summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authorschwarze <>2018-02-27 17:08:20 +0000
committerschwarze <>2018-02-27 17:08:20 +0000
commitfcbddf4e7f38e5e64ebf1df1b6b2c505ba2564fe (patch)
treebc67fe2e6ab56778265d3c8edd0d69012a79095a /src
parentfefe4861e4c1cadad558991fb9fe3dea2642edef (diff)
downloadopenbsd-fcbddf4e7f38e5e64ebf1df1b6b2c505ba2564fe.tar.gz
openbsd-fcbddf4e7f38e5e64ebf1df1b6b2c505ba2564fe.tar.bz2
openbsd-fcbddf4e7f38e5e64ebf1df1b6b2c505ba2564fe.zip
Mention that SSL_OP_TLSEXT_PADDING no longer has any effect,
and correct the description of SSL_OP_ALL. Found by inspecting <openssl/ssl.h>.
Diffstat (limited to 'src')
-rw-r--r--src/lib/libssl/man/SSL_CTX_set_options.322
1 files changed, 10 insertions, 12 deletions
diff --git a/src/lib/libssl/man/SSL_CTX_set_options.3 b/src/lib/libssl/man/SSL_CTX_set_options.3
index 98c1a6d365..f7445ad7c4 100644
--- a/src/lib/libssl/man/SSL_CTX_set_options.3
+++ b/src/lib/libssl/man/SSL_CTX_set_options.3
@@ -1,5 +1,6 @@
1.\" $OpenBSD: SSL_CTX_set_options.3,v 1.4 2017/08/19 23:45:10 schwarze Exp $ 1.\" $OpenBSD: SSL_CTX_set_options.3,v 1.5 2018/02/27 17:08:20 schwarze Exp $
2.\" OpenSSL 361a1191 Dec 6 17:56:41 2015 +0100 2.\" full merge up to: OpenSSL 7946ab33 Dec 6 17:56:41 2015 +0100
3.\" selective merge up to: OpenSSL edb79c3a Mar 29 10:07:14 2017 +1000
3.\" 4.\"
4.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>, 5.\" This file was written by Lutz Jaenicke <jaenicke@openssl.org>,
5.\" Bodo Moeller <bodo@openssl.org>, and 6.\" Bodo Moeller <bodo@openssl.org>, and
@@ -51,7 +52,7 @@
51.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED 52.\" ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
52.\" OF THE POSSIBILITY OF SUCH DAMAGE. 53.\" OF THE POSSIBILITY OF SUCH DAMAGE.
53.\" 54.\"
54.Dd $Mdocdate: August 19 2017 $ 55.Dd $Mdocdate: February 27 2018 $
55.Dt SSL_CTX_SET_OPTIONS 3 56.Dt SSL_CTX_SET_OPTIONS 3
56.Os 57.Os
57.Sh NAME 58.Sh NAME
@@ -154,12 +155,9 @@ Disables a countermeasure against a TLS 1.0 protocol vulnerability
154affecting CBC ciphers, which cannot be handled by some broken SSL 155affecting CBC ciphers, which cannot be handled by some broken SSL
155implementations. 156implementations.
156This option has no effect for connections using other ciphers. 157This option has no effect for connections using other ciphers.
157.It Dv SSL_OP_TLSEXT_PADDING
158Adds a padding extension to ensure the ClientHello size is never between 256
159and 511 bytes in length.
160This is needed as a workaround for some implementations.
161.It Dv SSL_OP_ALL 158.It Dv SSL_OP_ALL
162All of the above bug workarounds. 159This is currently an alias for
160.Dv SSL_OP_LEGACY_SERVER_CONNECT .
163.El 161.El
164.Pp 162.Pp
165It is usually safe to use 163It is usually safe to use
@@ -237,7 +235,8 @@ and no longer have any effect:
237.Dv SSL_OP_SSLEAY_080_CLIENT_DH_BUG , 235.Dv SSL_OP_SSLEAY_080_CLIENT_DH_BUG ,
238.Dv SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG , 236.Dv SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG ,
239.Dv SSL_OP_TLS_BLOCK_PADDING_BUG , 237.Dv SSL_OP_TLS_BLOCK_PADDING_BUG ,
240.Dv SSL_OP_TLS_D5_BUG . 238.Dv SSL_OP_TLS_D5_BUG ,
239.Dv SSL_OP_TLSEXT_PADDING .
241.Sh SECURE RENEGOTIATION 240.Sh SECURE RENEGOTIATION
242OpenSSL 0.9.8m and later always attempts to use secure renegotiation as 241OpenSSL 0.9.8m and later always attempts to use secure renegotiation as
243described in RFC5746. 242described in RFC5746.
@@ -268,9 +267,8 @@ alert is sent.
268This is because the server code may be unaware of the unpatched nature of the 267This is because the server code may be unaware of the unpatched nature of the
269client. 268client.
270.Pp 269.Pp
271.Em N.B.: 270Note that a bug in OpenSSL clients earlier than 0.9.8m (all of which
272a bug in OpenSSL clients earlier than 0.9.8m (all of which are unpatched) will 271are unpatched) will result in the connection hanging if it receives a
273result in the connection hanging if it receives a
274.Em no_renegotiation 272.Em no_renegotiation
275alert. 273alert.
276OpenSSL versions 0.9.8m and later will regard a 274OpenSSL versions 0.9.8m and later will regard a