Date: Thu, 10 Dec 2009 15:12:40 +0100 From: Dan Lukes <dan@obluda.cz> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl Message-ID: <4B2101D8.7010201@obluda.cz> In-Reply-To: <4B20E812.508@default.rs> References: <4B20D86B.7080800@default.rs> <86my1rm4ic.fsf@ds4.des.no> <4B20E812.508@default.rs>
next in thread | previous in thread | raw e-mail | index | archive | help
Bogdan Ćulibrk napsal/wrote, On 12/10/09 13:22: >> That's the whole point, the patch disables session renegotiation because >> it's fundamentally broken. >> >>> Is there some workaround to make things work along with this advisory? >> >> You didn't mention *what* stopped working. > basically whole communication between two application relied on using > exactly this "funcionality" in openssl. AFAIK, no. Even after the patch has been installed, my browser is still able to connect to SSL aware HTTP servers. My MUA is still sending/receiving emails over SMTP/SSL and IMAP/SSL ... I'm not saying you have no problem, i'm saying the problem is not as general as you claim. So we need exact description of your problem. Dan
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B2101D8.7010201>
