On 11/14/2015 08:47 AM, Kurt Roeckx wrote:
> On Sat, Nov 14, 2015 at 08:34:47AM -0700, Alex Rousskov wrote:
>> On 11/14/2015 06:39 AM, Kurt Roeckx wrote:
>>> Source: polygraph
>>> Version: 4.3.2-1.2
>>> Severity: serious
>>> Control: block 797926 by -1
>>
>>> I suggest you remove all of that and only use SSLv23_method().
>>> All the other are version specific methods, only SSLv23_* speaks
>>> multiple versions.
>>
>> Removal of other methods is not a good idea because users need to
>> control which methods are used (including the ones unsupported by the
>> latest OpenSSL). We will provide a different fix.
> 
> The other methods will go away in the future because people misuse
> them.  You really should only use the SSLv23_* methods.
> 
> Your users don't have a need to support a specific method that
> only supports a given protocol.  What they might need is to be
> able to limit the supported versions.  As I said you should use
> SSL_set_options() for that.


You might be thinking of some general-use program. Web Polygraph is a
test tool. Testers often have unusual needs, including the need to test
with a method that only supports a given [deprecated] protocol.

If we can provide a small better fix, we will. If a better fix requires
too many unrelated changes to this Polygraph version, we will provide a
patch that disables SSLv3 (until a recent Polygraph version with a
comprehensive fix is released).


Thank you,

Alex.

Reply via email to