From: Dr Stephen Henson <[EMAIL PROTECTED]> drh> Yes I was thinking we should make OpenSSL tolerate this, either by drh> default or a bug option. The only way you'll see this though is by drh> connecting with a broken client on an OpenSSL server that disables TLS. My vote for a bug option rather than having it on by default... -- Richard Levitte \ Spannv�gen 38, II \ [EMAIL PROTECTED] Chairman@Stacken \ S-168 35 BROMMA \ T: +46-8-26 52 47 Redakteur@Stacken \ SWEDEN \ or +46-709-50 36 10 Procurator Odiosus Ex Infernis -- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Software Engineer, Celo Communications: http://www.celocom.com/ Unsolicited commercial email is subject to an archival fee of $400. See <http://www.stacken.kth.se/~levitte/mail/> for more info. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: Bug in SSLv3 protocol using SSLv23 method
Richard Levitte - VMS Whacker Tue, 23 May 2000 06:13:20 -0700
- Bug in SSLv3 protocol using SSLv23 method Claus Assmann
- Re: Bug in SSLv3 protocol using SSLv23 ... Dr Stephen Henson
- Re: Bug in SSLv3 protocol using SSL... Bodo Moeller
- Re: Bug in SSLv3 protocol using... Dr Stephen Henson
- Re: Bug in SSLv3 protocol u... Richard Levitte - VMS Whacker
- Re: Bug in SSLv3 protocol u... Bodo Moeller
- Re: Bug in SSLv3 proto... Dr Stephen Henson
