Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Dec 2009 15:12:40 +0100
From:      Dan Lukes <dan@obluda.cz>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl
Message-ID:  <4B2101D8.7010201@obluda.cz>
In-Reply-To: <4B20E812.508@default.rs>
References:  <4B20D86B.7080800@default.rs> <86my1rm4ic.fsf@ds4.des.no> <4B20E812.508@default.rs>

next in thread | previous in thread | raw e-mail | index | archive | help
Bogdan =C4=86ulibrk napsal/wrote, On 12/10/09 13:22:
>> That's the whole point, the patch disables session renegotiation becau=
se
>> it's fundamentally broken.
>>=20
>>> Is there some workaround to make things work along with this advisory=
?
>>=20
>> You didn't mention *what* stopped working.

> basically whole communication between two application relied on using
> exactly this "funcionality" in openssl.

AFAIK, no.

Even after the patch has been installed, my browser is still able to=20
connect to SSL aware HTTP servers. My MUA is still sending/receiving=20
emails over SMTP/SSL and IMAP/SSL ...

I'm not saying you have no problem, i'm saying the problem is not as=20
general as you claim. So we need exact description of your problem.

						Dan





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B2101D8.7010201>