On 08 Apr 2014, at 19:19, mclellan, dave <dave.mclel...@emc.com> wrote:

> Hi all.   There are two mitigations possible for the  recently discovered 
> Heartbleed attack.
>  
> Ø  Upgrade to 1.0.1g, released yesterday with a fix
> Ø  Recompile a vulnerable release with –DOPENSSL_NO_HEARTBEATS
>  
> Suppose we choose the latter.   We might be installed into a server host in a 
> shop with an earlier release of our software on the clients.   Is it an issue 
> if the server refuses to do heartbeats but the client expects to use them?    
> or is there a negotiation element that determines their shared capability WRT 
> heartbeats? 
Support is negotiated as part of the TLS handshake. So the client has always
to deal with the case that the server doesn't support it or does not
allow the client to send Heartbeats.

Best regards
Michael
>  
> Thanks.
>  
> +-+-+-+-+-+-+-+-+-
> Dave McLellan, VMAX Software Engineering, EMC Corporation, 176 South St.
> Mail Stop 176-V1 1/P-36, Hopkinton, MA 01749
> Office:    508-249-1257, Mobile:   978-500-2546, dave.mclel...@emc.com
> +-+-+-+-+-+-+-+-+-

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to