On Friday November 13 2015 11:30:59 Jeremy Huddleston Sequoia wrote:

> I don't understand what you mean here.  These methods *force* the use of 
> SSLv2 even if secure alternatives are available:
> 
> qt.network.ssl: QSslSocket: cannot resolve SSLv2_client_method
> qt.network.ssl: QSslSocket: cannot resolve SSLv2_server_method

They surely do when you call them, but not when you only resolve them, i.e. 
load them dynamically. As I have tried to point out before, Qt loads these and 
most if not all optionally supported SSL functions dynamically. It is then up 
to the user to decide what s/he is actually going to use; see 
QSslContext::fromConfiguration().

It is perfectly possible to exclude support for SSL2 (since 2012) and SSL3 
(since this year), btw.

> And from the SSL_CTX_new(3) man page, the recommendation is to use 
> SSLv23_method et al when compatibility is a concern

>From the above method:

    case QSsl::SecureProtocols:
        // SSLv2 and SSLv3 will be disabled by SSL options
        // But we need q_SSLv23_server_method() otherwise AnyProtocol will be 
unable to connect on Win32.
    case QSsl::TlsV1SslV3:
        // SSLv2 will will be disabled by SSL options
    case QSsl::AnyProtocol:
    default:
        sslContext->ctx = q_SSL_CTX_new(client ? q_SSLv23_client_method() : 
q_SSLv23_server_method());
        break;

> 20 years!  There is absolutely NO excuse for any piece of software still 
> using it.

Sure there is. That hypothetical 20+ year old closed-source binary library 
someone distantly related fundamental science colleague of mine still relies on 
and that magically still works with the latest Qt library... :)

R
_______________________________________________
macports-users mailing list
macports-users@lists.macosforge.org
https://lists.macosforge.org/mailman/listinfo/macports-users

Reply via email to