| Index: openssl/doc/ssl/SSL_CTX_set_options.pod
|
| ===================================================================
|
| --- openssl/doc/ssl/SSL_CTX_set_options.pod (revision 105093)
|
| +++ openssl/doc/ssl/SSL_CTX_set_options.pod (working copy)
|
| @@ -78,19 +78,8 @@
|
|
|
| =item SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
|
|
|
| -ssl3.netscape.com:443, first a connection is established with RC4-MD5.
|
| -If it is then resumed, we end up using DES-CBC3-SHA. It should be
|
| -RC4-MD5 according to 7.6.1.3, 'cipher_suite'.
|
| +As of OpenSSL 0.9.8q and 1.0.0c, this option has no effect.
|
|
|
| -Netscape-Enterprise/2.01 (https://merchant.netscape.com) has this bug.
|
| -It only really shows up when connecting via SSLv2/v3 then reconnecting
|
| -via SSLv3. The cipher list changes....
|
| -
|
| -NEW INFORMATION. Try connecting with a cipher list of just
|
| -DES-CBC-SHA:RC4-MD5. For some weird reason, each new connection uses
|
| -RC4-MD5, but a re-connect tries to use DES-CBC-SHA. So netscape, when
|
| -doing a re-connect, always takes the first cipher in the cipher list.
|
| -
|
| =item SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG
|
|
|
| ...
|
| @@ -219,8 +208,7 @@
|
| =item SSL_OP_NO_TICKET
|
|
|
| Normally clients and servers will, where possible, transparently make use
|
| -of RFC4507bis tickets for stateless session resumption if extension support
|
| -is explicitly set when OpenSSL is compiled.
|
| +of RFC4507bis tickets for stateless session resumption.
|
|
|
| If this option is set this functionality is disabled and tickets will
|
| not be used by clients or servers.
|
|
|