{"id":6492,"date":"2014-11-30T07:29:11","date_gmt":"2014-11-30T07:29:11","guid":{"rendered":"https:\/\/dev.railscarma.com\/poodle-ssl-security-threat-explored\/"},"modified":"2022-08-30T07:32:51","modified_gmt":"2022-08-30T07:32:51","slug":"esplorata-la-minaccia-alla-sicurezza-poodle-ssl-2","status":"publish","type":"post","link":"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/esplorata-la-minaccia-alla-sicurezza-poodle-ssl-2\/","title":{"rendered":"Barboncino: esplorata la minaccia alla sicurezza SSL"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"6492\" class=\"elementor elementor-6492\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3800d95d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3800d95d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69f90962\" data-id=\"69f90962\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-343fe574 elementor-widget elementor-widget-text-editor\" data-id=\"343fe574\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: justify;\"><strong>Barboncino<\/strong>&nbsp;\u00e8 una razza di cane con le zampe che ricordano lo zucchero filato. \u00c8 intelligente e un punto fermo regolare nelle mostre canine. Anche i cani pi\u00f9 amichevoli hanno la propensione a mordere. Ora vediamo tutti i tipi di avvisi di sicurezza e snafus come heartbleed e shell shock!!! L&#039;ultimo arrivato \u00e8 POODLE.<\/p>\n<p style=\"text-align: justify;\">\n<\/p><p style=\"text-align: justify;\">Tutto \u00e8 iniziato quando un team di Google ha sviluppato e testato un attacco denominato <strong>BARBONCINO<\/strong>&nbsp;(Padding Oracle On Downgraded Legacy Encryption) che ha scoperto una vulnerabilit\u00e0 nel protocollo Secure Sockets Layer (SSL) versione 3 o in breve SSLv3.<\/p>\n<p style=\"text-align: justify;\">SSLv3 \u00e8 una crittografia obsoleta ma ancora utilizzata sia nei browser Web pi\u00f9 vecchi che in quelli nuovi. (SSLv3 \u00e8 un protocollo vecchio di 18 anni che \u00e8 stato sostituito dal protocollo TLS)<\/p>\n<p style=\"text-align: justify;\">POODLE tenta di forzare la connessione tra il tuo browser web e il server per effettuare il downgrade a SSLv3. L&#039;attacco POODLE sfrutta la funzionalit\u00e0 di negoziazione della versione del protocollo incorporata in SSL\/TLS per forzare l&#039;uso di SSL 3.0 e quindi utilizza questa nuova vulnerabilit\u00e0 per decrittografare il contenuto selezionato all&#039;interno della sessione SSL. La decrittazione viene eseguita byte per byte e generer\u00e0 un gran numero di connessioni tra il client e il server.<\/p>\n<p style=\"text-align: justify;\"><strong>Come lo fanno?<\/strong><\/p>\n<p style=\"text-align: justify;\">Un utente malintenzionato pu\u00f2 eseguire un agente JavaScript su un sito Web per fare in modo che il browser della vittima invii cookie con richieste HTTPS&nbsp;<b>https:\/\/xyz.com<\/b>, intercettare e modificare i record SSL inviati dal browser in modo tale che ci sia una possibilit\u00e0 non trascurabile che xyz.com accetti il record modificato. Se il record modificato viene accettato, l&#039;aggressore pu\u00f2 decrittografare un byte dei cookie. Biscotti<\/p>\n<p style=\"text-align: justify;\">TLS 1.0 e le versioni pi\u00f9 recenti eseguono una convalida pi\u00f9 solida dei dati decrittografati e come tali non sono soggetti allo stesso problema. Ma per SSLv3 non esiste una soluzione.<\/p>\n<p style=\"text-align: justify;\"><strong>Quanto \u00e8 grave tutto questo e che effetto ha su di te?<\/strong><\/p>\n<p style=\"text-align: justify;\">Le connessioni sicure utilizzano principalmente TLS (il successore di SSL), la maggior parte degli utenti diventa vulnerabile perch\u00e9 i browser Web e i server verranno sottoposti a downgrade a SSLv3 se si verificano problemi nella negoziazione di una sessione TLS. La maggior parte delle implementazioni SSL\/TLS rimangono retrocompatibili con SSL 3.0 per interagire con i sistemi legacy nell&#039;interesse di un&#039;esperienza utente fluida. Un utente malintenzionato che esegue un attacco man-in-the-middle potrebbe attivare un downgrade del protocollo a SSLv3 e sfruttare questa vulnerabilit\u00e0 per decrittografare un sottoinsieme della comunicazione crittografata ed estrarne informazioni. La vulnerabilit\u00e0 POODLE funziona solo se il browser del client e la connessione del server supportano entrambi SSLv3.<\/p>\n<p style=\"text-align: justify;\"><strong>Come verificare se il mio browser \u00e8 vulnerabile?<\/strong><\/p>\n<p style=\"text-align: justify;\">Vai al sito web poodletest.com per testarlo. Se vedi un barboncino, sei vulnerabile. Se vedi uno Springfield Terrier, sei al sicuro.<\/p>\n<p style=\"text-align: justify;\">http:\/\/www.bolet.org\/TestSSLServer\/<br>http:\/\/code.google.com\/p\/sslaudit\/<\/p>\n<p style=\"text-align: justify;\"><strong>Cosa posso fare per evitare questo? Vaccino per barboncini?<\/strong><\/p>\n<p style=\"text-align: justify;\">Come utente finale, disabilita il supporto SSLv3 nel tuo browser web. Se \u00e8 disabilitato, POODLE NON potr\u00e0 effettuare il downgrade del tuo browser ad esso. Per incoraggiare le migliori pratiche di sicurezza, consiglio vivamente di utilizzare la versione pi\u00f9 alta di TLS. Per la maggior parte dei browser dovrebbe essere TLS 1.2.<strong><strong><br><\/strong><\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Ci\u00f2 influenzer\u00e0 la mia esperienza di navigazione?<strong><br><\/strong><\/strong><\/p>\n<p style=\"text-align: justify;\">Ci\u00f2 avr\u00e0 un impatto su alcuni browser meno recenti. I siti Web che hanno gi\u00e0 interrotto il supporto per SSLv3 diventeranno incompatibili con i browser e i sistemi operativi meno recenti. I vecchi browser come Internet Explorer 6 in esecuzione su Windows XP o versioni precedenti vedranno un errore di connessione SSL.<\/p>\n<p style=\"text-align: justify;\"><strong>SSLv3<\/strong>&nbsp;sar\u00e0 disabilitato per impostazione predefinita nelle versioni future di molti browser Web.<\/p>\n<p style=\"text-align: justify;\"><strong>Come disabilitarlo sul server?<\/strong><\/p>\n<p style=\"text-align: justify;\">CloudFlare ha annunciato che disabiliter\u00e0 SSLv3 per impostazione predefinita dai suoi server. Lo stesso hanno fatto molti fornitori di servizi.<\/p>\n<p style=\"text-align: justify;\">Se stai utilizzando Apache, apporta semplicemente questa modifica alla tua configurazione tra le altre direttive SSL:<\/p>\n<p style=\"text-align: justify;\">Protocollo SSL Tutti -SSLv2 -SSLv3<\/p>\n<p style=\"text-align: justify;\">Ci\u00f2 disabilita le versioni 2 e 3 del protocollo SSL.<\/p>\n<p style=\"text-align: justify;\"><strong>Come possono gli sviluppatori impedirlo?<\/strong><strong><strong><br><\/strong><\/strong><\/p>\n<p style=\"text-align: justify;\"><b>.NETTO<\/b><\/p>\n<p style=\"text-align: justify;\">Utilizzare la propriet\u00e0 SecurityProtocol per abilitare TLS.<\/p>\n<p style=\"text-align: justify;\">Per dettagli su come utilizzare la propriet\u00e0 SecurityProtocol, visitare:<\/p>\n<p style=\"text-align: justify;\">http:\/\/msdn.microsoft.com\/en-us\/library\/system.net.servicepointmanager.securityprotocol(v=vs.110).as&#8230;<\/p>\n<p style=\"text-align: justify;\">http:\/\/msdn.microsoft.com\/en-us\/library\/system.net.securityprotocoltype(v=vs.110).aspx<\/p>\n<p style=\"text-align: justify;\">Ad esempio, per forzare TLS 1.2 in un&#039;implementazione C# .NET, dovresti utilizzare:<\/p>\n<p style=\"text-align: justify;\">System.Net.ServicePointManager.SecurityProtocol = System.Net.SecurityProtocolType.Tls12;<\/p>\n<p style=\"text-align: justify;\"><b>GIAVA<\/b><\/p>\n<p style=\"text-align: justify;\">NOTA: TLS 1.2 \u00e8 stato supportato per la prima volta in JDK 7 e sar\u00e0 predefinito in JDK 8: https:\/\/blogs.oracle.com\/java-platform-group\/entry\/java_8_will_use_tls<\/p>\n<p style=\"text-align: justify;\"><strong>Utilizza il metodo SSLContext.getInstance per abilitare TLS.<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Per dettagli su come utilizzare il metodo SSLContext.getInstance, visitare:<\/strong><\/p>\n<p style=\"text-align: justify;\">http:\/\/docs.oracle.com\/javase\/7\/docs\/api\/javax\/net\/ssl\/SSLContext.html#getInstance(java.lang.String)<\/p>\n<p style=\"text-align: justify;\">http:\/\/docs.oracle.com\/javase\/7\/docs\/api\/javax\/net\/ssl\/SSLContext.html#getInstance(java.lang.String,&#8230;<\/p>\n<p style=\"text-align: justify;\">http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/security\/StandardNames.html#SSLContext<\/p>\n<p style=\"text-align: justify;\">Ad esempio, per utilizzare il provider del livello di sicurezza predefinito per abilitare TLS, dovresti utilizzare:<\/p>\n<p style=\"text-align: justify;\">oggetto = SSLContext.getInstance(&quot;TLS&quot;);<\/p>\n<p style=\"text-align: justify;\"><strong>Per forzare TLS 1.2 durante l&#039;utilizzo di Java Secure Socket Extension (JSSE) di Sun, dovresti utilizzare:<\/strong><\/p>\n<p style=\"text-align: justify;\">oggetto = SSLConnect.getInstance(&quot;TLSv1.2&quot;, &quot;SunJSEE&quot;);<\/p>\n<p style=\"text-align: justify;\"><b>arricciare<\/b><strong><strong><br><\/strong><\/strong><\/p>\n<p style=\"text-align: justify;\">Utilizza l&#039;opzione CURLOPT_SSLVERSION per abilitare TLS.