> Then, someone should correct the code to support passing trust anchors,
> allow passing the verify value, and document capabilities and
> limitations.  (*)

I certainly don't have time to do it, and since I can't agree with the
politics behind the whole SSL model, I don't think that I will have
time to implement this in the (near) future.

Someone else?

If not, then do the interested parties agree with this text to be the
warning in the package's description field?

> "This software does not have any authentication capabilities: it does
> not allow you to authenticate your peer, which is a basic requirement
> for TLS/SSL to be used securely. You should only use it for testing
> purposes and not relaying important information. Be aware that you are
> vulnerable to MITM when using it"

Security team: is this doc change enough to close the security issue,
and handle the modification requests (see (*)) as a wishlist?

Thanks for your help and your contribution,
Gergely




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to