<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Kevin Decherf, Author at Clever Cloud</title>
	<atom:link href="https://stagingv6.cleverapps.io/blog/author/decherf/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>From Code to Product</description>
	<lastBuildDate>Mon, 20 Oct 2014 19:31:00 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2023/03/cropped-cropped-favicon-32x32.png</url>
	<title>Kevin Decherf, Author at Clever Cloud</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Clever Cloud and the POODLE battle</title>
		<link>https://stagingv6.cleverapps.io/blog/features/2014/10/20/clever-cloud-and-the-poodle-battle/</link>
		
		<dc:creator><![CDATA[Kevin Decherf]]></dc:creator>
		<pubDate>Mon, 20 Oct 2014 19:31:00 +0000</pubDate>
				<category><![CDATA[Features]]></category>
		<category><![CDATA[PaaS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Update]]></category>
		<guid isPermaLink="false">https://www2.cleverapps.io/wp/blog/technology/2014/10/20/clever-cloud-and-the-poodle-battle/</guid>

					<description><![CDATA[<p><img width="1400" height="540" src="https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" fetchpriority="high" srcset="https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1.png 1400w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-300x116.png 300w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-1024x395.png 1024w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-768x296.png 768w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-1368x528.png 1368w" sizes="(max-width: 1400px) 100vw, 1400px" /></p><p>TL;DR:<br>We are disabling the support of SSLv3 in front of our platform the Friday, 24th October. CBC has already been disabled, mitigating the issue.<br>The secure web is not for Internet Explorer 6 anymore.</p>
<span id="more-2853"></span>

<h2 id="say-hello-to-the-poodle">Say hello to the POODLE</h2>
<p><a href="http://googleonlinesecurity.blogspot.fr/2014/10/this-poodle-bites-exploiting-ssl-30.html">POODLE</a> is the codename of a new vulnerability disclosed by Google earlier this week. This vulnerability is not related to a specific software but to a whole protocol: SSLv3.</p>
<p>In few words this vulnerability gives the ability to an attacker to force a client downgrading the protocol version and the cipher suite used to talk to a secure server even if it is compatible with the most recent and secure one. After that the attacker will be able to perform a <a href="http://en.wikipedia.org/wiki/Padding_oracle_attack">Padding Oracles attack</a> to decipher the communication.</p>
<h2 id="does-clever-cloud-poodle">Does Clever Cloud POODLE?</h2>
<p>The most efficient way to prevent this attack on the server-side is to remove the support of the SSL version 3. Removing this version will block some users like Internet Explorer 6 -which is not compatible with the newest protocol TLS- and very old devices.</p>
<p>Even if it is a good pretext to end the very long life of Internet Explorer 6, we prefer to check the impact on our customers before applying this update.</p>
<p>We are planning to disable the support of SSLv3 in front of our platform the Friday, 24th October. If you are a SSL customer and want to keep it, let us know by sending an email to our support.</p>
<p>Disabling SSLv3 is not the only way to mitigate this issue. After the downgrade dance, the most vulnerable cipher suite is CBC and… good news, this cipher was disabled widely on our platform earlier this year!</p>
<p>We are also deploying a patch to support a new <a href="http://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00">cipher suite flag</a> which tells to a server to reject any inappropriate fallback from a client.</p>
]]></description>
										<content:encoded><![CDATA[<p><img width="1400" height="540" src="https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1.png" class="attachment-post-thumbnail size-post-thumbnail wp-post-image" alt="" decoding="async" srcset="https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1.png 1400w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-300x116.png 300w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-1024x395.png 1024w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-768x296.png 768w, https://staging-cc-assetsv6.cellar-c2.services.clever-cloud.com/uploads/2021/08/poodle-attack-1-1368x528.png 1368w" sizes="(max-width: 1400px) 100vw, 1400px" /></p><p>TL;DR:<br>We are disabling the support of SSLv3 in front of our platform the Friday, 24th October. CBC has already been disabled, mitigating the issue.<br>The secure web is not for Internet Explorer 6 anymore.</p>
<span id="more-2853"></span>

