On 5/30/2014 12:03 AM, Dave Thompson wrote:
From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm
Sent: Wednesday, May 28, 2014 13:04
On 5/25/2014 2:22 PM, Hanno Böck wrote:
Some clients (e.g. all common browsers) do fallbacks that in fact
can invalidate all improvements of later
From: owner-openssl-us...@openssl.org On Behalf Of Jakob Bohm
Sent: Wednesday, May 28, 2014 13:04
On 5/25/2014 2:22 PM, Hanno Böck wrote:
Some clients (e.g. all common browsers) do fallbacks that in fact
can invalidate all improvements of later tls versions.
These fallbacks also can
On 5/25/2014 2:22 PM, Hanno Böck wrote:
On Fri, 23 May 2014 16:32:15 +
Viktor Dukhovni openssl-us...@dukhovni.org wrote:
On Fri, May 23, 2014 at 06:11:05PM +0200, nicolas@free.fr wrote:
use at the very least TLSv1 (and preferably TLSv1_2) protocol if
you want to use
On Fri, 23 May 2014 16:32:15 +
Viktor Dukhovni openssl-us...@dukhovni.org wrote:
On Fri, May 23, 2014 at 06:11:05PM +0200, nicolas@free.fr wrote:
use at the very least TLSv1 (and preferably TLSv1_2) protocol if
you want to use SSLv23_server_method(), don't forget to disable
SSLv2
On Sun, May 25, 2014 at 02:22:34PM +0200, Hanno B?ck wrote:
Typically, leaving SSLv3 enabled is just fine if both ends support
something stronger they'll negotiate that.
That's not always true.
In a browser fallback (only relevant here if the OP is implementing
an HTTP server) nothing
Am 23.05.2014 14:16, schrieb Subrata Dasgupta:
Hello Sir / Madam,
I am very much new to openssl programming. I want to make a TCP
connection secure using openssl. I do not want to use any certificate
or keys.. Is it possible to make a TCP connection secure without using
certificate or keys??
There's no such thing as a secure TCP conversation, or any other
communication channel, except in the context of a threat model - and even then
security only applies in relative terms, to things like risk probabililties and
costs. Security is not an absolute condition.
Thus there's no way to
Hi,
not really answering the initial question, but these could be some good advices
:
first of all, upgrade your library to the latest version (1.0.1g I think), the
one you're using seems a bit old and download is free ;-p
second, you should avoid SSLv2, it is not secure anymore, and since a
On Fri, May 23, 2014 at 06:11:05PM +0200, nicolas@free.fr wrote:
use at the very least TLSv1 (and preferably TLSv1_2) protocol if you want
to use SSLv23_server_method(), don't forget to disable SSLv2 and 3 protocols
(and maybe TLSv1) with the command
SSL_CTX_set_options(ctx,
communication
Nico
- Mail d'origine -
De: Viktor Dukhovni openssl-us...@dukhovni.org
À: openssl-users@openssl.org
Envoyé: Fri, 23 May 2014 18:32:15 +0200 (CEST)
Objet: Re: Re?: How to make a secure tcp connection without using certificate
On Fri, May 23, 2014 at 06:11:05PM +0200, nicolas
10 matches
Mail list logo