Hey guys,
It took me about an hour to fix all the documentation, pod2man fails in
several files.
The patch file is attached.
If the file can't be opened for whatever reasons, it's also on pastebin:
http://pastebin.com/7Qy5RcpN
Used the download link from yesterday for openssl-1.0.1g and
Hey guys,
I found several documentation bugs in an up2date pod2man environment.
Compiled on bleeding-edge Ubuntu 14.04 dev.
The fixes diff file for the documentation is applied.
Version: 1.0.1g
Github Issue (for tracking): https://github.com/openssl/openssl/issues/57
PS: I also uploaded
On Tuesday, April 08, 2014 at 10:20 AM, Christoph Martens wrote:
Hey guys,
I found several documentation bugs in an up2date pod2man environment.
Compiled on bleeding-edge Ubuntu 14.04 dev.
The fixes diff file for the documentation is applied. Version: 1.0.1g
Github Issue (for tracking):
On Tuesday, April 08, 2014 at 10:20 AM, Christoph Martens wrote:
Hey guys,
I found several documentation bugs in an up2date pod2man environment.
Compiled on bleeding-edge Ubuntu 14.04 dev.
The fixes diff file for the documentation is applied. Version: 1.0.1g
Github Issue (for tracking):
Is openssl sending heartbeat response packets during the handshake, and if so,
should it be sending them during the handshake?
The heartbleed web site indicates that openssl is responding to heartbeat
requests during the handshake.
http://heartbleed.com/
... heartbeat request can be sent and is
(Meant to post this on OpenSSL dev, but sent it to user in error, although
I am getting some good answers there as well).
Team, I am having a discussions with a few friends about why this OpenSSL
vuln (CVE 2014-0160) does not affect SSH. This may be TOO basic for many of
you
On 04/08/2014 11:08 PM, Chris Hill wrote:
SSH and SSL/TLS are simply different protocols (doh). They may share some
similar underlying crypto implementations, but as of their respective RFCs,
they are just different protocols. The TLS Heartbeat TLS extension would
not apply to SSH.
The above