Am 09.11.2014 um 00:54 schrieb Julian Gilbey:
> On Fri, Nov 07, 2014 at 10:58:22PM +0100, Peter Meiser wrote:
>> Hi Julian,
>>
>> looking at your solution for bug #767301, you use TLSv1_client_method() 
>> instead of SSLv3_client_method.
>>
>> Why did you use this method instead of SSLv23_client_method()? Because with 
>> SSLv23_client_method, TLS/SSL connection established with this method may 
>> understand the SSLv2, SSLv3, TLSv1, TLSv1.1 and TLSv1.2 protocols and is not 
>> limited to TLSv1.
>>
>> Just my thoughts.
>> Best regards,
>> Peter
> 
> Hi Peter,
> 
> You are right, I could have used SSLv23_client_method, and that would
> look nicer.  However, AFAICT it would make no difference, as openssl
> is now configured with no-ssl2 no-ssl3, so SSLv23_client_method will
> only use TLSv1 anyway.
> 
> Or am I wrong on this?
> 
>    Julian
> 
Hi Julian,

you "forbid"/exclude the usage of TLS 1.1 and TLS 1.2 if you use 
TLSv1_client_method. This is not the case if you use SSLv23_client_method as 
all TLS versions are included and can be negotiated.

Best regards,
Peter


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to