<\/p>\n<p style=\"text-align: justify;\">Per dettagli su come utilizzare l&#039;opzione CURLOPT_SSLVERSION, visitare:<\/p>\n<p style=\"text-align: justify;\">http:\/\/curl.haxx.se\/libcurl\/c\/CURLOPT_SSLVERSION.html<\/p>\n<p style=\"text-align: justify;\">Ad esempio, per forzare cURL a utilizzare TLS 1.0 o versione successiva, dovresti utilizzare:<\/p>\n<p style=\"text-align: justify;\">C\/C++\/C#:<\/p>\n<p style=\"text-align: justify;\">curl_easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1);<\/p>\n<p style=\"text-align: justify;\">PHP:<\/p>\n<p style=\"text-align: justify;\">curl_setopt($curl_request, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1);<\/p>\n<p style=\"text-align: justify;\">In cURL 7.34.0 o successivo, per forzare TLS 1.2, dovresti utilizzare:<\/p>\n<p style=\"text-align: justify;\">C\/C++\/C#:<\/p>\n<p style=\"text-align: justify;\">curl_easy_setopt(curl, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1_2);<\/p>\n<p style=\"text-align: justify;\">PHP:<\/p>\n<p style=\"text-align: justify;\">curl_setopt($curl_request, CURLOPT_SSLVERSION, CURL_SSLVERSION_TLSv1_2);<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.railscarma.com\/it\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>RailsCarma<\/strong><\/a> Il team si \u00e8 preparato in modalit\u00e0 di difesa totale per tappare tutti i buchi lasciati aperti da questa vulnerabilit\u00e0. Abbiamo applicato le patch necessarie alle nostre applicazioni per disabilitare le opzioni SSL\/TLS non sicure.<\/p>\n<h3 style=\"text-align: justify;\"><strong>Riferimenti<\/strong><\/h3>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/community.developer.authorize.net\/t5\/The-Authorize-Net-Developer-Blog\/Important-POODLE-Information-Updated\/ba-p\/48163\">http:\/\/community.developer.authorize.net\/t5\/The-Authorize-Net-Developer-Blog\/Important-POODLE-Information-Updated\/ba-p\/48163<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/arstechnica.com\/security\/2014\/10\/ssl-broken-again-in-poodle-attack\/\">http:\/\/arstechnica.com\/security\/2014\/10\/ssl-broken-again-in-poodle-attack\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/zmap.io\/sslv3\/\">https:\/\/zmap.io\/sslv3\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.imperialviolet.org\/2014\/10\/14\/poodle.html\">https:\/\/www.imperialviolet.org\/2014\/10\/14\/poodle.html<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/blog.cryptographyengineering.com\/2014\/10\/attack-of-week-poodle.html\">http:\/\/blog.cryptographyengineering.com\/2014\/10\/attack-of-week-poodle.html<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/blog.mozilla.org\/security\/2014\/10\/14\/the-poodle-attack-and-the-end-of-ssl-3-0\/\">https:\/\/blog.mozilla.org\/security\/2014\/10\/14\/the-poodle-attack-and-the-end-of-ssl-3-0\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.theregister.co.uk\/2014\/10\/16\/poodle_analysis\/\">http:\/\/www.theregister.co.uk\/2014\/10\/16\/poodle_analysis\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.theregister.co.uk\/2014\/10\/14\/google_drops_ssl_30_poodle_vulnerability\/\">http:\/\/www.theregister.co.uk\/2014\/10\/14\/google_drops_ssl_30_poodle_vulnerability\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.pcworld.com\/article\/2834015\/security-experts-warn-of-poodle-attack-against-ssl-30.html\">http:\/\/www.pcworld.com\/article\/2834015\/security-experts-warn-of-poodle-attack-against-ssl-30.html<\/a><\/p>\n<p style=\"text-align: justify;\">http:\/\/www.alertlogic.com\/blog\/poodle-man-middle-attack-sslv3\/<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-290A\">https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-290A<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf\">https:\/\/www.openssl.org\/~bodo\/ssl-poodle.pdf<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/www.makeuseof.com\/tag\/stop-poodle-from-biting-your-browser\/\">http:\/\/www.makeuseof.com\/tag\/stop-poodle-from-biting-your-browser\/<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/community.qualys.com\/blogs\/securitylabs\/2014\/10\/15\/ssl-3-is-dead-killed-by-the-poodle-attack\">https:\/\/community.qualys.com\/blogs\/securitylabs\/2014\/10\/15\/ssl-3-is-dead-killed-by-the-poodle-attack<\/a><\/p>\n<h3 style=\"text-align: justify;\"><\/h3>\n<h3 style=\"text-align: justify;\"><strong>Disabilitare il barboncino<\/strong><\/h3>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.linode.com\/docs\/security\/security-patches\/disabling-sslv3-for-poodle\">https:\/\/www.linode.com\/docs\/security\/security-patches\/disabling-sslv3-for-poodle<\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"http:\/\/askubuntu.com\/questions\/537196\/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566\">http:\/\/askubuntu.com\/questions\/537196\/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566<\/a><\/p>\n<p><a href=\"\/it\/contattaci\/\">Mettiti in contatto con noi.