RE: CVE-2014-3566.
How to Disable SSLv3
Nginx (Debian)
On Nginx configuration file /etc/nginx/nginx.conf
:
server {
listen 443;
ssl on;
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
....
}
Restart Nginx.
# service nginx restart
Apache (Debian)
On Apache configuration file /etc/apache2/httpd.conf
:
<VirtualHost *:443>
....
SSLEngine on
SSLProtocol all -SSLv2 -SSLv3
....
</VirtualHost>
Restart Apache.
# service apache2 restart
Internet Information Services (IIS)
In Windows servers (2003 to 2012 R2) TLS/SSL protocols are controlled by flags in the registry. Open PowerShell as Administrator and run:
PS> & REG.EXE ADD "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server" /v Enabled /t REG_DWORD /d 0 /f
Restart the Windows server.
You may want to disable SSLv2 too if using IIS 7.X:
PS> & REG.EXE ADD "HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server" /v Enabled /t REG_DWORD /d 0 /f