SSLv3 connections vulnerable in my environment?

21 Oct
2014
21 Oct
'14
7:09 p.m.
Hello, I have a pretty standard stunnel server configuration with verify = 2 and clients, that don't speak TLS and can't easily be upgraded to support TLS. So disabling SSLv3 leads to handshake errors, I need to leave it enabled for now. The SSL connection is always renegotiated, a proprietary protocol is used inside SSL, and clients can be considered safe. Can the poodle security flaw realistically be used by a man in the middle to decrypt packets send over such an SSLv3 connection? If so, is there any other way to protect against the attack? Thank you.
3958
Age (days ago)
3958
Last active (days ago)
0 comments
1 participants
participants (1)
-
Fritz Gschwendner