<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: XOS 16.1.3.6 patch 1.8 - Vulnerability SSL Server Has SSLv3 Enabl in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/xos-16-1-3-6-patch-1-8-vulnerability-ssl-server-has-sslv3-enabl/m-p/38962#M8517</link>
    <description>It sounds like you may have already seen our Vulnerability Notice on POODLE.&lt;BR /&gt;
&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000008192" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?n=000008192&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
However, it states "Fix Release(s): 15.6.2 and 15.7.1 and later releases"</description>
    <pubDate>Thu, 06 Apr 2017 18:30:00 GMT</pubDate>
    <dc:creator>Drew_C</dc:creator>
    <dc:date>2017-04-06T18:30:00Z</dc:date>
    <item>
      <title>XOS 16.1.3.6 patch 1.8 - Vulnerability SSL Server Has SSLv3 Enabl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/xos-16-1-3-6-patch-1-8-vulnerability-ssl-server-has-sslv3-enabl/m-p/38961#M8516</link>
      <description>HI, Our customer uses XOS 16.1.3.6 patch 1.8 and during the test he found  out that SSL 3.0 is  an obsolete and insecure protocol. Encryption  in SSL 3.0 uses either the RC4 stream cipher, or a block cipher in CBC mode. RC4 is  known to have biases, and the block cipher in CBC mode is vulnerable to the  POODLE attack.&lt;BR /&gt;
&lt;BR /&gt;
     The SSLv3  protocol is insecure due to the POODLE attack and the weakness of RC4 cipher.    &lt;BR /&gt;
&lt;BR /&gt;
.  Extreme page says about poodle that XOS version higher than 15.3 is patched ,  however SSL v3 is stil availble there , am i right ? How to deactiavte SSLv3 on  this version and use TLS 1.1 or higher ? &lt;BR /&gt;
&lt;BR /&gt;
    Can you elabore more on SSLv3 ? &lt;BR /&gt;
&lt;BR /&gt;
    A. Dembiczak&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Apr 2017 15:21:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/xos-16-1-3-6-patch-1-8-vulnerability-ssl-server-has-sslv3-enabl/m-p/38961#M8516</guid>
      <dc:creator>Arkadiusz_Dembi</dc:creator>
      <dc:date>2017-04-06T15:21:00Z</dc:date>
    </item>
    <item>
      <title>RE: XOS 16.1.3.6 patch 1.8 - Vulnerability SSL Server Has SSLv3 Enabl</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/xos-16-1-3-6-patch-1-8-vulnerability-ssl-server-has-sslv3-enabl/m-p/38962#M8517</link>
      <description>It sounds like you may have already seen our Vulnerability Notice on POODLE.&lt;BR /&gt;
&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?n=000008192" target="_blank" rel="nofollow noreferrer noopener"&gt;https://extremeportal.force.com/ExtrArticleDetail?n=000008192&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
However, it states "Fix Release(s): 15.6.2 and 15.7.1 and later releases"</description>
      <pubDate>Thu, 06 Apr 2017 18:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/xos-16-1-3-6-patch-1-8-vulnerability-ssl-server-has-sslv3-enabl/m-p/38962#M8517</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2017-04-06T18:30:00Z</dc:date>
    </item>
  </channel>
</rss>

