Anyway, any workaround for this?

On Sat, Jan 30, 2010 at 11:16 AM, Arno Garrels <arno.garr...@gmx.de> wrote:

> Fastream Technologies wrote:
>
> >> I found this issue and posted it to the OpenSSL mailing list in Oct.
> >> 2009, with no reply, it's probably the same issue:
> >> "My client uses sslv23_method() with SSL_OP_NO_SSLv2 in
> >> SSL_CTX_set_options.
> >> Since I upgraded to v0.98k the handshake with one particular server
> >> fails with error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3
> >> alert handshake
> >> failure. With OpenSSL v0.98i and earlier no problem at all."
>
> > I am not sure. I just need the ability to force the SSL client to
> > avoid using SSLV2.
>
> Yes that's it, this used to work against all servers with OpenSSL
> v0.98i and earlier, however fails against _some_ with v0.98k.
>
> --
> Arno Garrels
>
>
>
--
To unsubscribe or change your settings for TWSocket mailing list
please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket
Visit our website at http://www.overbyte.be

Reply via email to