SSLv3 (SSL version 3.0) is known to be vulnerable to multiple attacks (POODLE, BEAST, CRIME etc.). SonicWall Threat Team has released signature, Downgraded TLS Traffic, ID 5770, to prevent a server from negotiating an SSLv3 connection when the client proposes higher level protocols like TLS 1.0, 1.1 or 1.2. This article describes how to enable this signature.
NOTE: This signature does not block a connection when the Client proposes and the Server is enabled for SSL 3.0. To block SSL 3.0 completely, refer this article - How to Block SSLv3.0 (SSL version 3.0) connections using App Control Advanced
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Feature/Application:
SSLv3 (SSL version 3.0) is known to be vulnerable to multiple attacks (POODLE, BEAST, CRIME etc.). SonicWall Threat Team has released signature, Downgraded TLS Traffic, ID 5770, to prevent a server from negotiating an SSLv3 connection when the client proposes higher level protocols like TLS 1.0, 1.1 or 1.2. This KB article describes how to enable this signature.
NOTE: This signature does not block a connection when the Client proposes and the Server is enabled for SSL 3.0. To block SSL 3.0 completely, refer this KB article - How to Block SSLv3.0 (SSL version 3.0) connections using App Control Advanced
Procedure:
Enabling Signature ID 5770
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zy.png)
Enabling IPS on zones
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zj.png)
Testing
With this signature enabled, when an SSL client proposes TLS 1.x in its Client Hello and the server responds with SSL 3.0, the response is blocked by SonicWall IPS. The following log message is generated when this signature blocks such traffic:
Navigate to Monitor| Logs | System Logs
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zv.png)
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Feature/Application:
SSLv3 (SSL version 3.0) is known to be vulnerable to multiple attacks (POODLE, BEAST, CRIME etc.). SonicWall Threat Team has released signature, Downgraded TLS Traffic, ID 5770, to prevent a server from negotiating an SSLv3 connection when the client proposes higher level protocols like TLS 1.0, 1.1 or 1.2. This KB article describes how to enable this signature.
NOTE: This signature does not block a connection when the Client proposes and the Server is enabled for SSL 3.0. To block SSL 3.0 completely, refer this KB article - How to Block SSLv3.0 (SSL version 3.0) connections using App Control Advanced
Procedure:
Enabling Signature ID 5770
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zz.png)
Enabling IPS on zones
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9aE.png)
Testing
With this signature enabled, when an SSL client proposes TLS 1.x in its Client Hello and the server responds with SSL 3.0, the response is blocked by SonicWall IPS. The following log message is generated when this signature blocks such traffic:-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zw.png)
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Procedure:
Enabling Signature ID 5770
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zt.png)
Enabling IPS on zones
-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zh.png)
Testing
With this signature enabled, when an SSL client proposes TLS 1.x in its Client Hello and the server responds with SSL 3.0, the response is blocked by SonicWall IPS. The following log message is generated when this signature blocks such traffic:-using-IPS-signatures-kA1VN0000000JAp0AM-0EMVN00000Eo9Zw.png)