The encryption scheme (SSLv3) used by the University of Chicago's mainframe terminal emulator, OpenText HostExplorer has been reported to be compromised. SSLv3 can potentially be exploited by a vulnerability called Padding Oracle On Downgraded Legacy Encryption (POODLE).
An alternative and more secure encryption protocol, AT-TLS is now available. All UC mainframe users should switch to AT-TLS as soon as possible. Eventually, SSLv3 will no longer be supported or available.
Note for Macintosh/ OS X users:
IT Services does not support tn3270 for Mac OS. However, a secure TN3270 client can be downloaded from Sourceforge here you can download x3270 Terminal Emulator. You will need to turn on AT-TLS TLSv1 and configure it to connect to port 4992. If FIPS 140-2 Cryptography can be enabled, then select this option as well.
To begin, HostExplorer must be Version 14 or higher. Look under the Help tab then About to verify the version you are running.
If your version is earlier than Version 15, go to the knowledge base article Install and Upgrade OpenText HostExplorer 15 and follow the instructions to download and install Version 15.