<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019 in Management &amp; Governance</title>
    <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732725#M16471</link>
    <description>&lt;P&gt;You are correct that applications should ideally take cryptography setting from the OS. I'm wondering why this vulnerability is only detected in our Qlik installations though, not other applications.&lt;/P&gt;&lt;P&gt;I was assuming that this might be fixed by changing the way Qlik handles things, since other applications don't seem to be affected. That's why I was asking if there are any plans by Qlik to address this issue.&lt;/P&gt;&lt;P&gt;If there is nothing that Qlik can actually do about this because ALL CBC algorithms are vulnerable no matter the SSL libraries being used, then I can see why disabling all CBC ciphers is the way to go here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Aug 2020 10:19:42 GMT</pubDate>
    <dc:creator>HendrikJ</dc:creator>
    <dc:date>2020-08-03T10:19:42Z</dc:date>
    <item>
      <title>GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1652380#M15219</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We got report about GOLDENDOODLE vulnerablity,&lt;/P&gt;&lt;P&gt;Here is report&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Severity:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Medium&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability ID:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;q038764&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Source Type:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;SERVER&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Details:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Port: 443/tcp&lt;BR /&gt;GOLDENDOODLE vulnerability found with ECDHE-RSA-AES256-SHA384 on TLSv1.2&lt;BR /&gt;The server returns valid data in response to valid padding with an invalid MAC&lt;BR /&gt;---------- ---------- ----------&lt;BR /&gt;VURIOUS preprocessing log for debugging and troubleshooting:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Port:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;443/tcp&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Layer:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Middleware&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;References:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Qualys Knowledgebase:&amp;nbsp;&lt;BR /&gt;&lt;A href="https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities" target="_self"&gt;https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Bugtraq List:&amp;nbsp;&lt;BR /&gt;107174, &lt;A href="http://www.securityfocus.com/bid/107174" target="_blank" rel="noopener"&gt;http://www.securityfocus.com/bid/107174&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Generic Remediation Instructions:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Please refer to official github page&amp;nbsp;&lt;A href="https://github.com/RUB-NDS/TLS-Padding-Oracles" target="_blank" rel="noopener"&gt;TLS Padding Oracles&lt;/A&gt;&amp;nbsp;for affected products and patch links.&lt;/P&gt;&lt;P&gt;Patch:&lt;BR /&gt;&lt;BR /&gt;Following are links for downloading patches to fix the vulnerabilities:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.openssl.org/news/secadv/20190226.txt" target="_blank" rel="noopener"&gt;OpenSSL Security Advisory: OpenSSL&lt;/A&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;Generic Vulnerability Description:&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;A TLS padding oracle vulnerability is detected.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way&lt;BR /&gt;that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;QID Detection Logic:&lt;BR /&gt;&lt;BR /&gt;This QID sends the multiple tls padding payloads to determine the vulnerability.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Note: Qualys scanner version 11.1.24-1 or later is required to use this QID.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Consequences:&amp;nbsp;&lt;BR /&gt;An attacker who can take a man-in-the-middle (MitM) position can exploit this vulnerability and gain access to encrypted communication between a client and server.&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're new to Qlik sense, how could we fix this issue?&lt;/P&gt;&lt;P&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Thom (FW)&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 14:36:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1652380#M15219</guid>
      <dc:creator>thomsweet</dc:creator>
      <dc:date>2019-11-28T14:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1652420#M15220</link>
      <description>&lt;P&gt;Hi Thom,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There could be several reasons to encounter this issue. The first that comes to my mind is you may have opened the connection to the WWW. In that case, you need to have a SSL certificate installed.&lt;/P&gt;&lt;P&gt;Best practice is to have a form of tunneling (VPN would be best) and keep your QS environment within unless there is a mandatory reason to have it exposed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope that helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;S.T.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 15:51:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1652420#M15220</guid>
      <dc:creator>Stoyan_Terziev</dc:creator>
      <dc:date>2019-11-28T15:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1652503#M15221</link>
