How to monitor RHDS for incoming SSLv3 connections before disabling SSLv3?

Solution Unverified - Updated -

Issue

  • In our RHDS environments we currently have SSLv3 enabled in our dn: cn=encryption,cn=config (nsSSL3: on) and to phase out SSLv3 traffic we want to work towards turning it off
  • However we have many more smaller apps (like web apps) of ourselves and clients that might not work with TLSv1
  • At the moment we cannot see in our access logs what specific protocol is used when an encrypted connection is established. We only see this in our logs:
SSL connection from [IP] tp [IP]
SSL 128-bit AES
  • Is it possible to monitor in the logs if a connection is a proven SSLv3 connection

Environment

  • Red Hat Directory Server (RHDS) 9

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content