diff options
author | Klaus Trainer <[email protected]> | 2013-07-17 22:15:31 +0200 |
---|---|---|
committer | Klaus Trainer <[email protected]> | 2013-07-24 14:58:10 +0200 |
commit | c0c09a13112f21cde05f2c4b0fff641addd15bb6 (patch) | |
tree | 74661387a5e21ecca336b0a689b8fbceb0d6045d /test | |
parent | 1cfc4ed0acab89b9531ac36f5ff06eaa862c6cd2 (diff) | |
download | ranch-c0c09a13112f21cde05f2c4b0fff641addd15bb6.tar.gz ranch-c0c09a13112f21cde05f2c4b0fff641addd15bb6.tar.bz2 ranch-c0c09a13112f21cde05f2c4b0fff641addd15bb6.zip |
Work around broken elliptic-curve cipher suites
Unfortunately the implementation of elliptic-curve ciphers that has
been introduced in R16B01 is incomplete. Depending on the particular
client, this can cause the TLS handshake to break during key agreement.
As it turns out that most popular browsers (e.g. Firefox, Chromium,
and Safari) are affected by this bug, we provide this workaround.
This workaround makes sure that only cipher suite implementations that
are not known to be broken are supported by default.
Diffstat (limited to 'test')
0 files changed, 0 insertions, 0 deletions