Disabling SSLv3 Support to Avoid SSL Poodle Attacks on WebRTC Session Controller 7.0
KM Doc ID 1950427.1 is published to explain how to avoid SSL poodle attacks on WebRTC Session Controller 7.0.
It was recently discovered that SSLv3 has security limitations in it, therefore it makes sense that servers should not allow SSL/TLS handshake to agree on using SSLv3 as the underlying protocol. This can be done by applying a system property in the start scripts for the WebRTC Session Controller.
Adding the system property into the start script of your WebRTC Session Controller will reduce the handshake compatibility with client that require SSLv3 or older protocols.
Edit the setDomainEnv.sh under <domain_home>/bin