Response to the OpenSSL (POODLE) Vulnerability

Last Updated: October 22, 2014

The POODLE vulnerability is described at the following url:

For CA Directory, SSLv3 is supported and is defined by a configuration setting in the default.dxc file in the DXHOMEconfigssld folder (on Windows substitute DXHOME with %DXHOME% and $DXHOME on Linux/Unix). If you are pointing at a different ssld file than default.dxc, then update that file.

In the "set ssl = %7B" command, ensure the protocol line is uncommented and is set to 'tls' to exclude SSLv3 as an accepted protocol. For example:

protocol = tls

Ensure that the DSA is either restarted or initialised for the changed config to take effect.

The CA Directory 12.0 SP14 CR1 (available end of October 2014) and CA Directory 12.0 SP15 will have the SSL3 disabled OOTB in the default.dxc configuration.

Chat with CA

Just give us some brief information and we'll connect you to the right CA ExpertCA sales representative.

Our hours of availability are 8AM - 5PM CST.

All Fields Required


We're matching your request.

Unfortunately, we can't connect you to an agent. If you are not automatically redirected please click here.

  • {{}} will be helping you today.

    View Profile

  • Transfered to {{}}

    {{}} joined the conversation

    {{}} left the conversation

  • Your chat with {{$storage.chatSession.messages[$index - 1]}} has ended.
    Thank you for your interest in CA.

    Rate Your Chat Experience.


agent is typing