SlideShare a Scribd company logo
1 of 10
SSLv3 and POODLE 
Background and testing methodology 
Based on an internal presentation 
Jerome Smith, 30/10/14
What’s the problem? 
• SSLv3 authenticates before it encrypts 
– So you have to decrypt before you can check for tampering 
• https://www.imperialviolet.org/2014/10/14/poodle.html 
GET / HTTP/1.1rnCookie: abcdefghrnrnxxxxMAC-DATA-------7 
• Padding bytes can be anything (“non-deterministic”) 
– Not covered by the MAC 
– Last byte is number of padding bytes 
• Padding Oracle On Downgraded Legacy Encryption 
– Oracle – a database black box that leaks information 
– Padding Oracle – an oracle that tells you whether or not the 
padding of a decrypted message is correct
Padding Oracle Decryption 
GET / HTTP/1.1rnCookie: abcdefghrnrnxxxxMAC-DATA-------7 
• Ci8 decrypts to INTi8 (Ci8 is 8th byte of cookie block, ordinal i of n, moved to last block Cn) 
• When INTi8 XOR Cn-18 = 7 the record will be accepted (attacker knows this and can 
manipulate Cn-18) 
• So INTi8 = 7 XOR Cn-18 
• And Pi8 = INTi8 XOR Ci-18 
Wikipedia 
(pretend block size is 8!)
Padding Oracle Decryption 
GET /a HTTP/1.1rnCookie: abcdefghrnrnxxxMAC-DATA-------7 
• Lengthen URL, shorten end → attack next byte
Protocol Fallback 
• Padding Oracle On Downgraded Legacy 
Encryption 
• Clients and servers don’t often opt for SSLv3 
– But if the client has problems connecting, it will 
try again with a lower protocol version in the 
interests of usability 
– A MITM can cause such problems until the client 
falls back to using SSLv3
Testing 
• All tools check for SSLv3 support 
• Manually 
openssl s_client -ssl3 –connect host:443 
– this just confirms SSLv3 generally, it obviously only 
reports 1 cipher suite 
• If the server prefers RC4-based ciphers then 
unlikely to be exploitable 
– So server preference should be used to qualify risk 
rating
Cipher suite preference 
• Tools can disagree over SSLv3 preference 
• SSLyze 
• SSLscan 
• Who’s right?
Cipher suite preference 
openssl s_client -ssl3 –connect host:443 
openssl s_client -ssl3 -cipher DES-CBC3-SHA:RC4-SHA –connect 
host:443 
openssl s_client -ssl3 -cipher RC4-SHA:DES-CBC3-SHA –connect 
host:443 
• All of them returned: 
• Looks like SSLyze was wrong 
– I posted https://github.com/nabla-c0d3/sslyze/issues/10 
– SSLyze restricts the number of ciphers in the Client Hello “due to 
a bug in a specific brand of load balancers” 
– Unnecessary here as server supported only 3 ciphers
Prevention 
• I know, I’ll prefer RC4 ciphers (er…) 
• Disable SSLv3 
– POODLE isn’t the only reason to disable SSLv3 
– Oh no, I’ve lost my IE6 user base 
• Implement TLS_FALLBACK_SCSV 
– Client signals it is knowingly performing fallback: if server supports a higher 
version, something’s gone wrong 
• Anything that relies on OpenSSL: use 1.0.1j, 1.0.0o, 0.9.8zc 
– But both ends must support it 
• Chrome 33 (Feb 2014) 
• Firefox 35 (Jan 2015); 34 will disable SSLv3 anyway 
• Opera 25 (Oct 2014) 
– Wider protection against downgrade attacks 
• Bespoke client hacks (as was done with BEAST) 
– Anti-POODLE record splitting (Opera 25) but protection is unidirectional 
– Safari: update disables CBC cipher suites when TLS connections fail
Testing for TLS_FALLBACK_SCSV 
• OpenSSL 1.0.1j 
openssl s_client -ssl3 -fallback_scsv -connect host:443 
• If it connects, it’s not implemented 
• If it fails, check the error message for 
“inappropriate fallback” alert

