In kannel-1.4.4/gwlib/conn.c, conn_init_ssl() uses SSLv23_client_method(),
and server_ssl_init() uses SSLv23_server_method().  The SSL_CTX_new(3SSL)
manual page says those support all of SSLv2, SSLv3, and TLSv1; and
openssl-1.0.1f/ssl/s23_clnt.c shows that they support TLSv1.1 and TLSv1.2
as well.  Thus, I think Kannel should already be able to connect to a
server that allows only TLSv1, if the server at least understands SSLv2
client hello messages.

If you want to prevent Kannel from using SSLv2 and SSLv3, I guess Kannel
could be changed to call SSL_CTX_set_options or SSL_set_options with
SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3 options.  It would perhaps be easiest
to do that to global_ssl_context and global_server_ssl_context so that
the options apply to all SSL objects.  Is there any scenario in which
one would want to support SSLv3 on some connections but not on all?


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to