| ||||||||||
Shopping cart software Solutions for online shops and malls | ||||||||||
|
#101
|
|||||||||
|
|||||||||
Re: POODLE vulnerability in SSLv3
I am running 4.6.3 with X-Pay 1.0.6.
bCURL 7.24.0 CURL executable curl 7.15.5 (x86_64-redhat-linux-gnu) libcurl/7.15.5 OpenSSL/0.9.8b zlib/1.2.3 libidn/0.6.5 I applied the XC patches and verified they were working. Then tested the server and found that the vulnerability was indeed there. Called in a ticket to Hostgator who responded with this."I have updated your Apache configuration to disable ssl 2 and ssl 3. As for 1.2 TLs this is not avaiable for your server. As you are on CentOs 5.11." Of course this ended up breaking my X-Payments 1.06. So I contacted them again: "I have disabled the restrictions against SSLv2/3 that were put in place and confirmed the Xpayments page now works correctly. However, you will need to reach out to the XPayments developer for an update to support TLS only connections over HTTPS so that we can put the restrictions back in place for SSLv2/3." I then checked out the X-Payemnts pactches list on the first page of this thread and in the instructions for the 4.6.3 patch is states that I need to be using Payments 2.1.1 (or newer) for the patch.... Is there a patch for the 1.0.6?
__________________
Carl Tice X-Cart 4.6.6 X-Payments 3.0 ReBOOT 3.4.1 PHP 5.6.30 MySQL 5.6.35 Linux 2.6.32-042stab120.18 ionCube PHP Loader v4.7.3 Perl 5.10.1 |
|||||||||
#102
|
|||||||||
|
|||||||||
Re: POODLE vulnerability in SSLv3
> Is there a patch for the 1.0.6?
There is no need to patch X-Payments. It just uses SSL layer provider by the server. If your hosting cannot enable and provide TLS correctly - I advise to use a better hosting provider for your X-Payments or use our hosted plan.
__________________
Sincerely yours, Alex Mulin VP of Business Development for X-Cart X-Payments product manager |
|||||||||
#103
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
In ....ssleay.php does this line need modification, and if so, what? Code:
Thanks.
__________________
X-Cart version 4.0.17 X-Cart version 4.0.18 Web servers = Apache OS = Linux |
|||||||
#104
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
Yes it does need small modification. Please have a look on the DIFF-xcart.diff file in the remove_ssl3-2014-10-30{version}.tgz archive http://forum.x-cart.com/showpost.php?p=379153&postcount=57
__________________
Sincerely yours, Ildar Amankulov Head of Maintenance group |
|||||||
#105
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
Thanks. This is for 4.0.17, and I don't see any files in "Updates and patches" for that version. What version should I use?
__________________
X-Cart version 4.0.17 X-Cart version 4.0.18 Web servers = Apache OS = Linux |
|||||||
#106
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
http://forum.x-cart.com/showpost.php?p=379153&postcount=57 Quote:
__________________
Sincerely yours, Ildar Amankulov Head of Maintenance group |
|||||||
#107
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
One of our sites has been experiencing a UPS problem for some customers (but not all). Even thought it's a 4.0.17 site, commenting out if statements with "ssl3" fixed the problem. See http://forum.x-cart.com/showthread.php?t=70478. So again, I ask, for the file func_https_ssleay.php, how do I modify this line which contains "ssl3": Code:
__________________
X-Cart version 4.0.17 X-Cart version 4.0.18 Web servers = Apache OS = Linux |
|||||||
#108
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
Sorry for the misunderstanding. It seems your https modules have 4.2.x/4.3.x or 4.x.x versions. In this case you have to apply the remove_ssl3-2014-10-30.4.2.3.tgz or remove_ssl3-2014-10-30.4.3.2.tgz or remove_ssl3-2014-10-30.4.x.x.tgz patches. Regarding the netssleay module you have to apply this patch Code:
You can skip the func.https_ssleay.php file modification. By the way it seems the onlinetools.ups.com UPS server still supports SSL3 protocol. https://www.ssllabs.com/ssltest/analyze.html?d=onlinetools.ups.com&s=153.2.228.76& hideResults=on
__________________
Sincerely yours, Ildar Amankulov Head of Maintenance group |
|||||||
|
#109
|
|||||||
|
|||||||
func.https_libcurl.php problems
I'm posting this for posterity, and in case it might help someone else who is on 4.4.2 or similar.
When running the .diff patch, it couldn't patch func.https_libcurl.php When I just replaced my old file with the new one, it wasn't possible to add products to the cart or view the cart. Bad. So I went through the .diff file line by line and found that the only way to make it work was to omit the change: Code:
I also manually changed all instances of ssl3 to tls instead of doing a copy/paste and just changed the 3 to a 1 on the line for Code:
I didn't bother pasting in the // http://curl.haxx.se/libcurl/c/CURLOPT_SSLVERSION.html CURL_SSLVERSION_TLSv1 part since it's just a comment. That got us back up and running along with patching the other files (some of those I also had to do by hand b/c of problems with the .diff files not matching.) Anyhow, I hope that helps someone else out there.
__________________
Current project: 4.4.2 |
|||||||
#110
|
|||||||
|
|||||||
Re: POODLE vulnerability in SSLv3
Quote:
That's interesting about the UPS server. So far, though, we have had no further problems.
__________________
X-Cart version 4.0.17 X-Cart version 4.0.18 Web servers = Apache OS = Linux |
|||||||
|
|
|||
X-Cart forums © 2001-2020
|