You can check if your website is vulnerable using curl:
curl -v3 -X HEAD https://www.example.com
If you are NOT vulnerable, your output should look like:
curl: (35) SSL connect error
If you ARE vulnerable, you will see normal connection outputs, potentially including the line:
SSL 3.0 connection using ...
The part of Parallels Business Automation - Standard (PBA-S) plugins forcibly uses SSLv3 in communications with external systems. As a result, disabling it may disturb the system.
To avoid this, run the following command on the PBA-S server before disabling SSLv3:
# wget http://download.pa.parallels.com/pbas/4.5/hotfixes/KB123164/installer.sh # sh installer.sh
This script downloads and installs the following packages with a hotfix applied against the POODLE vulnerability:
The following packages are only downloaded if they are installed:
The attack described above requires an SSL 3.0 connection to be established, so disabling the SSL 3.0 protocol will completely mitigate it.
SSLProtocol -ALL +SSLv3 +TLSv1
SSLProtocol -ALL +TLSv1
Restart the httpd service to apply your changes:
service httpd restart