FREAK/POODLE Vulnerability

FREAK/POODLE Vulnerability

I sent three or so emails to support (Ticket ID 7230970) and never got a reply so I did some Google'n to figure out how to downgrade the SSL version and disable compromised ciphers.  Putting it out on this forum for those who need assistance.

Both edits take place on the connector tag and is located in the server.xml file.  This allowed me to raise our "F for failure" on SSL tests to a "B".

Do note your downgrading your SSL TLS version so you wont be running the latest but you're not compromised either.

Test's that I and corporate security used:  https://www.ssllabs.com/ssltest/

POODLE Workaround:  https://forums.manageengine.com/topic/protection-against-the-poodle-sslv3-vulnerability

FREAK Workaround:  https://forums.manageengine.com/topic/freak-vulnerability




                New to ADSelfService Plus?