You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How do I disable SSLv3 in Safari (OSX & iOS)

Hi All,


So following this morning's Google announcement on the SSLv3 vulnerability, I tried disabling it on the client side on my various systems and browser. On OSX, I managed to do it for Firefox and Chrome but not for Safari. On iOS I didn't manage at all.


Any clue on how it can be done?


FWIW:

- Disabling SSLv3 in Firefox:

Open about:config, find security.tls.version.min and set the value to 1. Then restart your browser to drop any open SSL connections.


- Disabling SSLv3 in Chrome:

Launch Chrome using an AppleScript that contains the following

do shell script "open -a /Applications/Google\\ Chrome.app --args --ssl-version-min=tls1"


- Checking client-side vulnerability:

https://www.poodletest.com/


- Checking server-side vulnerability:

http://www.poodlebleed.com


Cheers,

Alex

Posted on Oct 15, 2014 3:27 AM

Reply
74 replies

Jan 20, 2015 5:40 PM in response to Long Wu Yuan

Your count of 2:1 is wrong.

WHAT?! Ive nevur ben rong n meye lief!!!


Seriously, until Apple (or some one else) makes it clear that Safari is immune, I suppose the only safe surfing for Mac users is Firefox? At least for any site that still uses SSL3. I have not yet heard from my credit union as to whether Safari will be acceptable/usable or not, when they cease using SSL3. I assume Safari will simply use the newer technique, TSL, I think. If tat site doesn't use SSLx, certainly Safari won't either.

Jan 20, 2015 8:45 PM in response to xairbusdriver

xairbusdriver wrote:

Seriously, until Apple (or some one else) makes it clear that Safari is immune, I suppose the only safe surfing for Mac users is Firefox?

Apple has not retracted anything from their previous statement on this in About Security Update 2014-005 and the 10.10.1 Update announcements. I realize that others have stated this is not true, as I said earlier in this discussion, when I called those statements to the attention of Apple Product Security they informed me on 12/19/2014 "The Safari behavior you describe is as intended."

I assume Safari will simply use the newer technique, TSL, I think.

It's TLS 1.2 and if you check the Qualys SSL web site again, in the top box you will see that it does use it and has for many years now.

Jan 20, 2015 10:14 PM in response to MadMacs0

My patched laptop Safari ;

User uploaded file

I can connect to test using sslv3 :

$ openssl s_client -connect www.poodletest.com:443 -ssl3

CONNECTED(00000003)

depth=1 /C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Class 2 Primary Intermediate Server CA

verify error:num=20:unable to get local issuer certificate

verify return:0

---

Certificate chain

0 s:/C=US/ST=Florida/L=Jacksonville/O=DShield Inc./CN=www.poodletest.com/emailAddress=jullrich@euclidian.com

i:/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Class 2 Primary Intermediate Server CA

1 s:/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Class 2 Primary Intermediate Server CA

i:/C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Certification Authority

---

Server certificate

-----BEGIN CERTIFICATE-----

MIIHzTCCBrWgAwIBAgIDApiOMA0GCSqGSIb3DQEBCwUAMIGMMQswCQYDVQQGEwJJ

Jan 20, 2015 10:22 PM in response to Long Wu Yuan

Which is exactly what others quoted earlier here have shown, but can you exploit it? That's what's important here. There are probably hundreds of vulnerabilities in the current OS X 10.10.1 system, but they are only a threat if you have the ability to exploit them. Nowhere has Apple said you can't connect. They only said "This issue was addressed by disabling CBC cipher suites when TLS connection attempts fail." If the cipher suites are actually disabled, then any connection using one of them would seem to be moot.

Jan 20, 2015 11:36 PM in response to Long Wu Yuan

Long Wu Yuan wrote:


So use Safari and maximize the risk of losing money/happiness/both. Or not use Safari I guess.

Sounds about right.


First I want to make it clear that I'm not defending Apple, just trying to present the facts that I've been able to keep track of. It's really up to the individual to be comfortable using any software they have based on the best information available. I would never take a position of trying to tell an individual what to do in cases like this. They need to make up their own minds.


What's a bit more of an issue is that there may be some financial institutions out there that will make the decision for you if they choose to block use of Safari in carrying out transactions. I suppose that's up to the institutions' IT departments to decide, but it would be nice if their industry was able to satisfy themselves through correspondence with Apple and their own testing what the correct policy should be.


There is a similar discussion going on in the forum concerning the NTP flaw that Apple claims to have patched. Just as Apple decided not to take the experts advise to disable SSLv3 in Safari, they decided not to adopt the patched version 4.2.8 of ntpd and came up with their own solution. I would guess that was probably because they started work on a fix before v4.2.8 was made available and rather than go through testing of 4.2.8 rolled out with their own fix. Now it seems the credit card POS industry has decided that any OS which does not have ntpd 4.2.8 is no longer in compliance of their PCI standards and therefore cannot accept credit card payments using OS X computers. I suppose that was the easiest way to test for compliance and based on what they were being told by the IT security community, rather than devise a test for the vulnerability itself.


They have a history of doing similar things. I recall may years ago when a major flaw was found in bzip2 which was patched by developers with a new version. Apple left the old version in place and patched something else to overcome the vulnerability, creating some concern among knowledgable users. Again, Apple Product Security responded to me that they were able to take a different route to blocking any exploit. There are similar examples involving Java updates prior to Oracle's finally stepping up with Java SE 7.

How do I disable SSLv3 in Safari (OSX & iOS)

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.