[openssl-users] stunnel 5.36 released

2016-09-23 Thread Michał Trojnara
Dear Users, I have released version 5.36 of stunnel. Version 5.36, 2016.09.22, urgency: HIGH * Security bugfixes - OpenSSL DLLs updated to version 1.0.2i. https://www.openssl.org/news/secadv_20160922.txt * New features - Added support for OpenSSL 1.1.0 built with "no-deprecated". -

[openssl-users] stunnel 5.35 released

2016-09-23 Thread Michał Trojnara
Dear Users, I have released version 5.35 of stunnel. The ChangeLog entry: Version 5.35, 2016.07.18, urgency: HIGH * Bugfixes - Fixed incorrectly enforced client certificate requests. - Only default to SO_EXCLUSIVEADDRUSE on Vista and later. - Fixed thread safety of the configuration file

[openssl-users] Disable a cipher suite in openssl.cnf?

2016-09-23 Thread Scott Neugroschl
Hi, I'm afraid the man page on the conf file is not particularly clear. I'm looking at mitigating CVE-2016-2183 (SWEET32), and am not sure how to disable the DES and 3DES suites in the conf file. Can someone give me a hand? --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian

Re: [openssl-users] disable tls renegotiation to avoid the risk of OCSP Status Request extension unbounded memory growth

2016-09-23 Thread Matt Caswell
On 23/09/16 06:07, 知於裘己 wrote: > Hi guys > can i avoid the risk of "OCSP Status Request extension unbounded > memory growth" if i disable server's tls renegotiation ? > in deed, nginx diable tls renegotiation by default since 0.8.23. The issue occurs as a result of the attacker