From owner-freebsd-gecko@FreeBSD.ORG Wed Oct 15 09:15:41 2014 Return-Path: Delivered-To: gecko@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 40E24E7B; Wed, 15 Oct 2014 09:15:41 +0000 (UTC) Received: from smtp.des.no (smtp.des.no [194.63.250.102]) by mx1.freebsd.org (Postfix) with ESMTP id 01B28856; Wed, 15 Oct 2014 09:15:40 +0000 (UTC) Received: from nine.des.no (smtp.des.no [194.63.250.102]) by smtp-int.des.no (Postfix) with ESMTP id 07943CDB2; Wed, 15 Oct 2014 09:15:40 +0000 (UTC) Received: by nine.des.no (Postfix, from userid 1001) id 1F2A04F9F; Wed, 15 Oct 2014 11:15:41 +0200 (CEST) From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= To: Eygene Ryabinkin Subject: Re: POODLE SSLv3 vulnerability References: <86iojmgn40.fsf@nine.des.no> Date: Wed, 15 Oct 2014 11:15:41 +0200 In-Reply-To: (Eygene Ryabinkin's message of "Wed, 15 Oct 2014 10:02:17 +0400") Message-ID: <86a94xzoaq.fsf@nine.des.no> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Cc: gecko@freebsd.org, ports-secteam@freebsd.org, chromium@freebsd.org X-BeenThere: freebsd-gecko@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Gecko Rendering Engine issues List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 15 Oct 2014 09:15:41 -0000 Eygene Ryabinkin writes: > I'd also introduce an OPTION for Apache, Nginx and other Web servers > we ship in the ports collection that won't allow to use SSLv3 and turn > it on by-default. This will break some legacy clients, so it should > be an OPTION. stunnel, all Web servers for Ruby and other servers > that do SSL should also be modified to include such modification. That sounds like a good idea, but also a lot of work... DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no