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-18abb3a8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18abb3a8\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20ff2b60\" data-id=\"20ff2b60\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-738ca7ed elementor-widget elementor-widget-heading\" data-id=\"738ca7ed\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Iscriviti per gli ultimi aggiornamenti<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ca92304 elementor-widget elementor-widget-shortcode\" data-id=\"3ca92304\" data-element_type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t\t\t\t<script type=\"text\/javascript\">\n\t\t\t\t\t\tvar gCaptchaSibWidget;\n                        var onloadSibCallbackInvisible = function () {\n\n                            var element = document.getElementsByClassName('sib-default-btn');\n                            var countInvisible = 0;\n                            var indexArray = [];\n                            jQuery('.sib-default-btn').each(function (index, el) {\n                                if ((jQuery(el).attr('id') == \"invisible\")) {\n                                    indexArray[countInvisible] = index;\n                                    countInvisible++\n                                }\n                            });\n\n                            jQuery('.invi-recaptcha').each(function (index, el) {\n                                grecaptcha.render(element[indexArray[index]], {\n                                    'sitekey': jQuery(el).attr('data-sitekey'),\n                                    'callback': sibVerifyCallback,\n                                });\n                            });\n                        };\n\t\t\t\t\t<\/script>\n\t\t\t\t\t                <script src=\"https:\/\/www.google.com\/recaptcha\/api.js?onload=onloadSibCallbackInvisible&render=explicit\" async defer><\/script>\n\t\t\t\t\n\t\t\t<form id=\"sib_signup_form_1\" method=\"post\" class=\"sib_signup_form\" action=\"\">\n\t\t\t\t<div class=\"sib_loader\" style=\"display:none;\"><img\n\t\t\t\t\t\t\tsrc=\"https:\/\/www.railscarma.com\/wp-includes\/images\/spinner.gif\" alt=\"caricatore\"><\/div>\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_action\" value=\"subscribe_form_submit\">\n\t\t\t\t<input type=\"hidden\" name=\"sib_form_id\" value=\"1\">\n                <input type=\"hidden\" name=\"sib_form_alert_notice\" value=\"Please fill out this field\">\n                <input type=\"hidden\" name=\"sib_form_invalid_email_notice\" value=\"Your email address is invalid\">\n                <input type=\"hidden\" name=\"sib_security\" value=\"d7f7626ab9\">\n\t\t\t\t<div class=\"sib_signup_box_inside_1\">\n\t\t\t\t\t<div style=\"\/*display:none*\/\" class=\"sib_msg_disp\">\n\t\t\t\t\t<\/div>\n                                            <div id=\"sib_captcha_invisible\" class=\"invi-recaptcha\" data-sitekey=\"6LdikOAaAAAAAJ6SWrrKVQrtw7TQpQAEnv0HS0G3\"><\/div>\n                    \t\t\t\t\t<p class=\"sib-email-area\">\r\n    <label class=\"sib-email-area\"><\/label>\r\n    <input type=\"email\" class=\"sib-email-area\" name=\"email\" required=\"required\" placeholder=\"Indirizzo e-mail\">\r\n<\/p>\r\n<p class=\"sib-NAME-area\">\r\n    <label class=\"sib-NAME-area\"><\/label>\r\n    <input type=\"text\" class=\"sib-NAME-area\" name=\"NAME\" placeholder=\"Nome\">\r\n<\/p>\r\n<p>\r\n    <input type=\"submit\" id=\"invisible\" class=\"sib-default-btn\" value=\"sottoscrivi\">\r\n<\/p>\t\t\t\t<\/div>\n\t\t\t<input type=\"hidden\" name=\"trp-form-language\" value=\"it\"\/><\/form>\n\t\t\t<style>\n\t\t\t\tform#sib_signup_form_1 p.sib-alert-message {\n    padding: 6px 12px;\n    margin-bottom: 20px;\n    border: 1px solid transparent;\n    border-radius: 4px;\n    -webkit-box-sizing: border-box;\n    -moz-box-sizing: border-box;\n    box-sizing: border-box;\n}\nform#sib_signup_form_1 p.sib-alert-message-error {\n    background-color: #f2dede;\n    border-color: #ebccd1;\n    color: #a94442;\n}\nform#sib_signup_form_1 p.sib-alert-message-success {\n    background-color: #dff0d8;\n    border-color: #d6e9c6;\n    color: #3c763d;\n}\nform#sib_signup_form_1 p.sib-alert-message-warning {\n    background-color: #fcf8e3;\n    border-color: #faebcc;\n    color: #8a6d3b;\n}\n\t\t\t<\/style>\n\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t  <div class=\"related-post slider\">\r\n        <div class=\"headline\">Articoli correlati<\/div>\r\n    <div class=\"post-list owl-carousel\">\r\n\r\n            <div class=\"item\">\r\n            <div class=\"thumb post_thumb\">\r\n    <a  title=\"Gemma Kaminari\" href=\"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/gemma-di-kaminari\/?related_post_from=37277\">\r\n\r\n      <img decoding=\"async\" width=\"800\" height=\"300\" src=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2023\/04\/kaminari-gem.