dave_cohen
New Pleskian
The Poodle patch fix in article 123160, http://kb.odin.com/en/123160,
[Plesk] CVE-2014-3566: POODLE attack exploiting SSL 3.0 fallback
can break incoming email from some web sites, including gmail, with TLS Negotiation Failure.
Without going into detail, the fix I made was to reverse the qmail patch by editing:
/var/qmail/control/tlsserverciphers
I removed the SSLv3 part so it read:
ALL:!ADH:!LOW:!SSLv2:!EXP:+HIGH:+MEDIUM
then restarted qmail:
/etc/init.d/qmail restart
I am guessing this will leave email open to Poodle, but at least incoming email works!
An interesting site to check TLS compliance is:
http://www.checktls.com/perl/TestReceiver.pl
Hope this saves someone the agony of a lost day...as I endured.
[Plesk] CVE-2014-3566: POODLE attack exploiting SSL 3.0 fallback
can break incoming email from some web sites, including gmail, with TLS Negotiation Failure.
Without going into detail, the fix I made was to reverse the qmail patch by editing:
/var/qmail/control/tlsserverciphers
I removed the SSLv3 part so it read:
ALL:!ADH:!LOW:!SSLv2:!EXP:+HIGH:+MEDIUM
then restarted qmail:
/etc/init.d/qmail restart
I am guessing this will leave email open to Poodle, but at least incoming email works!
An interesting site to check TLS compliance is:
http://www.checktls.com/perl/TestReceiver.pl
Hope this saves someone the agony of a lost day...as I endured.