Richard Könning wrote:
Am 20.09.2011 13:19, schrieb Hanno Böck:
It seems some rumors are spreading about an attack presented later this
week against sslv3/tlsv1.0:
http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/
Whatever this attack looks like in detail, all news one can
Am 20.09.2011 22:31, schrieb Hanno Böck:
Am Tue, 20 Sep 2011 20:37:35 +0200
schrieb Richard Könningrichard.koenn...@ts.fujitsu.com:
Please read http://www.openssl.org/~bodo/tls-cbc.txt, problem #2. You
then see that the problem is already addressed in OpenSSL 0.9.6d,
over seven years ago. See
I sent the email below to r...@openssl.org to file a bug as documented on
http://www.openssl.org/support/rt.html
However I have not seen a request created in the request tracker yet or the
original email on this mailing list.
I'm forwarding it to this list in case OpenSSL developers have any
Hi,
I don't know if any other person met this issue.
I use openssl1.0.0e, and working on dtls, in client side, if I
set SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_QUERY_MTU);
SSL_set_mtu(ss_ssl, 1500);
I met a segmentation fault on the client side, using gdb I saw the error
happens in:
memcpy()
On Sep 21, 2011, at 9:40 PM, Huaqing Wang wrote:
Hi,
I don't know if any other person met this issue.
I use openssl1.0.0e, and working on dtls, in client side, if I set
SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_QUERY_MTU);
SSL_set_mtu(ss_ssl, 1500);
I met a segmentation fault on the
Hi Dmitry,
Dmitry Belyavsky wrote:
Greetings!
During the 1.x version the current scheme of
algorithms providing through engines was implemented.
Debugging our (Cryptocom LTD) engines, I’ve found some troubles in the
way it works, please tell me
where I’m mistaken.
Openssl is configured with