How to monitor RHDS for incoming SSLv3 connections before disabling SSLv3?
Issue
- In our RHDS environments we currently have SSLv3 enabled in our dn: cn=encryption,cn=config (nsSSL3: on) and to phase out SSLv3 traffic we want to work towards turning it off
- However we have many more smaller apps (like web apps) of ourselves and clients that might not work with TLSv1
- At the moment we cannot see in our access logs what specific protocol is used when an encrypted connection is established. We only see this in our logs:
SSL connection from [IP] tp [IP]
SSL 128-bit AES
- Is it possible to monitor in the logs if a connection is a proven SSLv3 connection
Environment
- Red Hat Directory Server (RHDS) 9
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.