On Jul 26, 2010, at 3:32 PM, Charlie Brady wrote:

> On Mon, 26 Jul 2010, Matt Simerson wrote:
> 
>>> Please note that SSL_version is distinct from cipher list, and is not 
>>> settable in the current code.
>> 
>> Sure, but what types of SSL connections are allowed when we exclude the 
>> insecure SSLv2 ciphers?
> 
> Good point.
> 
>> Mine is also a simple untested patch, but I'm reasonably confident it 
>> will do exactly what is desired. By changing a config file rather than 
>> code, my solution is less likely to cause future problems.
> 
> OK, but you are proposing adding code aren't you, to add the 
> all/high/medium/pci aliases?

I did, initially. But once I peeked under the hood, I noticed that the plugin 
already has the openssl cipher strings stored in a config file. Rather than add 
the aliases, I just submitted a patch that altered the config file. 

>> If you still wish to set SSL_version explicitly, make it a config file 
>> option and set the default value to 'SSLv3' instead, which includes 
>> TLSv1. That effectively does what you said cannot be done (disable only 
>> SSLv2).
> 
> I didn't realise the SSLv3 includes TLSv1. Did I miss that in the pod? Or 
> is it just implicit in that TLSv1 is SSLv3.1, and SSLv3 means SSLv3.x?

I didn't bother much with the POD, because I'm familiar enough with openssl and 
what it provides. The TLS being included in SSLv3 is noted on this page: 
http://www.openssl.org/docs/apps/ciphers.html

>> I'm confident such a patch would be welcomed and committed.
> 
> I think you've convinced me that it is not required. Do you think it would 
> be useful?

Perhaps, but I can't imagine why. 

Matt

Matt

Reply via email to