https://bugs.kde.org/show_bug.cgi?id=322383
Christian Mollekopf mollek...@kolabsys.com changed:
What|Removed |Added
Status|UNCONFIRMED |CONFIRMED
https://bugs.kde.org/show_bug.cgi?id=322383
--- Comment #3 from Christian Mollekopf mollek...@kolabsys.com ---
According to http://www.openssl.org/docs/ssl/SSL_CTX_new.html
q_SSLv23_client_method is the way to go (and what we're using currently), so
IMO the server should normally just understand
https://bugs.kde.org/show_bug.cgi?id=322383
--- Comment #4 from Christian Mollekopf mollek...@kolabsys.com ---
Wishlist item for forcing encryption version
https://bugs.kde.org/show_bug.cgi?id=328625
--
You are receiving this mail because:
You are on the CC list for the bug.
https://bugs.kde.org/show_bug.cgi?id=322383
--- Comment #5 from Christian Mollekopf mollek...@kolabsys.com ---
The session indeed treats ssl handshake failures the same as other failed
attempts to connect to the server and thus doesn't show the dialog that the
settings are likely incompatible.
https://bugs.kde.org/show_bug.cgi?id=322383
Christian Mollekopf chrig...@fastmail.fm changed:
What|Removed |Added
Status|CONFIRMED |RESOLVED
https://bugs.kde.org/show_bug.cgi?id=322383
Kevin Ottens er...@kde.org changed:
What|Removed |Added
Assignee|er...@kde.org |chrig...@fastmail.fm
--- Comment