2
0
mirror of https://github.com/xcat2/xcat-core.git synced 2025-05-22 19:52:03 +00:00
xcat-core/docs/source/security/2015/20150403_openssl.rst
Victor Hu b90fe27096 Created the security notices that were on SF for 2015 into the xCAT
documentation so we can clean up the GitHub Wiki to remove security
notices from that location. I think saving the last 2 years is sufficient
and probably should get removed over time.
2016-08-18 09:29:42 -04:00

15 lines
827 B
ReStructuredText

2015-04-03 - OpenSSL Vulnerabilities (BAR MITZVAH)
==================================================
The RC4 Bar mitzvah attack is an attack on the SSL/TLS protocols when both the client and server have RC4 enabled.
* http://www.darkreading.com/attacks-breaches/ssl-tls-suffers-bar-mitzvah-attack-/d/d-id/1319633
* http://www.imperva.com/docs/HII_Attacking_SSL_when_using_RC4.pdf.
Action
------
xCAT uses OpenSSL shipped with OS distribution for client-server communication. It does not use RC4 ciphers explicitly. However, it allows user to specify xcatsslciphers on the site table for ssl communication. It is recommended that the user not specify RC4 ciphers to avoid the Bar mitzvah attack.
It is also recommended that the user go to the OS distribution to get latest OpenSSL package for the fix of this problem.