Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For those using nginx:

All nginx versions >= 0.8.19 (Oct 2009), and backported to >= 0.7.65 (Feb 2010), have SSLv2 disabled in default configuration[1][2]. Versions >= 1.9.1 (May 2015) also disable SSLv3 by default, which is not affected by this particular attack but suffers from the POODLE attack.

If you are on a version of nginx covered above, just ensure your nginx configuration does not have an "ssl_protocols" directive explicitly enabling SSLv2 (and SSLv3 for POODLE).

If you are on an older affected version of nginx, check your configuration to make sure you exclude SSLv2 (and typically SSLv3) with something like:

ssl_protocols TLSv1 TLSv1.1 TLSv1.2;

It is not necessary to worry whether your nginx is built against openssl 1.0.2g, as this release simply disables SSLv2 support by default. If you've covered your bases with your nginx configuration, the openssl update is not strictly required.

[1] http://nginx.org/en/docs/http/configuring_https_servers.html (versions listed at very bottom of page)

[2] https://drownattack.com/nginx



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: