>
> diff --git a/src/openvpn/ssl_openssl.c b/src/openvpn/ssl_openssl.c
> index 0b63e26..0785ce4 100644
> --- a/src/openvpn/ssl_openssl.c
> +++ b/src/openvpn/ssl_openssl.c
> @@ -98,10 +98,10 @@ tls_ctx_server_new(struct tls_root_ctx *ctx)
>  {
>    ASSERT(NULL != ctx);
>
> -  ctx->ctx = SSL_CTX_new (SSLv23_server_method ());
> +  ctx->ctx = SSL_CTX_new (TLSv1_server_method ());
>
>    if (ctx->ctx == NULL)
> -    msg (M_SSLERR, "SSL_CTX_new SSLv23_server_method");
> +    msg (M_SSLERR, "SSL_CTX_new TLSv1_server_method");
>  }
>
>  void
> @@ -109,10 +109,10 @@ tls_ctx_client_new(struct tls_root_ctx *ctx)
>  {
>    ASSERT(NULL != ctx);
>
> -  ctx->ctx = SSL_CTX_new (SSLv23_client_method ());
> +  ctx->ctx = SSL_CTX_new (TLSv1_client_method ());
>
>    if (ctx->ctx == NULL)
> -    msg (M_SSLERR, "SSL_CTX_new SSLv23_client_method");
> +    msg (M_SSLERR, "SSL_CTX_new TLSv1_client_method");
>  }
>
Your patch has the same effect. I effectively disables all TLS 1.1+. The
OpenSSL API names are terribly confusing.

SLv23_client_method will negoiate the highest protocol available and 
TLSv1_client_method
 will only negoiate TLS 1.0

Arne


Reply via email to