More Related Content

What's hot

Altitude SF 2017: QUIC - A low-latency secure transport for HTTP
Altitude SF 2017: QUIC - A low-latency secure transport for HTTPAltitude SF 2017: QUIC - A low-latency secure transport for HTTP
Altitude SF 2017: QUIC - A low-latency secure transport for HTTP
Fastly
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
Hammam Samara
 

What's hot (20)

BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 
Zhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today siteZhiyun Qian-what leaves attacker hijacking USA Today site
Zhiyun Qian-what leaves attacker hijacking USA Today site
 
CNIT 141 7. Keyed Hashing
CNIT 141 7. Keyed HashingCNIT 141 7. Keyed Hashing
CNIT 141 7. Keyed Hashing
 
Nsa and vpn
Nsa and vpnNsa and vpn
Nsa and vpn
 
Huiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attackHuiming Liu-'resident evil' of smart phones--wombie attack
Huiming Liu-'resident evil' of smart phones--wombie attack
 
Laverna vs etherpad
Laverna vs etherpadLaverna vs etherpad
Laverna vs etherpad
 
Nick Stephens-how does someone unlock your phone with nose
Nick Stephens-how does someone unlock your phone with noseNick Stephens-how does someone unlock your phone with nose
Nick Stephens-how does someone unlock your phone with nose
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
NBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceNBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then ice
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password Attacks
 
FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
wolfSSL TLS 1.3 Support in 2018
wolfSSL TLS 1.3 Support in 2018wolfSSL TLS 1.3 Support in 2018
wolfSSL TLS 1.3 Support in 2018
 
FreeBSD is not Linux
FreeBSD is not LinuxFreeBSD is not Linux
FreeBSD is not Linux
 
OpenSSL
OpenSSLOpenSSL
OpenSSL
 
Large Scale Deployment of SSL/TLS For MySQL
Large Scale Deployment of SSL/TLS For MySQLLarge Scale Deployment of SSL/TLS For MySQL
Large Scale Deployment of SSL/TLS For MySQL
 
Altitude SF 2017: QUIC - A low-latency secure transport for HTTP
Altitude SF 2017: QUIC - A low-latency secure transport for HTTPAltitude SF 2017: QUIC - A low-latency secure transport for HTTP
Altitude SF 2017: QUIC - A low-latency secure transport for HTTP
 
Practical rsa padding oracle attacks
Practical rsa padding oracle attacksPractical rsa padding oracle attacks
Practical rsa padding oracle attacks
 
Introduction to TLS-1.3
Introduction to TLS-1.3 Introduction to TLS-1.3
Introduction to TLS-1.3
 
Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013Sullivan white boxcrypto-baythreat-2013
Sullivan white boxcrypto-baythreat-2013
 
Cracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless NetworksCracking WEP Secured Wireless Networks
Cracking WEP Secured Wireless Networks
 

Viewers also liked

XSS and CSRF with HTML5
XSS and CSRF with HTML5XSS and CSRF with HTML5
XSS and CSRF with HTML5
Shreeraj Shah
 

Viewers also liked (16)

SSL/POODLE: History repeats itself
SSL/POODLE: History repeats itselfSSL/POODLE: History repeats itself
SSL/POODLE: History repeats itself
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Utilisation du SaaS : le cas du CRM
Utilisation du SaaS : le cas du CRMUtilisation du SaaS : le cas du CRM
Utilisation du SaaS : le cas du CRM
 
Malicious file upload attacks - a case study
Malicious file upload attacks - a case studyMalicious file upload attacks - a case study
Malicious file upload attacks - a case study
 
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
AWS Partner Webcast - Web App Security on AWS: How to Make Shared Security Wo...
 
