[QFJ-818] SSL3 “POODLE” Vulnerability impact QuickFIXJ (bundle Apache MINA) ? Created: 03/Nov/14 Updated: 22/Dec/15 Resolved: 22/Dec/15 |
|
Status: | Closed |
Project: | QuickFIX/J |
Component/s: | Networking |
Affects Version/s: | 1.5.3 |
Fix Version/s: | None |
Type: | Other | Priority: | Critical |
Reporter: | surachai chatsomsiri | Assignee: | Unassigned |
Resolution: | Incomplete | Votes: | 0 |
Labels: | QuickfixJ, ssl | ||
Environment: |
quickfixj-all-1.5.3.jar |
Description |
Hi Support. According to the links below, seems that any SSL v3 got impact from the POODLE vulnerability.. Could you help me provide information please? 2. The “POODLE” Vulnerability will impact with QuickFIXJ (using Apache MINA) if Yes, Can you provide solution to prevent it? Thank you very much |
Comments |
Comment by Christoph John [ 03/Nov/14 ] |
According to this link http://www.oracle.com/technetwork/java/javase/documentation/cve-2014-3566-2342133.html you could try passing the https.protocols="TLSv1" property to your app. MINA should pick that up since it uses the SSLEngine from the JDK under the hood. There is also the possibility to specify the QFJ configuration EnabledProtocols with a list of supported protocols. But I have not tested that yet. Could you please test that and tell if it worked? |