/12/08/poodleagain.html&amp;strip=1" rel="nofollow">http:&#x2F;&#x2F;webcache.googleusercontent.com&#x2F;search?q=cache:f01MHrX...</a>
resonantcore超过 10 年前
We look forward to TLS 1.2 support being the norm. (And then, hopefully, the ratification and adoption of TLS 1.3)<p>A 50% adoption rate is excellent news. Still a long way to go, but that&#x27;s worth toasting over.
评论 #8719959 未加载
cryptbe超过 10 年前
POODLE worked not only against SSLv3, but also against any TLS implementations that check padding in SSLv3&#x27;s style (e.g., just checking the last byte, and ignoring the rest of the padding). SSL accelerators from F5 and A10 were vulnerable. Thus, many of the world&#x27;s largest sites were vulnerable.
eyeareque超过 10 年前
Are there any more details than what this write up contains?