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"gemma di Kaminari\" srcset=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2023\/04\/kaminari-gem.jpg 800w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2023\/04\/kaminari-gem-300x113.jpg 300w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2023\/04\/kaminari-gem-768x288.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\r\n\r\n    <\/a>\r\n  <\/div>\r\n\r\n  <a class=\"title post_title\"  title=\"Gemma Kaminari\" href=\"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/gemma-di-kaminari\/?related_post_from=37277\">\r\n        Gemma Kaminari  <\/a>\r\n\r\n        <\/div>\r\n              <div class=\"item\">\r\n            <div class=\"thumb post_thumb\">\r\n    <a  title=\"Perch\u00e9 assumere sviluppatori Ruby on Rails nel 2026?\" href=\"https:\/\/www.railscarma.com\/it\/blog\/roro\/perche-assumere-sviluppatori-di-ruby-on-rails\/?related_post_from=30627\">\r\n\r\n      <img decoding=\"async\" width=\"800\" height=\"300\" src=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2019\/01\/why-to-hire-ruby-on-rails-developers-in-2022.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"perch\u00e9 assumere sviluppatori di Ruby on Rails nel 2022\" srcset=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2019\/01\/why-to-hire-ruby-on-rails-developers-in-2022.jpg 800w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2019\/01\/why-to-hire-ruby-on-rails-developers-in-2022-300x113.jpg 300w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2019\/01\/why-to-hire-ruby-on-rails-developers-in-2022-768x288.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\r\n\r\n    <\/a>\r\n  <\/div>\r\n\r\n  <a class=\"title post_title\"  title=\"Perch\u00e9 assumere sviluppatori Ruby on Rails nel 2026?\" href=\"https:\/\/www.railscarma.com\/it\/blog\/roro\/perche-assumere-sviluppatori-di-ruby-on-rails\/?related_post_from=30627\">\r\n        Perch\u00e9 assumere sviluppatori Ruby on Rails nel 2026?  <\/a>\r\n\r\n        <\/div>\r\n              <div class=\"item\">\r\n            <div class=\"thumb post_thumb\">\r\n    <a  title=\"Importanza dell&#039;architettura software nello sviluppo di software aziendale\" href=\"https:\/\/www.railscarma.com\/it\/blog\/roro\/importanza-dellarchitettura-software-nello-sviluppo-di-software-aziendale\/?related_post_from=36250\">\r\n\r\n      <img decoding=\"async\" width=\"800\" height=\"300\" src=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/06\/Importance-of-Software-Architecture-in-enterprise-software-development.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"Importanza dell&#039;architettura software nello sviluppo di software aziendale\" srcset=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/06\/Importance-of-Software-Architecture-in-enterprise-software-development.jpg 800w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/06\/Importance-of-Software-Architecture-in-enterprise-software-development-300x113.jpg 300w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/06\/Importance-of-Software-Architecture-in-enterprise-software-development-768x288.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\r\n\r\n    <\/a>\r\n  <\/div>\r\n\r\n  <a class=\"title post_title\"  title=\"Importanza dell&#039;architettura software nello sviluppo di software aziendale\" href=\"https:\/\/www.railscarma.com\/it\/blog\/roro\/importanza-dellarchitettura-software-nello-sviluppo-di-software-aziendale\/?related_post_from=36250\">\r\n        Importanza dell&#039;architettura software nello sviluppo di software aziendale  <\/a>\r\n\r\n        <\/div>\r\n              <div class=\"item\">\r\n            <div class=\"thumb post_thumb\">\r\n    <a  title=\"Ruby IDE: i migliori IDE per lo sviluppo di Ruby on Rails\" href=\"https:\/\/www.railscarma.com\/it\/blog\/roro\/ruby-ide-le-migliori-idee-per-lo-sviluppo-di-ruby-on-rails\/?related_post_from=36125\">\r\n\r\n      <img decoding=\"async\" width=\"800\" height=\"300\" src=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/01\/BEST-IDES-FOR-RUBY-ON-RAILS-DEVELOPMENT.jpg\" class=\"attachment-full size-full wp-post-image\" alt=\"LE MIGLIORI IDEE PER LO SVILUPPO DI RUBY ON RAILS\" srcset=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/01\/BEST-IDES-FOR-RUBY-ON-RAILS-DEVELOPMENT.jpg 800w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/01\/BEST-IDES-FOR-RUBY-ON-RAILS-DEVELOPMENT-300x113.jpg 300w, https:\/\/www.railscarma.com\/wp-content\/uploads\/2022\/01\/BEST-IDES-FOR-RUBY-ON-RAILS-DEVELOPMENT-768x288.