Response to the OpenSSL POODLE Vulnerability - CA Technologies
{{search ? 'Close':'Search'}}

Response to the OpenSSL (POODLE) Vulnerability

Last Updated: October 22, 2014

The POODLE vulnerability is described at the following url: https://www.openssl.org/~bodo/ssl-poodle.pdf

For CA Directory, SSLv3 is supported and is defined by a configuration setting in the default.dxc file in the DXHOMEconfigssld folder (on Windows substitute DXHOME with %DXHOME% and $DXHOME on Linux/Unix). If you are pointing at a different ssld file than default.dxc, then update that file.

In the "set ssl = %7B" command, ensure the protocol line is uncommented and is set to 'tls' to exclude SSLv3 as an accepted protocol. For example:

protocol = tls

Ensure that the DSA is either restarted or initialised for the changed config to take effect.

The CA Directory 12.0 SP14 CR1 (available end of October 2014) and CA Directory 12.0 SP15 will have the SSL3 disabled OOTB in the default.dxc configuration.

Chat with CA

Just give us some brief information and we'll connect you to the right CA Expert.

Our hours of availability are 8AM - 5PM CST.

All Fields Required

connecting

We're matching your request.

Unfortunately, we can't connect you to an agent. If you are not automatically redirected please click here.

  • {{message.agentProfile.name}} will be helping you today.

    View Profile


  • Transfered to {{message.agentProfile.name}}

    {{message.agentProfile.name}} joined the conversation

    {{message.agentProfile.name}} left the conversation

  • Your chat with {{$storage.chatSession.messages[$index - 1].agentProfile.name}} has ended.
    Thank you for your interest in CA.


    How Did We Do?
    Let us know how we did so that we can maintain a quality experience.

    Take Our Survey >

    Rate Your Chat Experience.

    {{chat.statusMsg}}

agent is typing