> From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
> us...@openssl.org] On Behalf Of Jeffrey Walton
> Sent: Friday, 24 October, 2014 09:42
> To: OpenSSL Users List
> Subject: Re: openssl SSL3 vulnerability
> 
> On Fri, Oct 24, 2014 at 9:30 AM, Michael Wojcik
> <michael.woj...@microfocus.com> wrote:
> > You have "SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv2" there. I assume "v2 ... v2" is
> > a typo, but if that's what your code actually has, then that's the problem.
> > (Assuming there isn't some other problem, of course.)
> >
> That's actually correct in this case.
> 
> $ cat ssl/ssl.h | grep SSL_OP_NO_
> #define SSL_OP_NO_QUERY_MTU                 0x00001000L
> #define SSL_OP_NO_TICKET                0x00004000L
> #define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION    0x00010000L
> #define SSL_OP_NO_COMPRESSION                0x00020000L
> #define SSL_OP_NO_SSLv2                    0x01000000L
> #define SSL_OP_NO_SSLv3                    0x02000000L
> #define SSL_OP_NO_TLSv1                    0x04000000L
> #define SSL_OP_NO_TLSv1_2                0x08000000L
> #define SSL_OP_NO_TLSv1_1                0x10000000L

"Correct" how? He says he wants to disable SSLv3, but he's ORing OP_NO_SSLv2 
with itself (in the pseudocode he posted), and not using SSL_OP_NO_SSLv3. That 
was my point.

My assumption was this was a typo in the pseudocode, but if it also exists in 
the real code, then he's not setting SSL_OP_NO_SSLv3.

Am I missing something?

-- 
Michael Wojcik
Technology Specialist, Micro Focus




This message has been scanned for malware by Websense. www.websense.com
:��I"Ϯ��r�m����
(����Z+�K�+����1���x��h����[�z�(����Z+���f�y�������f���h��)z{,���

Reply via email to