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\r\n\r\n    <\/a>\r\n  <\/div>\r\n\r\n  <a class=\"title post_title\"  title=\"Ruby IDE: i migliori IDE per lo sviluppo di Ruby on Rails\" href=\"https:\/\/www.railscarma.com\/it\/blog\/roro\/ruby-ide-le-migliori-idee-per-lo-sviluppo-di-ruby-on-rails\/?related_post_from=36125\">\r\n        Ruby IDE: i migliori IDE per lo sviluppo di Ruby on Rails  <\/a>\r\n\r\n        <\/div>\r\n      \r\n  <\/div>\r\n\r\n  <script>\r\n      <\/script>\r\n  <style>\r\n    .related-post {}\r\n\r\n    .related-post .post-list {\r\n      text-align: left;\r\n          }\r\n\r\n    .related-post .post-list .item {\r\n      margin: 10px;\r\n      padding: 10px;\r\n          }\r\n\r\n    .related-post .headline {\r\n      font-size: 14px !important;\r\n      color: #999999 !important;\r\n          }\r\n\r\n    .related-post .post-list .item .post_thumb {\r\n      max-height: 220px;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n          }\r\n\r\n    .related-post .post-list .item .post_title {\r\n      font-size: 14px;\r\n      color: #000000;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n      text-decoration: none;\r\n          }\r\n\r\n    .related-post .post-list .item .post_excerpt {\r\n      font-size: 12px;\r\n      color: #3f3f3f;\r\n      margin: 10px 0px;\r\n      padding: 0px;\r\n      display: block;\r\n      text-decoration: none;\r\n          }\r\n\r\n    .related-post .owl-dots .owl-dot {\r\n          }\r\n\r\n      <\/style>\r\n      <script>\r\n      jQuery(document).ready(function($) {\r\n        $(\".related-post .post-list\").owlCarousel({\r\n          items: 2,\r\n          responsiveClass: true,\r\n          responsive: {\r\n            0: {\r\n              items: 1,\r\n            },\r\n            768: {\r\n              items: 2,\r\n            },\r\n            1200: {\r\n              items: 2,\r\n            }\r\n          },\r\n                      rewind: true,\r\n                                loop: true,\r\n                                center: false,\r\n                                autoplay: true,\r\n            autoplayHoverPause: true,\r\n                                nav: true,\r\n            navSpeed: 1000,\r\n            navText: ['<i class=\"fas fa-chevron-left\"><\/i>', '<i class=\"fas fa-chevron-right\"><\/i>'],\r\n                                dots: false,\r\n            dotsSpeed: 1200,\r\n                                                    rtl: false,\r\n          \r\n        });\r\n      });\r\n    <\/script>\r\n  <\/div>","protected":false},"excerpt":{"rendered":"<p>Poodle&nbsp;is a breed of dog with legs that resembles cotton candies. It is intelligent and a regular staple at dog shows. Even the most friendly dogs have the propensity to bite. Now we see all kinds of security alerts and snafus likes heartbleed and shell shock!!! The latest in addition is POODLE. This is all &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.railscarma.com\/it\/blog\/ruby-regex-match-guide-with-examples\/\"> <span class=\"screen-reader-text\">Ruby Regex Match Guide (2026) with Examples<\/span> Leggi altro \"<\/a><\/p>","protected":false},"author":1,"featured_media":32075,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[384],"tags":[609,513,610],"class_list":["post-6492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technical-articles","tag-security-threats","tag-ssl","tag-sslv3"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Poodle: SSL Security Threat Explored - RailsCarma Blog<\/title>\n<meta name=\"description\" content=\"The POODLE attack takes advantage of the protocol version negotiation feature built into SSL\/TLS to force the use of SSL 3.0 and then uses this new vulnerability to decrypt select content within the SSL session\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/esplorata-la-minaccia-alla-sicurezza-poodle-ssl-2\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Poodle: SSL Security Threat Explored - RailsCarma Blog\" \/>\n<meta property=\"og:description\" content=\"The POODLE attack takes advantage of the protocol version negotiation feature built into SSL\/TLS to force the use of SSL 3.0 and then uses this new vulnerability to decrypt select content within the SSL session\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/esplorata-la-minaccia-alla-sicurezza-poodle-ssl-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RailsCarma - Ruby on Rails Development Company specializing in Offshore Development\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RailsCarma\/\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-30T07:29:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-30T07:32:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"644\" \/>\n\t<meta property=\"og:image:height\" content=\"292\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@railscarma\" \/>\n<meta name=\"twitter:site\" content=\"@railscarma\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.railscarma.com\/#\/schema\/person\/5f2228a2dec7549056e709de6eb85d21\"},\"headline\":\"Poodle \u2013 SSL Security Threat Explored\",\"datePublished\":\"2014-11-30T07:29:11+00:00\",\"dateModified\":\"2022-08-30T07:32:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/\"},\"wordCount\":1085,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.railscarma.