Hi, Can you try this option SSL_CTX_set_options(m_SslCtx, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3);
instead of disabling using the cipher list regards, James Arivazhagan On Tue, Apr 7, 2015 at 5:41 AM, David Rueter <drue...@assyst.com> wrote: > I would like to disable SSL3 (to prevent POODLE attacks), but I would like > to leave TLS1 enabled (particularly DES-CBC3-SHA, AES128-SHA and > AES256-SHA). > > > > However disabling SSL3 with !SSLv3 disables TLSv1 also. Furthermore, > disabling SSL3 with -SSLv3 then adding in individual ciphers such as > +DES-CBC3-SHA seems to re-enable SSLv3. > > > > In looking at https://www.openssl.org/docs/apps/ciphers.html it looks > like SSL_RSA_WITH_3DES_EDE_CBC_SHA and TLS_RSA_WITH_3DES_EDE_CBC_SHA are > both referred to as DES-CBC3-SHA. > > > > Is this intentional? Are not SSL_RSA_WITH_3DES_EDE_CBC_SHA and > TLS_RSA_WITH_3DES_EDE_CBC_SHA different ciphers? > > > > Is there no way to disable SSL3 while leaving > TLS_RSA_WITH_3DES_EDE_CBC_SHA enabled? > > > > _______________________________________________ > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users > >
_______________________________________________ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users