On Thu, May 3, 2012 at 12:24 PM, Mark Felder wrote:
> On Thu, 03 May 2012 10:21:24 -0500, Robert Simmons
> wrote:
>
>> TLS 1.1:
>> https://bugzilla.mozilla.org/show_bug.cgi?id=565047
>> TLS 1.2:
>> https://bugzilla.mozilla.org/show_bug.cgi?id=480514
>
>
>
> Cool, thanks for the followup!
It look
On Thu, 03 May 2012 10:21:24 -0500, Robert Simmons
wrote:
TLS 1.1:
https://bugzilla.mozilla.org/show_bug.cgi?id=565047
TLS 1.2:
https://bugzilla.mozilla.org/show_bug.cgi?id=480514
Cool, thanks for the followup!
___
freebsd-security@freebsd.org ma
On Thu, May 3, 2012 at 9:40 AM, Mark Felder wrote:
> On Wed, 02 May 2012 17:45:27 -0500, Matt Dawson wrote:
>
>>
>> IE might be the only client with support for those protocols right now
>> but somebody has to lead the way on the server side or you end up with
>> a mutual apathy loop (AKA positiv
On Thursday 03 May 2012 14:40:49 Mark Felder wrote:
> Actually Opera is the only browser on the market that supports TLS
> 1.2
No, IE on Windows 7 supports TLS 1.2, just not out of the box as I
said.
http://technet.microsoft.com/en-us/library/dd560644%28v=WS.10%29.aspx
--
Matt Dawson
GW0VNR
MTD
On Wed, 02 May 2012 17:45:27 -0500, Matt Dawson
wrote:
IE might be the only client with support for those protocols right now
but somebody has to lead the way on the server side or you end up with
a mutual apathy loop (AKA positive can't be arsed feedback loop).
Actually Opera is the only
On Thursday 03 May 2012 00:27:51 Gary Palmer wrote:
> Their website is out of date.
As its primary public-facing information portal, I'm tempted to say
that's an important priority to get right. Yes, volunteer project,
etc, but the BSD way of doing things is to choose the tool for the
job. Al
On Wed, May 2, 2012 at 7:27 PM, Gary Palmer wrote:
> On Wed, May 02, 2012 at 11:45:27PM +0100, Matt Dawson wrote:
>> On Wednesday 02 May 2012 23:14:41 Mark Felder wrote:
>> > Why go out of your way and use mod_gnutls?
>>
>> Because it supports TLSv1.[1|2], which was the PP's question, whereas
>> O
On Wed, May 02, 2012 at 11:45:27PM +0100, Matt Dawson wrote:
> On Wednesday 02 May 2012 23:14:41 Mark Felder wrote:
> > Why go out of your way and use mod_gnutls?
>
> Because it supports TLSv1.[1|2], which was the PP's question, whereas
> OpenSSL doesn't and doesn't show any signs of doing so in
On Wednesday 02 May 2012 23:14:41 Mark Felder wrote:
> Why go out of your way and use mod_gnutls?
Because it supports TLSv1.[1|2], which was the PP's question, whereas
OpenSSL doesn't and doesn't show any signs of doing so in the near
future:
https://www.openssl.org/support/funding/wishlist.htm
On Wed, 02 May 2012 16:01:49 -0500, Matt Dawson
wrote:
mod_gnutls in ports. Setup is simple for Apache. Prefer the RC4 cipher
which secures SSLv3 against BEAST. This setup on my own HTTPS servers
passes Qualys' own tests with an A rating of 87 and tells me BEAST is
mitigated, although the thi
On Wednesday 02 May 2012 13:44:14 Volodymyr Kostyrko wrote:
> And will we ever support TLS v1.[12]? BEAST attack
> seems to be not so far from most of us
mod_gnutls in ports. Setup is simple for Apache. Prefer the RC4 cipher
which secures SSLv3 against BEAST. This setup on my own HTTPS servers
Robert Simmons wrote:
Is there a plan to update OpenSSL to patch for CVE-2012-2131?
Also, is the DOS vulnerability in libkrb5 that Heimdal 1.5.2 patches
present in Heimdal 1.1 which shipped with 9.0-RELEASE?
I'll second this one.
1. Is there any plans on updating openssl and why not? It's get
Is there a plan to update OpenSSL to patch for CVE-2012-2131?
Also, is the DOS vulnerability in libkrb5 that Heimdal 1.5.2 patches
present in Heimdal 1.1 which shipped with 9.0-RELEASE?
___
freebsd-security@freebsd.org mailing list
http://lists.freebsd.o
13 matches
Mail list logo