01-27-2017 02:58 AM
How to disable the deprecated SSLv2 and/or SSLv3 protocols in favor of the TLSv1+ protocols on access switches
01-27-2017 11:34 AM
A lot of the time if you just upgrade to current software it gets disabled automatically.
01-31-2017 08:20 PM
Hi,
To avoid this vulnerability, Red Hat recommends disabling SSL and using only TLSv1.1 or TLSv1.2. Backwards compatibility can be achieved using TLSv1.0. Many products Red Hat supports have the ability to use SSLv2 or SSLv3 protocols, or enable them by default. However use of SSLv2 or SSLv3 is now strongly recommended against.
The SSL/TLS support in httpd can be provided by the mod_ssl
module using the OpenSSL library, or by the mod_nss
module using the NSS library.
Examples below enable all TLS versions currently supported by specified product versions.
To mitigate this vulnerability as it affects httpd using mod_ssl, set the SSLProtocol
directive as follows in /etc/httpd/conf.d/ssl.conf
:
Note: This directive must either be located at the topmost level of the configuration file, or inside the default virtual host configuration for an address.
More information available below:
https://access.redhat.com/solutions/1232413
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide