Andrei bio photo

Andrei

Linux engineer, devops enthusiast and sys-admin/developer hybrid

Email LinkedIn Github

Overview

POODLE stands for Padding Oracle On Downgraded Legacy Encryption. This vulnerability allows a man-in-the-middle attacker to decrypt ciphertext using a padding oracle side-channel attack. More details are available in the upstream OpenSSL advisory. POODLE affects older standards of encryption, specifically Secure Socket Layer (SSL) version 3. It does not affect the newer encryption mechanism known as Transport Layer Security (TLS).

poodle vulnerability

In order to test if your servers are vulnerable to SSLv3 Poodle attacks please see the below commands:

1-way-ssl

curl -v3 -X HEAD https://yourserver.domain
....

OR

openssl s_client -connect yourserver.domain:443 -ssl3

You should se some relevant output like: “SSL peer handshake failed” if you cannot negociate a connection with your server by using SSLv3 protocol. In this case, congratulations! you are not vulnerable! On the other hand, if you see huge chuck of data on the output, or something like: “SSL handshake has read 8349 bytes and written 2375 bytes” that means that you are vulnerable.

2-way-ssl

openssl s_client -connect yourserver.domain:443 -ssl3 -cert cert.pem -key cert.key

Again, you should see some handshake faliure messages if your server is not vulnerable. In order to make sure your server is working fine using TLSv1.X use the following

openssl s_client -connect yourserver.domain:443 -tls1 -cert cert.pem -key cert.key

You should see some big output containg certificate exchange and a handshake success

How to fix?

Depending on what webserver you ar running, you need to disable the use of SSLv3. Please follow the RedHat reccomended solution here