oss-sec mailing list archives
Re: Truly scary SSL 3.0 vuln to be revealed soon:
From: Krassimir Tzvetanov <maillists () krassi biz>
Date: Tue, 14 Oct 2014 23:32:20 -0700
If I have to complain about something (and this is a general concern not poodle-centric) it would be that I will be good to get heads up on vulnerable versions. Even if no details are released at that time it would be good to have 4 hours heads up. In most circumstances this is not sufficient time to reverse and start exploiting but would allow responders to enumerate the products/systems affected and contact the owners. In a production environment this might mean cancelling planned change requests and in development environments this might mean preparing the necessary engineering teams and test environments. In some cases this will also make it easy for people from other time zones to have the proper incident managers engaged (provided they have less senior stuff or automation monitoring this list). So if you are working with embargoed info consider encouraging the owners to disclose affected versions prior to the full report. Best, Krassimir On Tue, Oct 14, 2014 at 11:13 PM, mancha <mancha1 () zoho com> wrote:
On Wed, Oct 15, 2014 at 05:28:34AM +0000, Sona Sarmadi wrote: Hanno was sharing already-public information. Adam Langley tweeted it at Tue Oct 14 22:28:32 UTC 2014 [1] and Hanno emailed the news to oss-sec 12 minutes and change later. I didn't check to see if there were even earlier public disclosures than agl's. Someone is owed an apology. --mancha [1] https://twitter.com/agl__/status/522151998502617088 PS Ugh, top-posting.Thanks Hanno, A reflection: Maybe we shouldn't post information like this here or somewhere else which is not published yet even if the information has leak out? Although all members here are reliable but it is still an open mailing list and we should be careful and act more responsible. Cheers SonaIt's out: https://www.openssl.org/~bodo/ssl-poodle.pdf http://googleonlinesecurity.blogspot.de/2014/10/this-poodle-bites- exploiting-ssl-30.html My conclusion stays the same: Disable SSLv3. -- Hanno Böck http://hboeck.de/ mail/jabber: hanno () hboeck de GPG: BBB51E42
Current thread:
- Re: list policy (Re: Truly scary SSL 3.0 vuln to be revealed soon:), (continued)
- Re: list policy (Re: Truly scary SSL 3.0 vuln to be revealed soon:) Michal Zalewski (Oct 29)
- Re: list policy (Re: Truly scary SSL 3.0 vuln to be revealed soon:) Solar Designer (Nov 03)
- Re: SSL POODLE (Truly scary SSL 3.0 vuln) gremlin (Oct 14)
- Re: SSL POODLE (Truly scary SSL 3.0 vuln) Krassimir Tzvetanov (Oct 14)
- Re: SSL POODLE Florian Weimer (Oct 15)
- Re: SSL POODLE Hanno Böck (Oct 15)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: Reed Loden (Oct 14)
- RE: Truly scary SSL 3.0 vuln to be revealed soon: Sona Sarmadi (Oct 15)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: Pierre Schweitzer (Oct 14)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: mancha (Oct 14)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: Krassimir Tzvetanov (Oct 14)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: Ben Lincoln (0E1C7DBB - OSS) (Oct 15)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: Hanno Böck (Oct 15)
- RE: Truly scary SSL 3.0 vuln to be revealed soon: Sona Sarmadi (Oct 16)
- Re: Truly scary SSL 3.0 vuln to be revealed soon: Daniel Kahn Gillmor (Oct 17)
- neuter the poodle (was: Re: Truly scary SSL 3.0 vuln to be revealed soon:) mancha (Oct 17)
- Re: neuter the poodle (was: Re: Truly scary SSL 3.0 vuln to be revealed soon:) Nikos Mavrogiannopoulos (Oct 18)
- Re: Re: neuter the poodle mancha (Oct 18)
- Re: Re: neuter the poodle Nikos Mavrogiannopoulos (Oct 18)