hadoop-common-issues mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Robert Kanter (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (HADOOP-11217) Disable SSLv3 (POODLEbleed vulnerability) in KMS
Date Tue, 21 Oct 2014 22:00:35 GMT

     [ https://issues.apache.org/jira/browse/HADOOP-11217?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Robert Kanter updated HADOOP-11217:
-----------------------------------
    Status: Patch Available  (was: Open)

> Disable SSLv3 (POODLEbleed vulnerability) in KMS
> ------------------------------------------------
>
>                 Key: HADOOP-11217
>                 URL: https://issues.apache.org/jira/browse/HADOOP-11217
>             Project: Hadoop Common
>          Issue Type: Bug
>          Components: kms
>    Affects Versions: 2.6.0
>            Reporter: Robert Kanter
>            Assignee: Robert Kanter
>            Priority: Blocker
>         Attachments: HADOOP-11217.patch
>
>
> We should disable SSLv3 in KMS to protect against the POODLEbleed vulnerability.
> See [CVE-2014-3566|http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566]
> We have {{sslProtocol="TLS"}} set to only allow TLS in ssl-server.xml, but when I checked,
I could still connect with SSLv3.  There documentation is somewhat unclear in the tomcat configs
between {{sslProtocol}}, {{sslProtocols}}, and {{sslEnabledProtocols}} and what each value
they take does exactly.  From what I can gather, {{sslProtocol="TLS"}} actually includes SSLv3
and the only way to fix this is to explicitly list which TLS versions we support.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Mime
View raw message