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg\",\"keywords\":[\"security threats\",\"SSL\",\"sslv3\"],\"articleSection\":[\"Technical Articles\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/\",\"url\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/\",\"name\":\"Poodle: SSL Security Threat Explored - RailsCarma Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.railscarma.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg\",\"datePublished\":\"2014-11-30T07:29:11+00:00\",\"dateModified\":\"2022-08-30T07:32:51+00:00\",\"description\":\"The POODLE attack takes advantage of the protocol version negotiation feature built into SSL\/TLS to force the use of SSL 3.0 and then uses this new vulnerability to decrypt select content within the SSL session\",\"breadcrumb\":{\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage\",\"url\":\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg\",\"contentUrl\":\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg\",\"width\":644,\"height\":292},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.railscarma.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Poodle \u2013 SSL Security Threat Explored\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.railscarma.com\/#website\",\"url\":\"https:\/\/www.railscarma.com\/\",\"name\":\"RailsCarma - Ruby on Rails Development Company specializing in Offshore Development\",\"description\":\"RailsCarma is a Ruby on Rails Development Company in Bangalore. We specialize in Offshore Ruby on Rails Development based out in USA and India. Hire experienced Ruby on Rails developers for the ultimate Web Experience.\",\"publisher\":{\"@id\":\"https:\/\/www.railscarma.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.railscarma.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.railscarma.com\/#organization\",\"name\":\"RailsCarma\",\"url\":\"https:\/\/www.railscarma.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.railscarma.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2020\/08\/railscarma_logo.png\",\"contentUrl\":\"https:\/\/www.railscarma.com\/wp-content\/uploads\/2020\/08\/railscarma_logo.png\",\"width\":200,\"height\":46,\"caption\":\"RailsCarma\"},\"image\":{\"@id\":\"https:\/\/www.railscarma.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RailsCarma\/\",\"https:\/\/x.com\/railscarma\",\"https:\/\/www.linkedin.com\/company\/railscarma\/\",\"https:\/\/myspace.com\/railscarma\",\"https:\/\/in.pinterest.com\/railscarma\/\",\"https:\/\/www.youtube.com\/channel\/UCx3Wil-aAnDARuatTEyMdpg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.railscarma.com\/#\/schema\/person\/5f2228a2dec7549056e709de6eb85d21\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/www.railscarma.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/308867ca6c81f3aba146080c601000087180326f752c4116849ea9f514c6a4fa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/308867ca6c81f3aba146080c601000087180326f752c4116849ea9f514c6a4fa?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/www.railscarma.com\/hire-ruby-on-rails-developer\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Barboncino: esplorata la minaccia alla sicurezza SSL - Blog RailsCarma","description":"L&#039;attacco POODLE sfrutta la funzionalit\u00e0 di negoziazione della versione del protocollo incorporata in SSL\/TLS per forzare l&#039;uso di SSL 3.0 e quindi utilizza questa nuova vulnerabilit\u00e0 per decrittografare il contenuto selezionato all&#039;interno della sessione SSL","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/esplorata-la-minaccia-alla-sicurezza-poodle-ssl-2\/","og_locale":"it_IT","og_type":"article","og_title":"Poodle: SSL Security Threat Explored - RailsCarma Blog","og_description":"The POODLE attack takes advantage of the protocol version negotiation feature built into SSL\/TLS to force the use of SSL 3.0 and then uses this new vulnerability to decrypt select content within the SSL session","og_url":"https:\/\/www.railscarma.com\/it\/blog\/articoli-tecnici\/esplorata-la-minaccia-alla-sicurezza-poodle-ssl-2\/","og_site_name":"RailsCarma - Ruby on Rails Development Company specializing in Offshore