2
0
mirror of https://github.com/xcat2/xcat-core.git synced 2025-05-23 12:12:05 +00:00
xcat-core/docs/source/security/2015/20150520_openssl.rst
Victor Hu b90fe27096 Created the security notices that were on SF for 2015 into the xCAT
documentation so we can clean up the GitHub Wiki to remove security
notices from that location. I think saving the last 2 years is sufficient
and probably should get removed over time.
2016-08-18 09:29:42 -04:00

21 lines
1009 B
ReStructuredText

2015-05-20 - OpenSSL Vulnerabilities (LOGJAM)
=============================================
A Logjam vulnerability attacks openssl and web services on weak (512-bit) Diffie-Hellman key groups. Please refer to the following documents for details.
Main site: https://weakdh.org/
Server test: https://weakdh.org/sysadmin.html
Please refer to the following openssl link for more details regarding the fix: https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
OpenSSL 1.0.2 users should upgrade to 1.0.2b
OpenSSL 1.0.1 users should upgrade to 1.0.1n
Action
------
xCAT uses OpenSSL for client-server communication but **does not** ship it. It uses the default ciphers from openssl. It also allows the user to customize it through site.xcatsslversion and site.xcatsslciphers. Please make sure you do not enable DH or DHE ciphers.
Please get the latest openssl package from the os distros and upgrade it on all the xCAT management nodes, the service nodes and xCAT client nodes.