That makes sense, we've disabled sslv2 and sslv3 and I expected the no_tls1 
option to allow a higher version to connect but it wouldn't connect at all.  I 
should have remembered that it's implemented as a contiguous range!  Thanks for 
the quick response .. N

-----Original Message-----
From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
Benjamin Kaduk
Sent: Tuesday, December 01, 2015 3:34 PM
To: openssl-users@openssl.org
Subject: Re: [openssl-users] s_client -no_tls1 option

On 12/01/2015 05:28 PM, Nounou Dadoun wrote:
> Getting an unexpected result, does the no_tls1 option for s_client 
> mean "don't use tls1" (and everything else is ok) or does it mean 
> "don't use tls1 or tls1.1 or tls1.2"?  I expected the former but I'm 
> observing the latter!  (The man page doesn't go into that much 
> detail.) ... N
>

The latter.

The TLS protocol only specifies a maximum version supported by the client (and 
in practice there are some heuristics using the record protocol version to 
indicate the minimum version supported), so the client is essentially claiming 
just a contiguous range.  Once 1.0 is removed, the higher versions are as well. 
 (I would have to check to see how this interacts with no_ssl2 and no_ssl3.)

-Ben Kaduk
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
_______________________________________________
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to