View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0001342||Main CAcert Website||public||2014-12-11 16:37||2014-12-14 11:37|
|Target Version||Fixed in Version|
|Summary||0001342: wiki.cacert.org still offers SSLv3|
As of today and after the update on Dec 1, wiki.cacert.org still offers SSLv3 and therefore is still vulnerable to the POODLE attack. Has this server be forgotten?
Thanks for looking into this.
|Additional Information||- https://www.ssllabs.com/ssltest/analyze.html?d=wiki.cacert.org|
|Tags||No tags attached.|
||This issue seems to be related to 0001341. (Because of missing permissions I cannot enter this relationship in Mantis.)|
||Checking it today shows a very good rating for wiki.cacert.org, it's supporting TLS only. I guess this has been solved meanwhile?|
Yes, I can confirm this for wiki.cacert.org as an external user doing some checks and scans. It seems that the mail of Wytze van der Raay on firstname.lastname@example.org yesterday  was successfull. Although there are still some open issues :-(
I try to close this issue (and I hope it will work).
||Scanning wiki.cacert.org on 14 Dec 2014 caused no further problems.|
|2014-12-11 16:37||Mathias||New Issue|
|2014-12-11 16:38||Mathias||Relationship added||child of 0001241|
|2014-12-11 16:40||Mathias||Note Added: 0005164|
|2014-12-14 10:39||sebix||Note Added: 0005170|
|2014-12-14 11:36||Mathias||Note Added: 0005172|
|2014-12-14 11:37||Mathias||Note Added: 0005173|
|2014-12-14 11:37||Mathias||Status||new => closed|
|2014-12-14 11:37||Mathias||Resolution||open => fixed|