How to resolve the ssl 3 exploit on cpanel
On October 14, 2014, security experts have alerted the general public to a flaw in an obsolete but still used SSL protocol (SSL3). The flaw is more than 15 years old but is still used by modern web browsers and servers.
The "POODLE" (Padding Oracle On Downgraded Legacy Encryption) attack can force a connection to "fallback" to SSL 3.0, where it is then possible to steal cookies, which are small data files that enable persistent access to an online service. If stolen, a cookie could allow an attacker access to someone's Web-based email account, for example.
It's important to know that this flaw is most likely present in all servers and has nothing to do with the cPanel software. However, servers that currently function only because of SSL 3.0 fallback should be updated.
To accomplish this, please follow these steps. This does not appear to affect SSH and FTP services.
====
For Apache:
1) Go to WHM => Service Configuration => Apache Configuration => Include Editor => Pre Main Include
2) Select a version or All Versions
3) Add the following in the text box that appears:
SSLHonorCipherOrder On
SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
4) Press the Update button and rebuild your Apache configuration.
This will disable SSLv3.0 on your server running Apache.
For LiteSpeed:
LiteSpeed has released an update to version 4.2.17. You can force a reinstall by running this:
# /usr/local/lsws/admin/misc/lsup.sh -f -v 4.2.17
1) Go to WHM => Service Configuration => Apache Configuration => Include Editor => Pre Main Include
2) Select a version or All Versions
3) Add the following in the text box that appears:
SSLHonorCipherOrder On
SSLProtocol -All +TLSv1 +TLSv1.1 +TLSv1.2
4) Press the Update button and rebuild your Apache configuration.
This will disable SSLv3.0 on your server running LiteSpeed.
====
For cpsrvd:
1) Go to WHM => Service Configuration => Service Configuration => cPanel Web Services Configuration
2) Change the TLS/SSL Cipher List to:
ALL:-SSLv3:RC4:-SSLv2:!ADH:+HIGH:+MEDIUM:-LOW:-EXP
For Dovecot/Courier:
1) Go to WHM => Service Configuration => Mailserver Configuration
2) Change the SSL Cipher List to:
ALL:-SSLv3:RC4:-SSLv2:!ADH:+HIGH:+MEDIUM:-LOW:-EXP
For Exim:
1) Go to WHM => Service Configuration >> Exim Configuration Manager >> Advanced Editor
2) Change the following in tls_require_ciphers:
ALL:-SSLv3:RC4:-SSLv2:!ADH:+HIGH:+MEDIUM:-LOW:-EXP
Please note that for cpsrvd, Dovecot/Courier, and Exim above, the suggested cipher lists do NOT disable all SSLv3 support, it disables the ciphers which use CBC, so some SSLv3 support is still available.
It is possible to completely disable SSLv3 support on these service ports with the following cipher list:
ALL:!ADH:+HIGH:+MEDIUM:-LOW:-SSLv2:-SSLv3:-EXP
Completely disabling SSLv3 ciphers on the above service ports greatly limits browser compatibility and prevents connections from all but a few modern browsers such as Google Chrome.