Hi,
I just got a new Plesk 12 VPS with MediaTemple. As deployed fresh, the server has the POODLE vulnerability unpatched -- I would have thought Parallels would have new installs fixed by now?
Anyway, rather than going through the lengthy patching process, as described here http://kb.odin.com/en/123160 I was hoping to find the quickest and most robust fix. There is a script available on the KB page to automate the patching, but it didn't work on some of my other Plesk installs, I had to do it manually.
I see that the site templates at /usr/local/psa/admin/conf/templates/default/ have been updated with things like this:
Where is this param 'disablesslv3' set? How can it be set to 'true'?
Does setting this param affect other services, also patching them for POODLE? Or does it just affect NGINX?
What is the best practice for patching a fresh Plesk 12 install for POODLE?
Thanks in advance for your assistance.
I just got a new Plesk 12 VPS with MediaTemple. As deployed fresh, the server has the POODLE vulnerability unpatched -- I would have thought Parallels would have new installs fixed by now?
Anyway, rather than going through the lengthy patching process, as described here http://kb.odin.com/en/123160 I was hoping to find the quickest and most robust fix. There is a script available on the KB page to automate the patching, but it didn't work on some of my other Plesk installs, I had to do it manually.
I see that the site templates at /usr/local/psa/admin/conf/templates/default/ have been updated with things like this:
Code:
<?php if (get_param('disablesslv3')): ?>
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
<?php else: ?>
ssl_protocols SSLv2 SSLv3 TLSv1 TLSv1.1 TLSv1.2;
<?php endif ?>
Where is this param 'disablesslv3' set? How can it be set to 'true'?
Does setting this param affect other services, also patching them for POODLE? Or does it just affect NGINX?
What is the best practice for patching a fresh Plesk 12 install for POODLE?
Thanks in advance for your assistance.