Displaying 7 results from an estimated 7 matches for "ssl_op_no_sslv3".
2019 Nov 26
2
ssl_min_protocol = TLSv1.3 does not work
...ecot.
On connection, I'm getting an error that 1.3 is an "Unknown
ssl_min_protocol setting".
Reading the source code, it seems that `openssl_min_protocol_to_options` in
`src/lib-ssl-iostream/iostream-openssl-common.c` is simply missing an entry
like
{ SSL_TXT_TLSV1_3, TLS1_3_VERSION, SSL_OP_NO_SSLv3 | SSL_OP_NO_TLSv1 |
SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2 }
Is this a bug, something intentional, or has it simply not been added yet
because nobody has been crazy enough to ask for it?
Kind regards,
Laurens
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http...
2015 Apr 17
2
Disable SSLv3 in sendmail in CentOS 5
RedHat released sendmail-8.13.8-10.el5_11.src.rpm which includes
sendmail-8.13.8-ssl-opts.patch which adds support for disabling SSLv3 and
SSLv2 in sendmail.cf
But as far as I can see there is no support in sendmail.mc - I can't see
how to compile sendmail.mc to get the required line ServerSSLOptions in
sendmail.cf
Does anyone know how to do this ?
--
Andrew Daviel, TRIUMF, Canada
2015 Apr 17
0
Disable SSLv3 in sendmail in CentOS 5
...il.mc - I can't
> see how to compile sendmail.mc to get the required line
> ServerSSLOptions in sendmail.cf
>
>
> Does anyone know how to do this ?
At the end of sendmail.mc, after the MAILER macros, add a
LOCAL_CONFIG, e.g,,
LOCAL_CONFIG
O ClientSSLOptions=+SSL_OP_NO_SSLv2 +SSL_OP_NO_SSLv3
O ServerSSLOptions=+SSL_OP_NO_SSLv2 +SSL_OP_NO_SSLv3 +SSL_OP_CIPHER_SERVER_PREFERENCE
--
Paul Heinlein
heinlein at madboa.com
45?38' N, 122?6' W
2014 Oct 19
3
Dovecote 1.2.17 poodle
Hi, how do I protect dovecot 1.2.17 against poodle?
Br
/Marc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://dovecot.org/pipermail/dovecot/attachments/20141019/b4152487/attachment-0001.sig>
2015 Jul 04
1
sendmail tls and oppenssl
Am 04.07.2015 um 15:34 schrieb Gregory P. Ennis <PoMec at PoMec.Net>:
> On Sat, 2015-07-04 at 08:07 -0500, Gregory P. Ennis wrote:
>> Everyone,
>>
>> Looks like the new version of oppenssl has broken my sendmail's use
>> of
>> tls. Has anyone else had this problem or seen a fix?
>>
>> Greg Ennis
>>
2019 Nov 27
0
ssl_min_protocol = TLSv1.3 does not work
...ng an error that 1.3 is an "Unknown
> ssl_min_protocol setting".
> Reading the source code, it seems that
> `openssl_min_protocol_to_options` in
> `src/lib-ssl-iostream/iostream-openssl-common.c` is simply missing an
> entry like
>
> { SSL_TXT_TLSV1_3, TLS1_3_VERSION, SSL_OP_NO_SSLv3 | SSL_OP_NO_TLSv1 |
> SSL_OP_NO_TLSv1_1 | SSL_OP_NO_TLSv1_2 }
>
> Is this a bug, something intentional, or has it simply not been added
> yet because nobody has been crazy enough to ask for it?
>
> Kind regards,
>
> Laurens
Hi!
Just haven't gotten round to implement t...
2017 Sep 13
2
[RFC master-2.2 0/1] Support OpenSSL 1.1 API for setting allowed TLS versions
Hi,
I came up with the following patch while trying to figure out a good solution
for the situation described in Debian bug #871987[1]. In short, OpenSSL in
Debian unstable has disabled TLSv1.0 and TLSv1.1 *by default*. That means that
unless an application requests otherwise, only TLSv1.2 is supported. In the
world of e-mail this is seemingly an issue, as there are still way too many old
clients