[HLUG] Fwd: [lugmaster] Poodle SSLv3 vulnerability
Julian Robbins
joolsr1 at gmail.com
Fri Oct 17 15:59:35 UTC 2014
Hi
I'm sure some or most of you will have heard about this latest security
issue but for those who haven't yet here goes
Get those servers patched !
How's our lug site Kevin ?
Thanks
Julian
---------- Forwarded message ----------
From: "Gavin Westwood (LugAdmin)" <lug at gavinwestwood.co.uk>
Date: 17 Oct 2014 08:39
Subject: [lugmaster] Poodle SSLv3 vulnerability
To: "lugm >> UK LUG Masters' private discussion" <
lugmaster at mailman.lug.org.uk>
Cc:
Hello.
In light of the recently announced vulnerability in the SSLv3 protocol
(POODLE - believed to affect all implementations of the standard),
lug.org.uk are disabling SSLv3 on their servers. For most people this
should not be an issue, but if you use a very old web browser you may
find that you can no-longer access our website using https.
Those of you running your LUG website on servers other than lug.org.uk
should ensure that SSLv3 is disabled on those servers. For more detail
read
https://scotthelme.co.uk/sslv3-goes-to-the-dogs-poodle-kills-off-protocol/
You can test your server(s) at https://www.ssllabs.com/ssltest/index.html
Thanks
Gavin Westwood, on behalf of lug.org.uk
--
lugmaster mailing list
lugmaster at mailman.lug.org.uk
https://mailman.lug.org.uk/mailman/listinfo/lugmaster
More information about the Herefordshire
mailing list