โOct-18-2014 01:53 PM
โOct-25-2014 06:15 PM
โOct-25-2014 06:08 PM
wintersun wrote:
Evidently what was not noticed was that the announcements regarding the vulnerability also stated that SSL 3.0 was used by 0.3% of Firefox HTTPS connections. The reason why it is such a low number is that most people have newer computers running newer versions of Firefox and IE.
โOct-25-2014 04:14 PM
โOct-23-2014 06:59 AM
Bill.Satellite wrote:
My up-to-date Firefox browser showed that I was vulnerable so I am not sure you have that information correct. The add-on I mentioned solved that problem.
โOct-23-2014 06:30 AM
bcsdguy wrote:1492 wrote:
All of my browser's indicated they were configured to accept an SSL 3.0 connection including IE 11, Firefox 33, and Chrome 38 which makes them potentially vulnerable. They're now configured to use only TLS for HTTPS connections.
What about chromebooks? Are they in need of reconfiguration?
โOct-23-2014 05:53 AM
1492 wrote:
All of my browser's indicated they were configured to accept an SSL 3.0 connection including IE 11, Firefox 33, and Chrome 38 which makes them potentially vulnerable. They're now configured to use only TLS for HTTPS connections.
โOct-22-2014 09:34 PM
โOct-22-2014 06:05 PM
โOct-22-2014 04:13 PM
โOct-21-2014 10:40 AM
โOct-21-2014 08:37 AM
โOct-21-2014 08:35 AM
1492 wrote:
The Dometic public facing site appears fine. I wonder if it was just a handshake issue? You can run a server test on that site too see what TLS/SSL is supported here.
โOct-21-2014 08:13 AM
โOct-21-2014 06:38 AM
1492 wrote:
The possible downside is that some websites with outdated security may not connect. However, allowing HTTPS connections to sites still using SSL 3.0 could compromise browser security on more secure TLS websites, which have not yet been patched for exploits such as Poodle?