CamSec Sept 2016 - Tricks to improve web app excel export attacks
CamSec Sept 2016 - Tricks to improve web app excel export attacksCamSec Sept 2016 - Tricks to improve web app excel export attacks
CamSec Sept 2016 - Tricks to improve web app excel export attacks
 
BSides MCR 2016: From CSV to CMD to qwerty
BSides MCR 2016: From CSV to CMD to qwertyBSides MCR 2016: From CSV to CMD to qwerty
BSides MCR 2016: From CSV to CMD to qwerty
 
CSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open RedirectCSRF, ClickJacking & Open Redirect
CSRF, ClickJacking & Open Redirect
 
Gli HTTP Security Header e altri elementi da sapere su HTTP in un Web Applica...
Gli HTTP Security Header e altri elementi da sapere su HTTP in un Web Applica...Gli HTTP Security Header e altri elementi da sapere su HTTP in un Web Applica...
Gli HTTP Security Header e altri elementi da sapere su HTTP in un Web Applica...
 
Click Jacking
Click JackingClick Jacking
Click Jacking
 
Clickjacking Attack
Clickjacking AttackClickjacking Attack
Clickjacking Attack
 
Click jacking
Click jacking Click jacking
Click jacking
 
Click jacking
Click jackingClick jacking
Click jacking
 
XSS and CSRF with HTML5
XSS and CSRF with HTML5XSS and CSRF with HTML5
XSS and CSRF with HTML5
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similar to SSLv3 and POODLE

SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
hannob
 

Similar to SSLv3 and POODLE (20)

Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 
SSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS serverSSL, X.509, HTTPS - How to configure your HTTPS server
SSL, X.509, HTTPS - How to configure your HTTPS server
 
Master Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS VillageMaster Serial Killer - DEF CON 22 - ICS Village
Master Serial Killer - DEF CON 22 - ICS Village
 
Deep Dive on Elastic Load Balancing
Deep Dive on Elastic Load BalancingDeep Dive on Elastic Load Balancing
Deep Dive on Elastic Load Balancing
 
Training Slides: 302 - Securing Your Cluster With SSL
Training Slides: 302 - Securing Your Cluster With SSLTraining Slides: 302 - Securing Your Cluster With SSL
Training Slides: 302 - Securing Your Cluster With SSL
 
The Easiest Way to Configure Security for Clients AND Servers (Dani Traphagen...
The Easiest Way to Configure Security for Clients AND Servers (Dani Traphagen...The Easiest Way to Configure Security for Clients AND Servers (Dani Traphagen...
The Easiest Way to Configure Security for Clients AND Servers (Dani Traphagen...
 
(CMP401) Elastic Load Balancing Deep Dive and Best Practices
(CMP401) Elastic Load Balancing Deep Dive and Best Practices(CMP401) Elastic Load Balancing Deep Dive and Best Practices
(CMP401) Elastic Load Balancing Deep Dive and Best Practices
 
SSL overview
SSL overviewSSL overview
SSL overview
 
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
Novel Instruction Set Architecture Based Side Channels in popular SSL/TLS Imp...
 
What every Java developer should know about network?
What every Java developer should know about network?What every Java developer should know about network?
What every Java developer should know about network?
 
Pulsar Summit Asia - Running a secure pulsar cluster
Pulsar Summit Asia -  Running a secure pulsar clusterPulsar Summit Asia -  Running a secure pulsar cluster
Pulsar Summit Asia - Running a secure pulsar cluster
 
Network protocols and vulnerabilities
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilities
 
Webinar slides: 9 DevOps Tips for Going in Production with Galera Cluster for...
Webinar slides: 9 DevOps Tips for Going in Production with Galera Cluster for...Webinar slides: 9 DevOps Tips for Going in Production with Galera Cluster for...
Webinar slides: 9 DevOps Tips for Going in Production with Galera Cluster for...
 
Web security
Web securityWeb security
Web security
 
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way HandshakeWireless Pentest & Capturing a WPA2 Four-Way Handshake
Wireless Pentest & Capturing a WPA2 Four-Way Handshake
 
Jetty TLS troubleshooting
Jetty TLS troubleshootingJetty TLS troubleshooting
Jetty TLS troubleshooting
 
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruptionCNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
CNIT 40: 5: Prevention, protection, and mitigation of DNS service disruption
 
Nikto
NiktoNikto
Nikto
 
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
Accelerating and Securing your Applications in AWS. In-depth look at Solving ...
 
