Dne 24.11.2014 v 15:59 Rob Crittenden napsal(a):
Jan Cholasta wrote:
Dne 21.11.2014 v 16:09 Rob Crittenden napsal(a):
Jan Cholasta wrote:
Hi,
Dne 20.11.2014 v 23:26 Rob Crittenden napsal(a):
Use new capability in python-nss-0.16 to use the NSS protocol range
setter. This lets us enable
On 11/25/2014 09:35 AM, Jan Cholasta wrote:
Dne 24.11.2014 v 15:59 Rob Crittenden napsal(a):
...
2) Configure mod_nss to also support TLS 1.2. It should be done on both
server install and upgrade. This requires a new version of mod_nss.
mod_nss 1.0.10 in F-21 and rawhide should both support
Dne 21.11.2014 v 16:09 Rob Crittenden napsal(a):
Jan Cholasta wrote:
Hi,
Dne 20.11.2014 v 23:26 Rob Crittenden napsal(a):
Use new capability in python-nss-0.16 to use the NSS protocol range
setter. This lets us enable TLSv1.1 and TLSv1.2 for client connections.
I made this configurable via
Jan Cholasta wrote:
Dne 21.11.2014 v 16:09 Rob Crittenden napsal(a):
Jan Cholasta wrote:
Hi,
Dne 20.11.2014 v 23:26 Rob Crittenden napsal(a):
Use new capability in python-nss-0.16 to use the NSS protocol range
setter. This lets us enable TLSv1.1 and TLSv1.2 for client connections.
I made
Hi,
Dne 20.11.2014 v 23:26 Rob Crittenden napsal(a):
Use new capability in python-nss-0.16 to use the NSS protocol range
setter. This lets us enable TLSv1.1 and TLSv1.2 for client connections.
I made this configurable via tls_protocol_range in case somebody wants
to override it.
There isn't a
Jan Cholasta wrote:
Hi,
Dne 20.11.2014 v 23:26 Rob Crittenden napsal(a):
Use new capability in python-nss-0.16 to use the NSS protocol range
setter. This lets us enable TLSv1.1 and TLSv1.2 for client connections.
I made this configurable via tls_protocol_range in case somebody wants
to
Use new capability in python-nss-0.16 to use the NSS protocol range
setter. This lets us enable TLSv1.1 and TLSv1.2 for client connections.
I made this configurable via tls_protocol_range in case somebody wants
to override it.
There isn't a whole ton of error handling on bad input but there is