Hi,
Can you try this option

SSL_CTX_set_options(m_SslCtx, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3);

instead of disabling using the cipher list




regards,

James Arivazhagan



On Tue, Apr 7, 2015 at 5:41 AM, David Rueter <drue...@assyst.com> wrote:

> I would like to disable SSL3 (to prevent POODLE attacks), but I would like
> to leave TLS1 enabled (particularly DES-CBC3-SHA, AES128-SHA and
> AES256-SHA).
>
>
>
> However disabling SSL3 with !SSLv3 disables TLSv1 also.  Furthermore,
> disabling SSL3 with -SSLv3 then adding in individual ciphers such as
> +DES-CBC3-SHA seems to re-enable SSLv3.
>
>
>
> In looking at https://www.openssl.org/docs/apps/ciphers.html it looks
> like SSL_RSA_WITH_3DES_EDE_CBC_SHA and TLS_RSA_WITH_3DES_EDE_CBC_SHA are
> both referred to as DES-CBC3-SHA.
>
>
>
> Is this intentional? Are not SSL_RSA_WITH_3DES_EDE_CBC_SHA and
> TLS_RSA_WITH_3DES_EDE_CBC_SHA different ciphers?
>
>
>
> Is there no way to disable SSL3 while leaving
> TLS_RSA_WITH_3DES_EDE_CBC_SHA enabled?
>
>
>
> _______________________________________________
> openssl-users mailing list
> To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
>
>
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to