[HLUG] Fwd: [lugmaster] Poodle SSLv3 vulnerability

Julian Robbins joolsr1 at gmail.com
Fri Oct 17 15:59:35 UTC 2014


Hi

I'm sure some or most of you will have heard about this latest security
issue but for those who haven't yet here goes

Get those servers patched !

How's our lug site Kevin ?

Thanks

Julian
---------- Forwarded message ----------
From: "Gavin Westwood (LugAdmin)" <lug at gavinwestwood.co.uk>
Date: 17 Oct 2014 08:39
Subject: [lugmaster] Poodle SSLv3 vulnerability
To: "lugm >> UK LUG Masters' private discussion" <
lugmaster at mailman.lug.org.uk>
Cc:

Hello.

In light of the recently announced vulnerability in the SSLv3 protocol
(POODLE - believed to affect all implementations of the standard),
lug.org.uk are disabling SSLv3 on their servers.  For most people this
should not be an issue, but if you use a very old web browser you may
find that you can no-longer access our website using https.

Those of you running your LUG website on servers other than lug.org.uk
should ensure that SSLv3 is disabled on those servers.  For more detail
read
https://scotthelme.co.uk/sslv3-goes-to-the-dogs-poodle-kills-off-protocol/

You can test your server(s) at https://www.ssllabs.com/ssltest/index.html

Thanks

Gavin Westwood, on behalf of lug.org.uk



--
lugmaster mailing list
lugmaster at mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/lugmaster


More information about the Herefordshire mailing list