With the recent vulnerabilities found in OpenSSL, I thought it'd make sense for Apache to check for OpenSSL 0.9.6e or higher.
-Madhu $ cvs diff acinclude.m4 Index: acinclude.m4 =================================================================== RCS file: /home/cvspublic/httpd-2.0/acinclude.m4,v retrieving revision 1.126 diff -u -r1.126 acinclude.m4 --- acinclude.m4 16 Jul 2002 18:33:05 -0000 1.126 +++ acinclude.m4 9 Aug 2002 16:54:30 -0000 @@ -430,7 +430,7 @@ ap_ssltk_version="`$p/openssl version`" case "$ap_ssltk_version" in "OpenSSL "[[1-9]]* | \ - "OpenSSL "0.9.[[6-9]]* | \ + "OpenSSL "0.9.[[6-9]][[e-z]]* | \ "OpenSSL "0.[[1-9]][[0-9]]* ) ap_cv_ssltk="`(cd $p/.. && pwd)`" break @@ -441,7 +441,7 @@ esac done if test "x$ap_cv_ssltk" = "x"; then - AC_MSG_ERROR([requires OpenSSL 0.9.6 or higher]) + AC_MSG_ERROR([requires OpenSSL 0.9.6e or higher]) fi ]) ap_ssltk_base="$ap_cv_ssltk"