Dear Users,
I have released version 5.36 of stunnel.
Version 5.36, 2016.09.22, urgency: HIGH
* Security bugfixes
- OpenSSL DLLs updated to version 1.0.2i.
https://www.openssl.org/news/secadv_20160922.txt
* New features
- Added support for OpenSSL 1.1.0 built with "no-deprecated".
-
Dear Users,
I have released version 5.35 of stunnel.
The ChangeLog entry:
Version 5.35, 2016.07.18, urgency: HIGH
* Bugfixes
- Fixed incorrectly enforced client certificate requests.
- Only default to SO_EXCLUSIVEADDRUSE on Vista and later.
- Fixed thread safety of the configuration file
Hi,
I'm afraid the man page on the conf file is not particularly clear. I'm
looking at mitigating CVE-2016-2183 (SWEET32), and am not sure how to disable
the DES and 3DES suites in the conf file.
Can someone give me a hand?
---
Scott Neugroschl | XYPRO Technology Corporation
4100 Guardian
On 23/09/16 06:07, 知於裘己 wrote:
> Hi guys
> can i avoid the risk of "OCSP Status Request extension unbounded
> memory growth" if i disable server's tls renegotiation ?
> in deed, nginx diable tls renegotiation by default since 0.8.23.
The issue occurs as a result of the attacker