Quantcast
Channel: GlobalSCAPE Knowledge Base
Viewing all articles
Browse latest Browse all 785

The POODLE OpenSSL Vulnerability and Mail Express

$
0
0

THE INFORMATION IN THIS ARTICLE APPLIES TO:

  • Mail Express v3.3 and later

DISCUSSION

The "POODLE Vulnerability" (CVE-2014-3566) is a serious vulnerability in the blueprints of SSL v3.0 and thus affects any product following the protocol. This weakness allows stealing the information protected, under normal conditions, by the SSL encryption used to provide communication security and privacy over the Internet for applications such as web, email, instant messaging (IM), and some virtual private networks (VPNs).

Mail Express supports SSL v3 which is vulnerable, however, work is in progress to update the default configuration to mitigate this vulnerability. Customers can manually change their configuration as described below.

WORKAROUND

Turn on use of FIPS 140-2 compliant protocols

  1. Log in to the Mail Express administration interface.
  2. In the navigation pane, under Configuration, click General. The General Settings page appears.
  3. Under Enhanced Communication Security, select the Use only protocols and algorithms approved for use by FIPS 140-2 check box.
  4. Click Save. A message appears at the top of the page.
  5. Click Restart server now.
-OR-
  • Configure the Mail Express web server to disable SSLv3 protocol by editing the server.xml file found in the folder <Mail Express Server Installation Directory>\conf \server.xml. This requires you to restart the server. The required changes depend on whether you use DMZ Gateway connector or not.

  1. Search for and remove all instances of the following:

sslProtocol="all"

  1. Search for sslEnabledProtocols and replace:

sslEnabledProtocols="SSLv2Hello,SSLv3,TLSv1"

with:

sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2"

  1. Locate each <Connector> section and if sslEnabledProtocols is missing, add it to the very end, preceded by a space:

sslEnabledProtocols=" TLSv1,TLSv1.1,TLSv1.2"

The end of the string might look something like:

scheme="https" secure="true"sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2"

  1. Locate each <Connector> section and search for the ciphers parameter, and then remove any ciphers that start with "SSL".

The resulting cipher list should look like this:

ciphers="TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_256_CBC_SHA"

  1. Save the fie and restart the server service. You can verify by trying to connect to Mail Express with a browser with only SSL v3.0 enabled. (You should not be able to connect.)


Viewing all articles
Browse latest Browse all 785

Trending Articles