[fol...@cisco.com - Mon Jul 09 14:14:25 2012]:
Confirmed. The problem is resolved in the latest snapshot. Thank you.
OK, thanks for the report, ticket resolved.
Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see:
Confirmed. The problem is resolved in the latest snapshot. Thank you.
On 07/06/2012 04:57 PM, Stephen Henson via RT wrote:
[fol...@cisco.com - Fri Jul 06 17:50:15 2012]:
RFC 5246 allows a TLS 1.2 client to omit the Signature Algorithm
extension. See section 7.4.1.4.1 for details. This
Confirmed. The problem is resolved in the latest snapshot. Thank you.
On 07/06/2012 04:57 PM, Stephen Henson via RT wrote:
[fol...@cisco.com - Fri Jul 06 17:50:15 2012]:
RFC 5246 allows a TLS 1.2 client to omit the Signature Algorithm
extension. See section 7.4.1.4.1 for details. This
RFC 5246 allows a TLS 1.2 client to omit the Signature Algorithm
extension. See section 7.4.1.4.1 for details. This creates a problem
for OpenSSL 1.0.1 when acting as a server and either a DSA or ECDSA
certificate is used. Because the ClientHello does not contain the
Signature Algorithm
[fol...@cisco.com - Fri Jul 06 17:50:15 2012]:
RFC 5246 allows a TLS 1.2 client to omit the Signature Algorithm
extension. See section 7.4.1.4.1 for details. This creates a problem
for OpenSSL 1.0.1 when acting as a server and either a DSA or ECDSA
certificate is used. Because the