Community discussions

MikroTik App
 
User avatar
normis
MikroTik Support
MikroTik Support
Topic Author
Posts: 26931
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Poodlebleed

Wed Oct 15, 2014 1:25 pm

Before anybody asks, RouterOS is not affected by the Poodlebleed exploit.
 
jarda
Forum Guru
Forum Guru
Posts: 7756
Joined: Mon Oct 22, 2012 4:46 pm

Re: Poodlebleed

Wed Oct 15, 2014 7:19 pm

This is the first time I see such active approach from mikrotik. Keep going forward with this. I appreciate that.
 
User avatar
boen_robot
Forum Guru
Forum Guru
Posts: 2400
Joined: Thu Aug 31, 2006 4:43 pm
Location: europe://Bulgaria/Plovdiv

Re: Poodlebleed

Wed Oct 15, 2014 7:48 pm

I hadn't heard of it, but now that I've seen it, I'm almost wondering how it hasn't been found sooner (like, as soon as SSL 3.0 became an easy to decrypt protocol). I mean, OBVIOUSLY, if you have a control over the network between client and server, you can drop some of the connections. I never knew SSL/TLS tries to make several connections at the handshake. I thought it's one connection with packets back & forth (which would be more secure, but then again, I can also see how legacy applications might be broken with that approach, and thus how clients ended up doing the "downgrade dance").



OK, onto MikroTik...

@normis

When you say MikroTik is not affected, it's not affected because...
1) You have SSL 3.0 (and older) disabled or
2) You use an OpenSSL version with TLS_FALLBACK_SCSV support, and have that enabled
?
 
Ordghio
just joined
Posts: 5
Joined: Fri Oct 17, 2014 11:24 am

Re: Poodlebleed

Fri Oct 17, 2014 11:26 am

What about SSLv3 based SSTP? Is affected?
 
User avatar
normis
MikroTik Support
MikroTik Support
Topic Author
Posts: 26931
Joined: Fri May 28, 2004 11:04 am
Location: Riga, Latvia
Contact:

Re: Poodlebleed

Fri Oct 17, 2014 2:30 pm

What about SSLv3 based SSTP? Is affected?
It only uses TLS and that is not affected.