summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorschwarze <>2018-02-27 17:17:00 +0000
committerschwarze <>2018-02-27 17:17:00 +0000
commit3fb6affa96233bd790805144d8a6a20c961a68e8 (patch)
tree45cb1ba3373faeef0d5c78cb240ae3df25645216 /src
parentfcbddf4e7f38e5e64ebf1df1b6b2c505ba2564fe (diff)
downloadopenbsd-3fb6affa96233bd790805144d8a6a20c961a68e8.tar.gz
openbsd-3fb6affa96233bd790805144d8a6a20c961a68e8.tar.bz2
openbsd-3fb6affa96233bd790805144d8a6a20c961a68e8.zip
sort option list alphabetically in preparation for adding missing options;
no text change
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/man/SSL_CTX_set_options.356
1 files changed, 28 insertions, 28 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_options.3 b/src/lib/libssl/man/SSL_CTX_set_options.3
index f7445ad7c4..453ffdcdf3 100644
--- a/src/lib/libssl/man/SSL_CTX_set_options.3
+++ b/src/lib/libssl/man/SSL_CTX_set_options.3
@@ -1,4 +1,4 @@
1.\" $OpenBSD: SSL_CTX_set_options.3,v 1.5 2018/02/27 17:08:20 schwarze Exp $ 1.\" $OpenBSD: SSL_CTX_set_options.3,v 1.6 2018/02/27 17:17:00 schwarze Exp $
2.\" full merge up to: OpenSSL 7946ab33 Dec 6 17:56:41 2015 +0100 2.\" full merge up to: OpenSSL 7946ab33 Dec 6 17:56:41 2015 +0100
3.\" selective merge up to: OpenSSL edb79c3a Mar 29 10:07:14 2017 +1000 3.\" selective merge up to: OpenSSL edb79c3a Mar 29 10:07:14 2017 +1000
4.\" 4.\"
@@ -169,22 +169,28 @@ The following
169.Em modifying 169.Em modifying
170options are available: 170options are available:
171.Bl -tag -width Ds 171.Bl -tag -width Ds
172.It Dv SSL_OP_TLS_ROLLBACK_BUG
173Disable version rollback attack detection.
174.Pp
175During the client key exchange, the client must send the same information
176about acceptable SSL/TLS protocol levels as during the first hello.
177Some clients violate this rule by adapting to the server's answer.
178(Example: the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1,
179the server only understands up to SSLv3.
180In this case the client must still use the same SSLv3.1=TLSv1 announcement.
181Some clients step down to SSLv3 with respect to the server's answer and violate
182the version rollback protection.)
183.It Dv SSL_OP_CIPHER_SERVER_PREFERENCE 172.It Dv SSL_OP_CIPHER_SERVER_PREFERENCE
184When choosing a cipher, use the server's preferences instead of the client 173When choosing a cipher, use the server's preferences instead of the client
185preferences. 174preferences.
186When not set, the server will always follow the client's preferences. 175When not set, the server will always follow the client's preferences.
187When set, the server will choose following its own preferences. 176When set, the server will choose following its own preferences.
177.It Dv SSL_OP_LEGACY_SERVER_CONNECT
178Allow legacy insecure renegotiation between OpenSSL and unpatched servers
179.Em only :
180this option is currently set by default.
181See the
182.Sx SECURE RENEGOTIATION
183section for more details.
184.It Dv SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION
185When performing renegotiation as a server, always start a new session (i.e.,
186session resumption requests are only accepted in the initial handshake).
187This option is not needed for clients.
188.It Dv SSL_OP_NO_TICKET
189Normally clients and servers will, where possible, transparently make use of
190RFC4507bis tickets for stateless session resumption.
191.Pp
192If this option is set this functionality is disabled and tickets will not be
193used by clients or servers.
188.It Dv SSL_OP_NO_TLSv1 194.It Dv SSL_OP_NO_TLSv1
189Do not use the TLSv1.0 protocol. 195Do not use the TLSv1.0 protocol.
190Deprecated; use 196Deprecated; use
@@ -197,23 +203,17 @@ Do not use the TLSv1.2 protocol.
197Deprecated; use 203Deprecated; use
198.Xr SSL_CTX_set_max_proto_version 3 204.Xr SSL_CTX_set_max_proto_version 3
199instead. 205instead.
200.It Dv SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION 206.It Dv SSL_OP_TLS_ROLLBACK_BUG
201When performing renegotiation as a server, always start a new session (i.e., 207Disable version rollback attack detection.
202session resumption requests are only accepted in the initial handshake).
203This option is not needed for clients.
204.It Dv SSL_OP_NO_TICKET
205Normally clients and servers will, where possible, transparently make use of
206RFC4507bis tickets for stateless session resumption.
207.Pp 208.Pp
208If this option is set this functionality is disabled and tickets will not be 209During the client key exchange, the client must send the same information
209used by clients or servers. 210about acceptable SSL/TLS protocol levels as during the first hello.
210.It Dv SSL_OP_LEGACY_SERVER_CONNECT 211Some clients violate this rule by adapting to the server's answer.
211Allow legacy insecure renegotiation between OpenSSL and unpatched servers 212(Example: the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1,
212.Em only : 213the server only understands up to SSLv3.
213this option is currently set by default. 214In this case the client must still use the same SSLv3.1=TLSv1 announcement.
214See the 215Some clients step down to SSLv3 with respect to the server's answer and violate
215.Sx SECURE RENEGOTIATION 216the version rollback protection.)
216section for more details.
217.El 217.El
218.Pp 218.Pp
219The following options used to be supported at some point in the past 219The following options used to be supported at some point in the past