Hauptmenü öffnen

Siwecos β

TLS-POODLE-Vulnerability-SMTP/EN

Version vom 26. Oktober 2019, 12:10 Uhr von Siwebot (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „=== {{:{{PAGENAME}}/Headline}} === If the result is positive, there is no need for further action. If the result is negative, please read the following inst…“)
(Unterschied) ← Nächstältere Version | Aktuelle Version (Unterschied) | Nächstjüngere Version → (Unterschied)

Check for TLS-POODLE vulnerability

If the result is positive, there is no need for further action. If the result is negative, please read the following instructions.

Result positive Not vulnerable to TLS-POODLE.
Result negativ Vulnerable to TLS-POODLE.
Description The server is vulnerable to a variant of the Poodle attack on TLS, which allows an attacker to decrypt the communication.
Background There is a variant of the POODLE attack which also attacks newer TLS versions. This is possible due to an implementation error in the TLS servers.
Consequence The server is vulnerable to a vulnerability that allows an attacker to decrypt the communication.
Solution/Tips If vulnerability has been reported, immediately install an update to your TLS implementation on your server.