I'm using FreeBSD 9.2-RELEASE-p5
with apache24-2.4.10_2
package. According to CVE-2014-3566 (POODLE)
, I went ahead and disabled SSLProtocol -SSLv3
following by restart of apache24 service, yet after running checks it seems like SSLv3 still enabled.
<IfModule ssl_module.c>
SSLCipherSuite HIGH:MEDIUM:!aNULL:!MD5
SSLProtocol -SSLv3
SSLPassPhraseDialog builtin
SSLSessionCache "shmcb:/var/run/ssl_scache(512000)"
SSLSessionCacheTimeout 300
</IfModule>
One of checks that I ran was this:
openssl s_client -connect <server>:<port> -ssl3
* UPDATE *
I had minor misconfiguration and after replacing <IfModule ssl_module.c>
to <IfModule ssl_module>
, apache24 DID accept my SSLProtocol
:
[alexus@wcmisdlin02 ~]$ openssl s_client -connect j.alexus.org:443 -ssl3
CONNECTED(00000003)
139809335551816:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake failure:s3_pkt.c:1257:SSL alert number 40
139809335551816:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake failure:s3_pkt.c:596:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 0 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol : SSLv3
Cipher : 0000
Session-ID:
Session-ID-ctx:
Master-Key:
Key-Arg : None
Krb5 Principal: None
PSK identity: None
PSK identity hint: None
Start Time: 1413476188
Timeout : 7200 (sec)
Verify return code: 0 (ok)
---
[alexus@wcmisdlin02 ~]$