<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>blog.oneall.com &#187; Infrastructure</title>
	<atom:link href="http://blog.oneall.com/category/infrastructure/feed/" rel="self" type="application/rss+xml" />
	<link>http://blog.oneall.com</link>
	<description>Social Media Integration</description>
	<lastBuildDate>Wed, 13 May 2015 16:44:14 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.2.1</generator>
		<item>
		<title>Poodle SSL Exploit</title>
		<link>http://blog.oneall.com/222/poodle-ssl-exploit/</link>
		<comments>http://blog.oneall.com/222/poodle-ssl-exploit/#comments</comments>
		<pubDate>Thu, 16 Oct 2014 08:23:19 +0000</pubDate>
		<dc:creator>Claude</dc:creator>
				<category><![CDATA[Infrastructure]]></category>

		<guid isPermaLink="false">http://blog.oneall.com/?p=222</guid>
		<description><![CDATA[<p>Yesterday, Google published a post that exposes a vulnerability in the design of SSL version 3.0. This flaw is similar to the Heartbleed bug exploited earlier this year but not nearly as serious. (Photo : greg westfall &#124; Creative Commons) It&#8217;s called POODLE (Padding Oracle On Downgraded Legacy Encryption) and exploits a vulnerability in one [...]</p><p>The post <a href="http://blog.oneall.com/222/poodle-ssl-exploit/">Poodle SSL Exploit</a> appeared first on <a href="http://blog.oneall.com">blog.oneall.com</a>.</p>]]></description>
			<content:encoded><![CDATA[<p>Yesterday, Google <a href="http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html" target="_blank">published a post</a> that exposes a vulnerability in the design of SSL version 3.0. This flaw is similar to the Heartbleed bug exploited earlier this year but not nearly as serious.</p>
<p><img title="poodle-flaw" src="http://blog.oneall.com/wp-content/uploads/2014/10/poodle-flaw.jpg" alt="" width="500" /><br />
<span style="color: #808080;"><em>(Photo : greg westfall | Creative Commons)</em></span></p>
<p>It&#8217;s called POODLE (Padding Oracle On Downgraded Legacy Encryption) and exploits a vulnerability in one of the Internet&#8217;s security protocols (SSL or more commonly known as https in your browser) and could potentially give an attacker access to sensitive information.</p>
<p><strong>In order to protect our users from the POODLE vulnerability in SSL, we have disabled support for SSLv3 across our entire platform.</strong></p>
<p>You don’t need to take any action regarding our site or services. This change will prevent attackers from exploiting the vulnerability and keep SSL sessions secure.</p>
<p>The downside to this is that very old systems, starting with Internet Explorer 6.0 on Windows XP, do not support any version of TLS. These browsers will not be able to make an HTTPS connection through our servers.</p>
<p>This is an <a href="http://www.w3schools.com/browsers/browsers_explorer.asp" target="_blank">extremely small portion</a> of Internet users (less than 0.1% of all users) and these users should consider installing an modern browser such as Mozilla Firefox or Google Chrome.</p>
<p>Both browsers support newer SSL standards and are not impacted by this change.</p>
<p>The post <a href="http://blog.oneall.com/222/poodle-ssl-exploit/">Poodle SSL Exploit</a> appeared first on <a href="http://blog.oneall.com">blog.oneall.com</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://blog.oneall.com/222/poodle-ssl-exploit/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Heartbleed Bug</title>
		<link>http://blog.oneall.com/200/heartbleed-bug/</link>
		<comments>http://blog.oneall.com/200/heartbleed-bug/#comments</comments>
		<pubDate>Thu, 24 Apr 2014 08:05:47 +0000</pubDate>
		<dc:creator>Claude</dc:creator>
				<category><![CDATA[Infrastructure]]></category>

		<guid isPermaLink="false">http://blog.oneall.com/?p=200</guid>
		<description><![CDATA[<p>About Heartbleed The following is a snippet from heartbleed.com on the Heartbleed bug. The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet [...]</p><p>The post <a href="http://blog.oneall.com/200/heartbleed-bug/">Heartbleed Bug</a> appeared first on <a href="http://blog.oneall.com">blog.oneall.com</a>.</p>]]></description>
			<content:encoded><![CDATA[<h4>About Heartbleed</h4>
<p><em>The following is a snippet from heartbleed.com on the Heartbleed bug.</em></p>
<blockquote><p>The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).</p>
<p>The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.</p></blockquote>
<h4>OneAll is not affected</h4>
<p>We are happy to confirm that the SSL version used by <strong>the OneAll platform is not affected by this bug</strong>. You don’t need to take any action regarding our site or services.</p>
<p><img src="http://blog.oneall.com/wp-content/uploads/2014/04/heartbleed-247x300.png" alt="HeartBleed" title="heartbleed-247x300" width="247" height="300" class="alignnone size-full wp-image-202" /></p>
<p>The post <a href="http://blog.oneall.com/200/heartbleed-bug/">Heartbleed Bug</a> appeared first on <a href="http://blog.oneall.com">blog.oneall.com</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://blog.oneall.com/200/heartbleed-bug/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Infrastructure updated</title>
		<link>http://blog.oneall.com/6/infrastructure-updated/</link>
		<comments>http://blog.oneall.com/6/infrastructure-updated/#comments</comments>
		<pubDate>Mon, 17 Oct 2011 18:35:27 +0000</pubDate>
		<dc:creator>Claude</dc:creator>
				<category><![CDATA[Infrastructure]]></category>
		<category><![CDATA[servers]]></category>

		<guid isPermaLink="false">http://blog.oneall.com/?p=6</guid>
		<description><![CDATA[<p>For the last months our customer base has constantly been growing &#8211; thank you very much for having spread the word &#8211; and our infrastructure had reached its limits. We have now moved our servers to a new home to ensure that we will be able to constantly stay abreast of our capacity needs and [...]</p><p>The post <a href="http://blog.oneall.com/6/infrastructure-updated/">Infrastructure updated</a> appeared first on <a href="http://blog.oneall.com">blog.oneall.com</a>.</p>]]></description>
			<content:encoded><![CDATA[<p>For the last months our customer base has constantly been growing &#8211; <em>thank you very much for having spread the word</em> &#8211; and our infrastructure had reached its limits.</p>
<p><strong>We have now moved our servers to a new home to ensure that we will be able to constantly stay abreast of our capacity needs and to give you a better reliability.</strong></p>
<p>The plugins are now loading faster than ever and our new content delivery network will speed up the general page speed.</p>
<p>Please <a href="http://www.oneall.com/company/beta-feedback/">leave us a comment</a> if you encounter any problems.</p>
<p>The post <a href="http://blog.oneall.com/6/infrastructure-updated/">Infrastructure updated</a> appeared first on <a href="http://blog.oneall.com">blog.oneall.com</a>.</p>]]></content:encoded>
			<wfw:commentRss>http://blog.oneall.com/6/infrastructure-updated/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
