Details and where I ripped most of this from is at: http://askubuntu.com/a/537197
Another reference with detailed explanation of the vulnerability: http://security.stackexchange.com/questions/70719/ssl3-poodle-vulnerability
See if the server is vulnerable:
openssl s_client -connect <server>:<port> -ssl3
If it connects you are vulnerable. If safe, it will respond with handshake failure
.
If you're running Apache, just include the following line in your configuration among the other SSL directives:
SSLProtocol All -SSLv2 -SSLv3
Then check if the new configuration is correct (no typos etc.):
apachectl configtest
And restart the server, e.g.
sudo service apache2 restart
If you're running Nginx, just include the following line in your configuration among the other SSL directives:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
And restart the server, e.g.
sudo service nginx restart
Require constants
and then disable SSLv3 in the server create. See example at https://gist.github.com/3rd-Eden/715522f6950044da45d8