Server is disabling SSLv3 due to the POODLE security violation (CVE-2014-3566).
This vulnerability was recently made known across the IT industry and puts any communications using SSLv3 at risk. Vendors and security experts have determined that removing SSLv3 capabilities from systems, and relying instead on the TLS protocol, is the only effective measure for remediating the vulnerability.
For more information, refer to: http://nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3566
https://auctionpro.co.kr/?p=3682
ubuntu TLSv1.2 (14.0 버전 이후 적용되고 있습니다)
cat /etc/issue Ubuntu 14.04 LTS \n \l $ apt-cache policy openssl openssl: Installed: 1.0.1f-1ubuntu2 Candidate: 1.0.1f-1ubuntu2 Version table: *** 1.0.1f-1ubuntu2 0 500 http://us.archive.ubuntu.com/ubuntu/ trusty/main amd64 Packages 100 /var/lib/dpkg/status $ openssl ciphers -v 'TLSv1.2' | head -4 ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384 ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384
-Windows Server
The Microsoft® Windows Server™ 2003 operating system supports Schannel, an implementation of three protocols (TLS 1.0, SSL 3.0 & SSL 2.0) that provide network security for applications and services.
™ 2003 운영 체제 마이크로 소프트 윈도우 서버 응용 프로그램과 서비스에 대한 네트워크 보안을 제공 샤넬, 세 가지 프로토콜의 구현 (TLS 1.0, SSL 3.0 및 SSL 2.0)를 지원합니다.