2016-01-15 - OpenSSL Vulnerabilities (SLOTH)¶
A detailed description of this issue can be seen in the following blog posting: http://www.mitls.org/pages/attacks/SLOTH
CVE-2015-7575 - TLS 1.2 Transcipt Collision attacks against MD5 in key exchange protocol (SLOTH)
xCAT uses OpenSSL for client-server communication but does not ship it.
It is highly recommended to keep your OpenSSL levels up-to-date with the indicated versions in the security bulletins to prevent any potential security threats. Obtain the updated software packages from your Operating system distribution channels.
Disable MD5 authentication in the cipher list using the site table keyword
- Check if MD5 is already disabled:
tabdump site | grep xcatssl
- If nothing is set, add
ALL:!MD5to the cipher list:
chtab key=xcatsslciphers site.value='ALL:!MD5'
- Restart xcat:
service xcatd restart