Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 10 Dec 2009 15:12:40 +0100
From:      Dan Lukes <dan@obluda.cz>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-09:15.ssl
Message-ID:  <4B2101D8.7010201@obluda.cz>
In-Reply-To: <4B20E812.508@default.rs>
References:  <4B20D86B.7080800@default.rs> <86my1rm4ic.fsf@ds4.des.no> <4B20E812.508@default.rs>

next in thread | previous in thread | raw e-mail | index | archive | help

Bogdan Ćulibrk napsal/wrote, On 12/10/09 13:22:
>> That's the whole point, the patch disables session renegotiation because
>> it's fundamentally broken.
>> 
>>> Is there some workaround to make things work along with this advisory?
>> 
>> You didn't mention *what* stopped working.

> basically whole communication between two application relied on using
> exactly this "funcionality" in openssl.

AFAIK, no.

Even after the patch has been installed, my browser is still able to 
connect to SSL aware HTTP servers. My MUA is still sending/receiving 
emails over SMTP/SSL and IMAP/SSL ...

I'm not saying you have no problem, i'm saying the problem is not as 
general as you claim. So we need exact description of your problem.

						Dan





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4B2101D8.7010201>