Development","article_publisher":"https:\/\/www.facebook.com\/RailsCarma\/","article_published_time":"2014-11-30T07:29:11+00:00","article_modified_time":"2022-08-30T07:32:51+00:00","og_image":[{"width":644,"height":292,"url":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@railscarma","twitter_site":"@railscarma","twitter_misc":{"Scritto da":"admin","Tempo di lettura stimato":"5 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#article","isPartOf":{"@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/"},"author":{"name":"admin","@id":"https:\/\/www.railscarma.com\/#\/schema\/person\/5f2228a2dec7549056e709de6eb85d21"},"headline":"Poodle \u2013 SSL Security Threat Explored","datePublished":"2014-11-30T07:29:11+00:00","dateModified":"2022-08-30T07:32:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/"},"wordCount":1085,"commentCount":0,"publisher":{"@id":"https:\/\/www.railscarma.com\/#organization"},"image":{"@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg","keywords":["security threats","SSL","sslv3"],"articleSection":["Technical Articles"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/","url":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/","name":"Barboncino: esplorata la minaccia alla sicurezza SSL - Blog RailsCarma","isPartOf":{"@id":"https:\/\/www.railscarma.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage"},"image":{"@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg","datePublished":"2014-11-30T07:29:11+00:00","dateModified":"2022-08-30T07:32:51+00:00","description":"L&#039;attacco POODLE sfrutta la funzionalit\u00e0 di negoziazione della versione del protocollo incorporata in SSL\/TLS per forzare l&#039;uso di SSL 3.0 e quindi utilizza questa nuova vulnerabilit\u00e0 per decrittografare il contenuto selezionato all&#039;interno della sessione SSL","breadcrumb":{"@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#primaryimage","url":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg","contentUrl":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2014\/11\/POODLE-SSLv3-RC.jpg","width":644,"height":292},{"@type":"BreadcrumbList","@id":"https:\/\/www.railscarma.com\/blog\/technical-articles\/poodle-ssl-security-threat-explored-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.railscarma.com\/"},{"@type":"ListItem","position":2,"name":"Poodle \u2013 SSL Security Threat Explored"}]},{"@type":"WebSite","@id":"https:\/\/www.railscarma.com\/#website","url":"https:\/\/www.railscarma.com\/","name":"RailsCarma - Societ\u00e0 di sviluppo Ruby on Rails specializzata nello sviluppo offshore","description":"RailsCarma \u00e8 una societ\u00e0 di sviluppo Ruby on Rails a Bangalore. Siamo specializzati nello sviluppo offshore di Ruby on Rails con sede negli Stati Uniti e in India. Assumi sviluppatori esperti di Ruby on Rails per la migliore esperienza Web.","publisher":{"@id":"https:\/\/www.railscarma.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.railscarma.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.railscarma.com\/#organization","name":"RailsCarma","url":"https:\/\/www.railscarma.com\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.railscarma.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2020\/08\/railscarma_logo.png","contentUrl":"https:\/\/www.railscarma.com\/wp-content\/uploads\/2020\/08\/railscarma_logo.png","width":200,"height":46,"caption":"RailsCarma"},"image":{"@id":"https:\/\/www.railscarma.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RailsCarma\/","https:\/\/x.com\/railscarma","https:\/\/www.linkedin.com\/company\/railscarma\/","https:\/\/myspace.com\/railscarma","https:\/\/in.pinterest.com\/railscarma\/","https:\/\/www.youtube.com\/channel\/UCx3Wil-aAnDARuatTEyMdpg"]},{"@type":"Person","@id":"https:\/\/www.railscarma.com\/#\/schema\/person\/5f2228a2dec7549056e709de6eb85d21","name":"amministratore","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.railscarma.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/308867ca6c81f3aba146080c601000087180326f752c4116849ea9f514c6a4fa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/308867ca6c81f3aba146080c601000087180326f752c4116849ea9f514c6a4fa?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.railscarma.com\/hire-ruby-on-rails-developer\/"]}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/posts\/6492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/comments?post=6492"}],"version-history":[{"count":0,"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/posts\/6492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/media\/32075"}],"wp:attachment":[{"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/media?parent=6492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/categories?post=6492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.railscarma.com\/it\/wp-json\/wp\/v2\/tags?post=6492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}