diff options
author | simon <simon@FreeBSD.org> | 2010-12-03 22:59:54 +0000 |
---|---|---|
committer | simon <simon@FreeBSD.org> | 2010-12-03 22:59:54 +0000 |
commit | 2e755187682578966c1ec502dbfe70c798a908b4 (patch) | |
tree | 001121d5a23a0b1561ac01281edf7c5f1cb0972a /crypto/openssl/doc | |
parent | 477858ee257a6cd5108309ebe5f2cc80ab26c5e1 (diff) | |
parent | ae03beb758270fb19d741c93f7bfde88a6635612 (diff) | |
download | FreeBSD-src-2e755187682578966c1ec502dbfe70c798a908b4.zip FreeBSD-src-2e755187682578966c1ec502dbfe70c798a908b4.tar.gz |
Merge OpenSSL 0.9.8q into head.
Security: CVE-2010-4180
Security: http://www.openssl.org/news/secadv_20101202.txt
MFC after: 3 days
Diffstat (limited to 'crypto/openssl/doc')
-rw-r--r-- | crypto/openssl/doc/ssl/SSL_CTX_set_options.pod | 13 |
1 files changed, 1 insertions, 12 deletions
diff --git a/crypto/openssl/doc/ssl/SSL_CTX_set_options.pod b/crypto/openssl/doc/ssl/SSL_CTX_set_options.pod index 06025d1..a703ce0 100644 --- a/crypto/openssl/doc/ssl/SSL_CTX_set_options.pod +++ b/crypto/openssl/doc/ssl/SSL_CTX_set_options.pod @@ -78,18 +78,7 @@ this breaks this server so 16 bytes is the way to go. =item SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG -ssl3.netscape.com:443, first a connection is established with RC4-MD5. -If it is then resumed, we end up using DES-CBC3-SHA. It should be -RC4-MD5 according to 7.6.1.3, 'cipher_suite'. - -Netscape-Enterprise/2.01 (https://merchant.netscape.com) has this bug. -It only really shows up when connecting via SSLv2/v3 then reconnecting -via SSLv3. The cipher list changes.... - -NEW INFORMATION. Try connecting with a cipher list of just -DES-CBC-SHA:RC4-MD5. For some weird reason, each new connection uses -RC4-MD5, but a re-connect tries to use DES-CBC-SHA. So netscape, when -doing a re-connect, always takes the first cipher in the cipher list. +As of OpenSSL 0.9.8q and 1.0.0c, this option has no effect. =item SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG |