Date: Wed, 24 Aug 2016 16:08:12 -0400 From: Lowell Gilbert <freebsd-ports-local@be-well.ilk.org> To: Bernard Spil <brnrd@FreeBSD.org> Cc: Matt Smith <fbsd@xtaz.co.uk>, Mathieu Arnold <mat@freebsd.org>, ports@freebsd.org Subject: Re: Upcoming OpenSSL 1.1.0 release Message-ID: <44lgzm53rn.fsf@be-well.ilk.org> In-Reply-To: <ba968d48738a1b5f05546993e70abf7d@imap.brnrd.eu> (Bernard Spil's message of "Wed, 24 Aug 2016 21:18:14 %2B0200") References: <6d35459045985929d061f3c6cca85efe@imap.brnrd.eu> <0E328A9485C47045F93C19AB@atuin.in.mat.cc> <20160823124201.GB48814@xtaz.uk> <ba968d48738a1b5f05546993e70abf7d@imap.brnrd.eu>
next in thread | previous in thread | raw e-mail | index | archive | help
Bernard Spil <brnrd@FreeBSD.org> writes: > Today new vulnerabilities with (3)DES and BlowFish were made public You're referring to something different than the HTTPS/OpenVPN attacks? Because it really wouldn't be accurate to describe those as vulnerabilities in the ciphers.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44lgzm53rn.fsf>