I agree with Andrew, dynamically linking the against the systems OpenSSL library should be a high priority feature request.
-Brian
Brian McBride
Head of Application Development
J. Willard Marriott Library
O: 801.585.7613
F: 801.585.5549
***@utah.edu<mailto:***@utah.edu>
On Oct 16, 2014, at 5:34 AM, Andrew Anderson <***@lirn.net<mailto:***@lirn.net>> wrote:
Not to sound too much like a broken record, but this is a strong argument for dynamically linking against the systems OpenSSL library so that it stops being OCLCs burden to keep the library updated, and shift that back to where it belongs: the OS vendor.
--
Andrew Anderson, Director of Development, Library and Information Resources Network, Inc.
http://www.lirn.net/ | http://www.twitter.com/LIRNnotes | http://www.facebook.com/LIRNnotes
On Oct 16, 2014, at 6:05, Jim Adamson <***@york.ac.uk<mailto:***@york.ac.uk>> wrote:
Just to add to the joy, I see new versions of OpenSSL have been released to address more bugs:
http://www.theregister.co.uk/2014/10/15/openssl_ddos_vulns/
https://www.openssl.org/news/
Jim
On 15 October 2014 15:56, Hamparian,Don <***@oclc.org<mailto:***@oclc.org>> wrote:
Hello all, we are discussing the technical approach for resolving this issue now.
Don
Don Hamparian
Sr. Product Manager,
EZproxy and Identity Management
OCLC
***@oclc.org<mailto:***@oclc.org>
Voice 614-764-6017
Skype donhamp2
-----Original Message-----
From: Wimmer Christian [mailto:***@ub.uni-muenchen.de<mailto:***@ub.uni-muenchen.de>]
Sent: Wednesday, October 15, 2014 8:26 AM
To: EZProxy discussion list
Subject: AW: [ezproxy] SSL v3 support / poodle
Sadly, there is no "Option DisableSSLv3". So i guess we are stuck with this vulnerability until we get a new ezproxy version which, hopefully, contains an option to disable SSLv3 somehow.
--
Christian Wimmer
Ludwig-Maximilians-Universität München
University Library
IT-Department
Geschwister-Scholl-Platz 1, 80359 München, Germany
Phone: +49 89 2180-6141
Email: ***@ub.uni-muenchen.de<mailto:***@ub.uni-muenchen.de>
-----Ursprüngliche Nachricht-----
Von: Julien Savoie [mailto:***@usainteanne.ca<mailto:***@usainteanne.ca>]
Gesendet: Mittwoch, 15. Oktober 2014 08:39
An: EZProxy discussion list
Betreff: [ezproxy] SSL v3 support / poodle
Worth mentioning that ezproxy by default has SSLv3 support and is impacted by http://www.theregister.co.uk/2014/10/14/google_drops_ssl_30_poodle_vulnerability/
We've been running ezproxy with:
SSLCipherSuite HIGH:RC4-SHA:!ADH:!aNULL
$ sslscan proxy:2443 | grep Accepted
Accepted SSLv3 256 bits DHE-RSA-AES256-SHA
Accepted SSLv3 256 bits AES256-SHA
Accepted SSLv3 168 bits EDH-RSA-DES-CBC3-SHA
Accepted SSLv3 168 bits DES-CBC3-SHA
Accepted SSLv3 128 bits DHE-RSA-AES128-SHA
Accepted SSLv3 128 bits AES128-SHA
Accepted SSLv3 128 bits RC4-SHA
Accepted TLSv1 256 bits DHE-RSA-AES256-SHA
Accepted TLSv1 256 bits AES256-SHA
Accepted TLSv1 168 bits EDH-RSA-DES-CBC3-SHA
Accepted TLSv1 168 bits DES-CBC3-SHA
Accepted TLSv1 128 bits DHE-RSA-AES128-SHA
Accepted TLSv1 128 bits AES128-SHA
Accepted TLSv1 128 bits RC4-SHA
So now would be a good time to turn off SSLv3 in ezproxy. Unfortunately adding !SSLv3 or -SSLv3 seems to disable ALL of the available ciphers.
---
You are currently subscribed to ezproxy as: ***@ub.uni-muenchen.de<mailto:***@ub.uni-muenchen.de>.
To unsubscribe, send request to ***@itec.suny.edu<mailto:***@itec.suny.edu>
---
You are currently subscribed to ezproxy as: ***@oclc.org<mailto:***@oclc.org>.
To unsubscribe, send request to ***@itec.suny.edu<mailto:***@itec.suny.edu>
---
You are currently subscribed to ezproxy as: ***@york.ac.uk<mailto:***@york.ac.uk>.
To unsubscribe, send request to ***@itec.suny.edu<mailto:***@itec.suny.edu>
--
Jim Adamson
Digital York Technical specialist
Information
LFA/237, Harry Fairhurst building
University of York
Heslington, York YO10 5DD
+44 (0)1904 323859
My calendar: http://bit.ly/mBy6U8
Library Footprints Knowledge Base & Enquiries: http://bit.ly/i4CfCa
[
Loading Image...]
Email Disclaimer: http://www.york.ac.uk/docs/disclaimer/email.htm<http://bit.ly/ghXLMH>
You are currently subscribed to ezproxy as: ***@lirn.net<mailto:***@lirn.net>.
To unsubscribe, send request to ***@itec.suny.edu<mailto:***@itec.suny.edu>
You are currently subscribed to ezproxy as: ***@utah.edu<mailto:***@utah.edu>.
To unsubscribe, send request to ***@itec.suny.edu<mailto:***@itec.suny.edu>
---
You are currently subscribed to ezproxy as: gee-***@m.gmane.org.
To unsubscribe, send request to ***@itec.suny.edu