Date: Thu, 10 Dec 2009 15:12:40 +0100 From: Dan Lukes <dan@obluda.cz> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl Message-ID: <4B2101D8.7010201@obluda.cz> In-Reply-To: <4B20E812.508@default.rs> References: <4B20D86B.7080800@default.rs> <86my1rm4ic.fsf@ds4.des.no> <4B20E812.508@default.rs>
next in thread | previous in thread | raw e-mail | index | archive | help
Bogdan =C4=86ulibrk napsal/wrote, On 12/10/09 13:22: >> That's the whole point, the patch disables session renegotiation becau= se >> it's fundamentally broken. >>=20 >>> Is there some workaround to make things work along with this advisory= ? >>=20 >> You didn't mention *what* stopped working. > basically whole communication between two application relied on using > exactly this "funcionality" in openssl. AFAIK, no. Even after the patch has been installed, my browser is still able to=20 connect to SSL aware HTTP servers. My MUA is still sending/receiving=20 emails over SMTP/SSL and IMAP/SSL ... I'm not saying you have no problem, i'm saying the problem is not as=20 general as you claim. So we need exact description of your problem. Dan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B2101D8.7010201>