|SSL/TLS is a deceptively simple technology. It is simple to deploy, and it just works.
Except the truth is it does not really work, as it turns out that it is not easy to deploy correctly. To ensure that SSL provides the necessary security, you have to put effort into properly configuring your servers.
For example, consider the POODLE attack (Padding Oracle On Downgraded Legacy Encryption) which is a man-in-the-middle exploit that takes advantage of Internet and security software clients’ fallback to SSL V3.
An attacker can successfully exploit this vulnerability by making no more than 256 SSL 3.0 requests to reveal one byte of encrypted messages.
But the time taken to check all sites under your control can quickly mount up and become a task that you leave for another day, which in IT means someday you will get around to sorting it.
So we created a Logicmodule, SSL Test, which checks your sites for certian vulnerabilities, and alerts you by email, text or voice using Logicmonitor. At the time of publication it checks for Beast, Logjam, Freak, Heartbleed, Luckyminus20, Debian Flaw, OpenSslCcs, drown, Known DH primes and poodle Attacks vulnerabilities. It also checks the SSL certificate matches the address.
An example alert is shown here:-
By alerting you to the fact and letting you know how to deal with it, you are saving time having to trawl through RSS feeds and security updates.
You need to manually add each website you want to check as an instance in Logicmonitor.
To do this , select a host in Logicmonitor, (it doesn’t matter which one as it is just a placeholder for the datasource, the actual check is done from the collector,) and click the down arrow shown here.
And select Add monitored instance.
Then fill out the various required values.
And that is it!