      <description>&lt;P&gt;Hello Stoyan,&lt;/P&gt;&lt;P&gt;Thanks for your feedback. We already had signed SSL certificate installed, but I think the encrypt library (maybe OpenSSL) has leak.&lt;/P&gt;&lt;P&gt;VPN is good idea, we can consider it as long term solution, it needs time to implement, but I still need to fix this issue.&lt;/P&gt;&lt;P&gt;BR.&lt;/P&gt;&lt;P&gt;Thom (FW)&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2019 01:31:41 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1652503#M15221</guid>
      <dc:creator>thomsweet</dc:creator>
      <dc:date>2019-11-29T01:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1654014#M15247</link>
      <description>&lt;P&gt;Since Qlik Sense Enterprise inherits the SCHANNEL protocols and cipher suites from the Windows OS' settings, then disable&amp;nbsp;ECDHE-RSA-AES256-SHA384 on Windows.&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-quilt-row lia-quilt-row-main"&gt;
&lt;DIV class="lia-quilt-column lia-quilt-column-21 lia-quilt-column-right lia-quilt-column-main-content"&gt;
&lt;DIV class="lia-quilt-column-alley lia-quilt-column-alley-right"&gt;
&lt;DIV id="bodyDisplay" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;I'd encourage consulting with your organization to see if there are gold standard scripts to handle things, but if you're on your own you can leverage a tool like IISCrypto to set things appropriately in the Windows registry.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 04 Dec 2019 11:04:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1654014#M15247</guid>
      <dc:creator>Levi_Turner</dc:creator>
      <dc:date>2019-12-04T11:04:37Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1667075#M15452</link>
      <description>&lt;P&gt;Although I understand the weakness and vulnerability of CBC (Mode of Operation) I believe there are some OpenSSL libraries within Qlik that enables the findings. Currently the vulnerability number 38764 and is described as follow:&lt;/P&gt;&lt;P&gt;"Testing multiple connections and&amp;nbsp; If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way&lt;BR /&gt;that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data."&lt;/P&gt;&lt;P&gt;This to me is significant and should be revisited by Qlik for remediation of the OpenSSL libraries in use.&lt;/P&gt;&lt;P&gt;On another note, there are other applications listening on a Windows server that are not "Flagged" by the scanner.&amp;nbsp; For example RDP.&amp;nbsp; Which is using the same set of ciphers set by a GPO.&lt;/P&gt;&lt;P&gt;So, Qlik is vulnerable but not RDP on the same server.&lt;/P&gt;&lt;P&gt;When can we expect a patch or upgrade that would remediate the vulnerability?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jan 2020 14:08:30 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1667075#M15452</guid>
      <dc:creator>CryptoGuru</dc:creator>
      <dc:date>2020-01-19T14:08:30Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1731264#M16427</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/47469"&gt;@Levi_Turner&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can confirm the findings of other users here, no other service except Qlik is affected by this vulnerability (TLS Padding&amp;nbsp;Zombie POODLE and GOLDENDOODLE). This strongly hints at the use of old SSL libraries by Qlik.&lt;/P&gt;&lt;P&gt;We need to fix this ASAP, otherwise our Qlik Sense server might get shut down by the security team. Please anyone from Qlik respond how to solve this.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 07:39:14 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1731264#M16427</guid>
      <dc:creator>HendrikJ</dc:creator>
      <dc:date>2020-07-28T07:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1731297#M16429</link>
      <description>&lt;P&gt;I personally use Tripwire's &lt;A href="https://github.com/Tripwire/padcheck" target="_self"&gt;padcheck&lt;/A&gt; for validation:&lt;/P&gt;&lt;P&gt;Before:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;levi@usral-ltu2:~$ ./padcheck {IPAddress}
{IPAddress} ({IPAddress}:443) is being tested for oracles with cipher 0xc027 using TLS 0x0303
{IPAddress} ({IPAddress}:443) is being tested for oracles with cipher 0xc027 using TLS 0x0303
{IPAddress} ({IPAddress}:443) is being tested for oracles with cipher 0xc027 using TLS 0x0303
{IPAddress} ({IPAddress}:443) is VULNERABLE with a Observable Padding Validity (GOLDENDOODLE) oracle when using cipher 0xc027 with TLS 0x0303. The fingerprint is 6be7b5&lt;/LI-CODE&gt;&lt;P&gt;After applying IIS Crypto's best practices + manually de-selecting the CBC ciphers:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;levi@usral-ltu2:~$ ./padcheck {IPAddress}
{IPAddress} ({IPAddress}:443) had an unexpected connection failure: EOF&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 889px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/38164i6086024C9EB91900/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2.png" style="width: 875px;"&gt;&lt;img src="https://community.qlik.com/t5/image/serverpage/image-id/38165i08B2A5DC58B807A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 09:34:40 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1731297#M16429</guid>
      <dc:creator>Levi_Turner</dc:creator>
      <dc:date>2020-07-28T09:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732677#M16467</link>
