But I'd strongly advise against it since using such a sigalgs list will impact
your ability to interoperate with TLSv1.3 servers.
Matt
>
> Graeme
>
> -Original Message- From: openssl-users
> On Behalf Of Matt Caswell Sent: March 19,
> 2019 10:23 AM To: openssl-users@
ge in behaviour after we upgrade OpenSSL, my
understanding is that they will simply have to fix their server.
Graeme
-Original Message-
From: openssl-users On Behalf Of Matt
Caswell
Sent: March 19, 2019 10:23 AM
To: openssl-users@openssl.org
Subject: Re: Differences in defaults between
On 19/03/2019 13:40, Perrow, Graeme wrote:
> TLS: error: accept - force handshake failure: errno 11 - moznss error -12162
>
> TLS: can't accept: TLS error -12162:Unsupported hash algorithm used by TLS
> peer..
Just to confirm - you've not configured client authentication?
Assuming not, the
On Tuesday, 19 March 2019 14:40:19 CET Perrow, Graeme wrote:
> I have an LDAP server that accepts TLS connections, and I can make a
> connection to it using "openssl s_client -showcerts -host :
> -debug". The output shows this is a TLSv1.2 connection using
> ECDHE-RSA-AES128-SHA. This is using Open