As most of you already know, there is an important SSLv3 vulnerability (CVE-2014-3566 - see , known as Poodle.
While it's easy to disable SSLv3 in the allowed Protocols at the server level (for example SSLProtocol All -SSLv2 -SSLv3 for apache), some clients are still defaulting to SSLv3, and Koji does that.

We currently have disabled SSLv3 on our koji instance, so if you're a cbs/koji user, please adapt your local koji package (local fix !)
At the moment, there is no available upstream package, but the following patch has been tested by Fedora people too (and credits go to

  ---    2014-10-15 11:42:54.747082029 +0200  
  +++    2014-10-15 11:44:08.215257590 +0200  
  @@ -37,7 +37,8 @@  
  if f and not os.access(f, os.R_OK):  
  raise StandardError, "%s does not exist or is not  
  readable" % f

  -    ctx = SSL.Context(SSL.SSLv3_METHOD)   # SSLv3 only  
  +    #ctx = SSL.Context(SSL.SSLv3_METHOD)   # SSLv3 only  
  +    ctx = SSL.Context(SSL.TLSv1_METHOD)   # TLSv1 only  
  @@ -45,7 +46,8 @@  
  ctx.set_verify(verify, our_verify)  
  -    ctx.set_options(SSL.OP_NO_SSLv2 | SSL.OP_NO_TLSv1)  
  +    #ctx.set_options(SSL.OP_NO_SSLv2 | SSL.OP_NO_TLSv1)  
  +    ctx.set_options(SSL.OP_NO_SSLv2 | SSL.OP_NO_TLSv1 |
  return ctx  

We'll keep you informed about possible upstream koji packages that would default to at least TLSv1

If you encounter a problem, feel free to drop into #centos-devel channel on and have a chat with us