Rootconf2019
Rootconf2019Rootconf2019
Rootconf2019
 

Recently uploaded

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

SSLv3 and POODLE

  • 1. SSLv3 and POODLE Background and testing methodology Based on an internal presentation Jerome Smith, 30/10/14
  • 2. What’s the problem? • SSLv3 authenticates before it encrypts – So you have to decrypt before you can check for tampering • https://www.imperialviolet.org/2014/10/14/poodle.html GET / HTTP/1.1rnCookie: abcdefghrnrnxxxxMAC-DATA-------7 • Padding bytes can be anything (“non-deterministic”) – Not covered by the MAC – Last byte is number of padding bytes • Padding Oracle On Downgraded Legacy Encryption – Oracle – a database black box that leaks information – Padding Oracle – an oracle that tells you whether or not the padding of a decrypted message is correct
  • 3. Padding Oracle Decryption GET / HTTP/1.1rnCookie: abcdefghrnrnxxxxMAC-DATA-------7 • Ci8 decrypts to INTi8 (Ci8 is 8th byte of cookie block, ordinal i of n, moved to last block Cn) • When INTi8 XOR Cn-18 = 7 the record will be accepted (attacker knows this and can manipulate Cn-18) • So INTi8 = 7 XOR Cn-18 • And Pi8 = INTi8 XOR Ci-18 Wikipedia (pretend block size is 8!)
  • 4. Padding Oracle Decryption GET /a HTTP/1.1rnCookie: abcdefghrnrnxxxMAC-DATA-------7 • Lengthen URL, shorten end → attack next byte
  • 5. Protocol Fallback • Padding Oracle On Downgraded Legacy Encryption • Clients and servers don’t often opt for SSLv3 – But if the client has problems connecting, it will try again with a lower protocol version in the interests of usability – A MITM can cause such problems until the client falls back to using SSLv3
  • 6. Testing • All tools check for SSLv3 support • Manually openssl s_client -ssl3 –connect host:443 – this just confirms SSLv3 generally, it obviously only reports 1 cipher suite • If the server prefers RC4-based ciphers then unlikely to be exploitable – So server preference should be used to qualify risk rating
  • 7. Cipher suite preference • Tools can disagree over SSLv3 preference • SSLyze • SSLscan • Who’s right?
  • 8. Cipher suite preference openssl s_client -ssl3 –connect host:443 openssl s_client -ssl3 -cipher DES-CBC3-SHA:RC4-SHA –connect host:443 openssl s_client -ssl3 -cipher RC4-SHA:DES-CBC3-SHA –connect host:443 • All of them returned: • Looks like SSLyze was wrong – I posted https://github.com/nabla-c0d3/sslyze/issues/10 – SSLyze restricts the number of ciphers in the Client Hello “due to a bug in a specific brand of load balancers” – Unnecessary here as server supported only 3 ciphers
  • 9. Prevention • I know, I’ll prefer RC4 ciphers (er…) • Disable SSLv3 – POODLE isn’t the only reason to disable SSLv3 – Oh no, I’ve lost my IE6 user base • Implement TLS_FALLBACK_SCSV – Client signals it is knowingly performing fallback: if server supports a higher version, something’s gone wrong • Anything that relies on OpenSSL: use 1.0.1j, 1.0.0o, 0.9.8zc – But both ends must support it • Chrome 33 (Feb 2014) • Firefox 35 (Jan 2015); 34 will disable SSLv3 anyway • Opera 25 (Oct 2014) – Wider protection against downgrade attacks • Bespoke client hacks (as was done with BEAST) – Anti-POODLE record splitting (Opera 25) but protection is unidirectional – Safari: update disables CBC cipher suites when TLS connections fail
  • 10. Testing for TLS_FALLBACK_SCSV • OpenSSL 1.0.1j openssl s_client -ssl3 -fallback_scsv -connect host:443 • If it connects, it’s not implemented • If it fails, check the error message for “inappropriate fallback” alert

Editor's Notes

  1. Firefox https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/ Chrome https://www.imperialviolet.org/2014/02/27/tlssymmetriccrypto.html Opera http://blogs.opera.com/security/2014/10/security-changes-opera-25-poodle-attacks/ Safari https://support.apple.com/kb/HT6531