      <description>&lt;P&gt;Just wanted to say that this does indeed work, but I consider this to be only a workaround.&lt;/P&gt;&lt;P&gt;This is specific to Qlik, other services on our machines don't exhibit this vulnerability in connection with CBC ciphers. Ist there any plan to update the SSL libraries that come packaged with Qlik to solve this (I'm assuming that an up-to-date SSL library would fix the issue).&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 07:11:37 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732677#M16467</guid>
      <dc:creator>HendrikJ</dc:creator>
      <dc:date>2020-08-03T07:11:37Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732722#M16470</link>
      <description>&lt;P&gt;Agree to disagree. Adjusting the OS level availability of protocols and cipher suites is exactly how I would vote to design a web app. Otherwise you have an application which is rolling its own cryptography which is generally poor form outside of applications which provide cryptography.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 10:08:34 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732722#M16470</guid>
      <dc:creator>Levi_Turner</dc:creator>
      <dc:date>2020-08-03T10:08:34Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732725#M16471</link>
      <description>&lt;P&gt;You are correct that applications should ideally take cryptography setting from the OS. I'm wondering why this vulnerability is only detected in our Qlik installations though, not other applications.&lt;/P&gt;&lt;P&gt;I was assuming that this might be fixed by changing the way Qlik handles things, since other applications don't seem to be affected. That's why I was asking if there are any plans by Qlik to address this issue.&lt;/P&gt;&lt;P&gt;If there is nothing that Qlik can actually do about this because ALL CBC algorithms are vulnerable no matter the SSL libraries being used, then I can see why disabling all CBC ciphers is the way to go here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 10:19:42 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732725#M16471</guid>
      <dc:creator>HendrikJ</dc:creator>
      <dc:date>2020-08-03T10:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732856#M16473</link>
      <description>&lt;P&gt;I am not sure what other web apps that you're referring to. Personally I interact with Qlik Sense Enterprise, Apache, and Nginx most often. With the latter two using OpenSSL as their crypto provider and thus having application specific configs for configuring TLS and Cipher Suites.&lt;/P&gt;&lt;P&gt;As for the general problem, I am by no means a crypto expert, but as I understand it (i.e.&amp;nbsp;&lt;A href="https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities" target="_blank"&gt;https://blog.qualys.com/technology/2019/04/22/zombie-poodle-and-goldendoodle-vulnerabilities&lt;/A&gt;&amp;nbsp;/ &lt;A href="https://www.tripwire.com/state-of-security/vert/goldendoodle-attack/" target="_blank"&gt;https://www.tripwire.com/state-of-security/vert/goldendoodle-attack/&lt;/A&gt;&amp;nbsp;being good references), the *DOODLE suite of vulnerabilities come down to the use of the CBC ciphers on any TLS protocol lower than 1.3. So the fix for this are:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Use TLS 1.3 (exclusively)&lt;/LI&gt;&lt;LI&gt;Disable the CBC ciphers&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;TLS 1.3 support on Windows is fairly new (&lt;A href="https://devblogs.microsoft.com/premier-developer/microsoft-tls-1-3-support-reference/" target="_blank"&gt;https://devblogs.microsoft.com/premier-developer/microsoft-tls-1-3-support-reference/&lt;/A&gt;) so the strongest option at this juncture is to go the (2) route. Even when (1) is viable from a technical perspective, it seems extraordinarily risky to my eyes to require this for a web app unless you have pretty rigorous control over the configuration of the clients who are attempting to connect to the web app. i.e. they run very up-to-date Client OSs, use modern browsers, etc.&lt;/P&gt;&lt;P&gt;Just my 2 cents on the matter.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 14:42:29 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732856#M16473</guid>
      <dc:creator>Levi_Turner</dc:creator>
      <dc:date>2020-08-03T14:42:29Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732955#M16476</link>
      <description>&lt;P&gt;I am no crypto expert either, bt in the scenario you described, I agree that option number 2 is the most viable solution for now. Thanks for the help!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Aug 2020 04:17:43 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/1732955#M16476</guid>
      <dc:creator>HendrikJ</dc:creator>
      <dc:date>2020-08-04T04:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: GOLDENDOODLE vulnerability found in Qlik Sense June 2019</title>
      <link>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/2489526#M28348</link>
      <description>&lt;P&gt;&lt;a href="https://community.qlik.com/t5/user/viewprofilepage/user-id/123013"&gt;@HendrikJ&lt;/a&gt;&amp;nbsp;-Do you still has this issue in your environment ?&lt;BR /&gt;Thanks&lt;BR /&gt;Veer&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 23:04:15 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Management-Governance/GOLDENDOODLE-vulnerability-found-in-Qlik-Sense-June-2019/m-p/2489526#M28348</guid>
      <dc:creator>veera_a</dc:creator>
      <dc:date>2024-10-28T23:04:15Z</dc:date>
    </item>
  </channel>
</rss>

