Anyway, any workaround for this? On Sat, Jan 30, 2010 at 11:16 AM, Arno Garrels <arno.garr...@gmx.de> wrote:
> Fastream Technologies wrote: > > >> I found this issue and posted it to the OpenSSL mailing list in Oct. > >> 2009, with no reply, it's probably the same issue: > >> "My client uses sslv23_method() with SSL_OP_NO_SSLv2 in > >> SSL_CTX_set_options. > >> Since I upgraded to v0.98k the handshake with one particular server > >> fails with error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 > >> alert handshake > >> failure. With OpenSSL v0.98i and earlier no problem at all." > > > I am not sure. I just need the ability to force the SSL client to > > avoid using SSLV2. > > Yes that's it, this used to work against all servers with OpenSSL > v0.98i and earlier, however fails against _some_ with v0.98k. > > -- > Arno Garrels > > > -- To unsubscribe or change your settings for TWSocket mailing list please goto http://lists.elists.org/cgi-bin/mailman/listinfo/twsocket Visit our website at http://www.overbyte.be