Tsi-Shawn
Basic Pleskian
According to this article:
How to test for SSL POODLE vulnerability?
$ openssl s_client -connect google.com:443 -ssl3
If there is a handshake failure then the server is not supporting SSLv3 and it is secure from this vulnerability. Otherwise it is required to disable SSLv3 support.
How to disable the SSLv3 support on Nginx?
In nginx configuration, just after the "ssl on;" line, add the following to allow only TLS protocols:
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
Both my servers are able to handshake. I am running nginx and this change in ano /etc/nginx/plesk.conf.d/server.conf
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
#ssl_protocols SSLv2 SSLv3 TLSv1;
After restarting nginx I still get the handshake. Where in a plesk environment running nginx do we make this change?
How to test for SSL POODLE vulnerability?
$ openssl s_client -connect google.com:443 -ssl3
If there is a handshake failure then the server is not supporting SSLv3 and it is secure from this vulnerability. Otherwise it is required to disable SSLv3 support.
How to disable the SSLv3 support on Nginx?
In nginx configuration, just after the "ssl on;" line, add the following to allow only TLS protocols:
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
Both my servers are able to handshake. I am running nginx and this change in ano /etc/nginx/plesk.conf.d/server.conf
ssl_protocols TLSv1.2 TLSv1.1 TLSv1;
#ssl_protocols SSLv2 SSLv3 TLSv1;
After restarting nginx I still get the handshake. Where in a plesk environment running nginx do we make this change?