<h2 id="say-hello-to-the-poodle">Say hello to the POODLE</h2>
<p><a href="http://googleonlinesecurity.blogspot.fr/2014/10/this-poodle-bites-exploiting-ssl-30.html">POODLE</a> is the codename of a new vulnerability disclosed by Google earlier this week. This vulnerability is not related to a specific software but to a whole protocol: SSLv3.</p>
<p>In few words this vulnerability gives the ability to an attacker to force a client downgrading the protocol version and the cipher suite used to talk to a secure server even if it is compatible with the most recent and secure one. After that the attacker will be able to perform a <a href="http://en.wikipedia.org/wiki/Padding_oracle_attack">Padding Oracles attack</a> to decipher the communication.</p>
<h2 id="does-clever-cloud-poodle">Does Clever Cloud POODLE?</h2>
<p>The most efficient way to prevent this attack on the server-side is to remove the support of the SSL version 3. Removing this version will block some users like Internet Explorer 6 -which is not compatible with the newest protocol TLS- and very old devices.</p>
<p>Even if it is a good pretext to end the very long life of Internet Explorer 6, we prefer to check the impact on our customers before applying this update.</p>
<p>We are planning to disable the support of SSLv3 in front of our platform the Friday, 24th October. If you are a SSL customer and want to keep it, let us know by sending an email to our support.</p>
<p>Disabling SSLv3 is not the only way to mitigate this issue. After the downgrade dance, the most vulnerable cipher suite is CBC and… good news, this cipher was disabled widely on our platform earlier this year!</p>
<p>We are also deploying a patch to support a new <a href="http://tools.ietf.org/html/draft-ietf-tls-downgrade-scsv-00">cipher suite flag</a> which tells to a server to reject any inappropriate fallback from a client.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The PostgreSQL JDBC Driver is now PgBouncer compliant</title>
		<link>https://stagingv6.cleverapps.io/blog/engineering/2013/05/27/pgjdbc-now-pgbouncer-compliant/</link>
		
		<dc:creator><![CDATA[Kevin Decherf]]></dc:creator>
		<pubDate>Mon, 27 May 2013 00:00:00 +0000</pubDate>
				<category><![CDATA[Engineering]]></category>
		<guid isPermaLink="false">https://www2.cleverapps.io/wp/blog/technology/2013/05/27/pgjdbc-now-pgbouncer-compliant/</guid>

					<description><![CDATA[Three years ago a discussion was launched on the Pgbouncer mailing-list [1] about the JDBC Driver which does not disable prepared statements when using ?prepareThreshold=0 in the connection string. At Clever Cloud, we provide PostgreSQL databases behind PgBouncer to handle pools of connections. And to optimize these pools, we use the transaction pooling mode. This [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Three years ago a discussion was launched on the Pgbouncer mailing-list [1] about the JDBC Driver which does not disable prepared statements when using <code>?prepareThreshold=0</code> in the connection string.</p>
<p><span id="more-2793"></span></p>
<p>At Clever Cloud, we provide PostgreSQL databases behind PgBouncer to handle pools of connections. And to optimize these pools, we use the <em>transaction pooling mode</em>. This mode will prevent clients from using prepared statements as the session is only used for one transaction.</p>
<p>To be able to use this mode internally we manually applied a patch to the driver. After 8 months of inactivity, the pull-request [2][3] was finally merged into the master branch of the driver.</p>
<p>Now we hope that the next version will be released soon.</p>
<p>References:</p>
<p>[1] <a href="http://lists.pgfoundry.org/pipermail/pgbouncer-general/2010-February/000507.html">http://lists.pgfoundry.org/pipermail/pgbouncer-general/2010-February/000507.html</a> [2] <a href="https://github.com/pgjdbc/pgjdbc/pull/9">https://github.com/pgjdbc/pgjdbc/pull/9</a> [3] <a href="https://github.com/pgjdbc/pgjdbc/pull/58">https://github.com/pgjdbc/pgjdbc/pull/58</a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
