Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Oct 2014 05:28:34 +0000
From: Sona Sarmadi <sona.sarmadi@...a.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: RE: Truly scary SSL 3.0 vuln to be revealed soon:

Thanks Hanno,

A reflection: Maybe we shouldn't post  information like this here or somewhere else which is not published yet even if the information has leak out? Although all members here are reliable but it is still an open mailing list and we should be careful and act more responsible. 

Cheers
Sona

> It's out:
> 
> https://www.openssl.org/~bodo/ssl-poodle.pdf
> http://googleonlinesecurity.blogspot.de/2014/10/this-poodle-bites-
> exploiting-ssl-30.html
> 
> My conclusion stays the same: Disable SSLv3.
> 
> --
> Hanno Böck
> http://hboeck.de/
> 
> mail/jabber: hanno@...eck.de
> GPG: BBB51E42

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