diff options
author | schwarze <> | 2018-02-27 17:17:00 +0000 |
---|---|---|
committer | schwarze <> | 2018-02-27 17:17:00 +0000 |
commit | 3fb6affa96233bd790805144d8a6a20c961a68e8 (patch) | |
tree | 45cb1ba3373faeef0d5c78cb240ae3df25645216 /src | |
parent | fcbddf4e7f38e5e64ebf1df1b6b2c505ba2564fe (diff) | |
download | openbsd-3fb6affa96233bd790805144d8a6a20c961a68e8.tar.gz openbsd-3fb6affa96233bd790805144d8a6a20c961a68e8.tar.bz2 openbsd-3fb6affa96233bd790805144d8a6a20c961a68e8.zip |
sort option list alphabetically in preparation for adding missing options;
no text change
Diffstat (limited to 'src')
-rw-r--r-- | src/lib/libssl/man/SSL_CTX_set_options.3 | 56 |
1 files changed, 28 insertions, 28 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_options.3 b/src/lib/libssl/man/SSL_CTX_set_options.3 index f7445ad7c4..453ffdcdf3 100644 --- a/src/lib/libssl/man/SSL_CTX_set_options.3 +++ b/src/lib/libssl/man/SSL_CTX_set_options.3 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: SSL_CTX_set_options.3,v 1.5 2018/02/27 17:08:20 schwarze Exp $ | 1 | .\" $OpenBSD: SSL_CTX_set_options.3,v 1.6 2018/02/27 17:17:00 schwarze Exp $ |
2 | .\" full merge up to: OpenSSL 7946ab33 Dec 6 17:56:41 2015 +0100 | 2 | .\" full merge up to: OpenSSL 7946ab33 Dec 6 17:56:41 2015 +0100 |
3 | .\" selective merge up to: OpenSSL edb79c3a Mar 29 10:07:14 2017 +1000 | 3 | .\" selective merge up to: OpenSSL edb79c3a Mar 29 10:07:14 2017 +1000 |
4 | .\" | 4 | .\" |
@@ -169,22 +169,28 @@ The following | |||
169 | .Em modifying | 169 | .Em modifying |
170 | options are available: | 170 | options are available: |
171 | .Bl -tag -width Ds | 171 | .Bl -tag -width Ds |
172 | .It Dv SSL_OP_TLS_ROLLBACK_BUG | ||
173 | Disable version rollback attack detection. | ||
174 | .Pp | ||
175 | During the client key exchange, the client must send the same information | ||
176 | about acceptable SSL/TLS protocol levels as during the first hello. | ||
177 | Some clients violate this rule by adapting to the server's answer. | ||
178 | (Example: the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1, | ||
179 | the server only understands up to SSLv3. | ||
180 | In this case the client must still use the same SSLv3.1=TLSv1 announcement. | ||
181 | Some clients step down to SSLv3 with respect to the server's answer and violate | ||
182 | the version rollback protection.) | ||
183 | .It Dv SSL_OP_CIPHER_SERVER_PREFERENCE | 172 | .It Dv SSL_OP_CIPHER_SERVER_PREFERENCE |
184 | When choosing a cipher, use the server's preferences instead of the client | 173 | When choosing a cipher, use the server's preferences instead of the client |
185 | preferences. | 174 | preferences. |
186 | When not set, the server will always follow the client's preferences. | 175 | When not set, the server will always follow the client's preferences. |
187 | When set, the server will choose following its own preferences. | 176 | When set, the server will choose following its own preferences. |
177 | .It Dv SSL_OP_LEGACY_SERVER_CONNECT | ||
178 | Allow legacy insecure renegotiation between OpenSSL and unpatched servers | ||
179 | .Em only : | ||
180 | this option is currently set by default. | ||
181 | See the | ||
182 | .Sx SECURE RENEGOTIATION | ||
183 | section for more details. | ||
184 | .It Dv SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION | ||
185 | When performing renegotiation as a server, always start a new session (i.e., | ||
186 | session resumption requests are only accepted in the initial handshake). | ||
187 | This option is not needed for clients. | ||
188 | .It Dv SSL_OP_NO_TICKET | ||
189 | Normally clients and servers will, where possible, transparently make use of | ||
190 | RFC4507bis tickets for stateless session resumption. | ||
191 | .Pp | ||
192 | If this option is set this functionality is disabled and tickets will not be | ||
193 | used by clients or servers. | ||
188 | .It Dv SSL_OP_NO_TLSv1 | 194 | .It Dv SSL_OP_NO_TLSv1 |
189 | Do not use the TLSv1.0 protocol. | 195 | Do not use the TLSv1.0 protocol. |
190 | Deprecated; use | 196 | Deprecated; use |
@@ -197,23 +203,17 @@ Do not use the TLSv1.2 protocol. | |||
197 | Deprecated; use | 203 | Deprecated; use |
198 | .Xr SSL_CTX_set_max_proto_version 3 | 204 | .Xr SSL_CTX_set_max_proto_version 3 |
199 | instead. | 205 | instead. |
200 | .It Dv SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION | 206 | .It Dv SSL_OP_TLS_ROLLBACK_BUG |
201 | When performing renegotiation as a server, always start a new session (i.e., | 207 | Disable version rollback attack detection. |
202 | session resumption requests are only accepted in the initial handshake). | ||
203 | This option is not needed for clients. | ||
204 | .It Dv SSL_OP_NO_TICKET | ||
205 | Normally clients and servers will, where possible, transparently make use of | ||
206 | RFC4507bis tickets for stateless session resumption. | ||
207 | .Pp | 208 | .Pp |
208 | If this option is set this functionality is disabled and tickets will not be | 209 | During the client key exchange, the client must send the same information |
209 | used by clients or servers. | 210 | about acceptable SSL/TLS protocol levels as during the first hello. |
210 | .It Dv SSL_OP_LEGACY_SERVER_CONNECT | 211 | Some clients violate this rule by adapting to the server's answer. |
211 | Allow legacy insecure renegotiation between OpenSSL and unpatched servers | 212 | (Example: the client sends a SSLv2 hello and accepts up to SSLv3.1=TLSv1, |
212 | .Em only : | 213 | the server only understands up to SSLv3. |
213 | this option is currently set by default. | 214 | In this case the client must still use the same SSLv3.1=TLSv1 announcement. |
214 | See the | 215 | Some clients step down to SSLv3 with respect to the server's answer and violate |
215 | .Sx SECURE RENEGOTIATION | 216 | the version rollback protection.) |
216 | section for more details. | ||
217 | .El | 217 | .El |
218 | .Pp | 218 | .Pp |
219 | The following options used to be supported at some point in the past | 219 | The following options used to be supported at some point in the past |