The POODLE attack (SSLv3 supported) 漏洞修复

HAProxy配置中,SSLv3可能导致POODLE中间人攻击,即使支持更现代的TLS版本也存在风险。禁用SSLv3并切换到TLSv1.0可提升安全性,避免敏感数据泄露。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

ssl是haproxy配置,上线后扫描发现以下漏洞

Vulnerability description
Websites that support SSLv3 and CBC-mode ciphers are potentially vulnerable to an active MITM (Man-in-the-middle) attack. This attack, called POODLE, is similar to the BEAST attack and also allows a network attacker to extract the plaintext of targeted parts of an SSL connection, usually cookie data. Unlike the BEAST attack, it doesn't require such extensive control of the format of the plaintext and thus is more practical. 

Any website that supports SSLv3 is vulnerable to POODLE, even if it also supports more recent versions of TLS. SSLv3 is disabled by default in Firefox 34, which was released on Nov 25 2014. Affected items
Server 
The impact of this vulnerability
An attacker may be able to exploit this problem to conduct man-in-the-middle attacks and decrypt communications between the affected service and clients. 

How to fix this vulnerability
It's recommended to disable SSLv3 and replace it with TLSv1.0 as soon as compatibility with legacy clients is no longer required. (The only browser that does not support TLSv1.0 is Internet Explorer 6). 

To disable SSLv2 and SSLv3: 
For Apache:
SSLProtocol all -SSLv2 -SSLv3
For Nginx:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; 

修复:

在haproxy全局加入

ssl-default-bind-options no-sslv3

重启haproxy,重新扫描即可

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值