Disabling SSLv3 Support to Avoid SSL Poodle Attacks
(Doc ID 1950427.1)
Last updated on DECEMBER 31, 2020
Applies to:Oracle Communications WebRTC Session Controller - Version 7.0.0 to 7.0.0 [Release 7.0.0]
Information in this document applies to any platform.
To disable SSLv3 support to avoid SSL poodle attacks, please enter the 'weblogic.security.SSL.minimumProtocolVersion=TLSv1' system property when starting the managed and admin servers.
It was recently discovered that SSLv3 has security limitations in it, therefore it makes sense that servers should not allow SSL/TLS handshake to agree on using SSLv3 as the underlying protocol. This can be done by applying a system property in the start scripts for the WebRTC Session Controller.
Adding the system property into the start script of your WebRTC Session Controller will reduce the handshake compatibility with client that require SSLv3 or older protocols.
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document