提交 b5c002d5 编写于 作者: D Dr. Stephen Henson

clarify docs

上级 4db82571
...@@ -2,7 +2,7 @@ ...@@ -2,7 +2,7 @@
=head1 NAME =head1 NAME
SSL_CTX_set_options, SSL_set_options, SSL_CTX_get_options, SSL_get_options - manipulate SSL options SSL_CTX_set_options, SSL_set_options, SSL_CTX_clear_options, SSL_clear_options, SSL_CTX_get_options, SSL_get_options, SSL_get_secure_renegotiation_support - manipulate SSL options
=head1 SYNOPSIS =head1 SYNOPSIS
...@@ -233,7 +233,7 @@ this option ...@@ -233,7 +233,7 @@ this option
=head1 SECURE RENEGOTIATION =head1 SECURE RENEGOTIATION
OpenSSL by 0.9.8m and later always attempts to use secure renegotiation as OpenSSL 0.9.8m and later always attempts to use secure renegotiation as
described in draft-ietf-tls-renegotiation (FIXME: replace by RFC). This described in draft-ietf-tls-renegotiation (FIXME: replace by RFC). This
counters a prefix attack described in the draft and elsewhere (FIXME: need full counters a prefix attack described in the draft and elsewhere (FIXME: need full
reference). reference).
...@@ -254,13 +254,14 @@ then the connection will fail because it is not possible to determine ...@@ -254,13 +254,14 @@ then the connection will fail because it is not possible to determine
whether an attack is taking place. whether an attack is taking place.
If the option B<SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION> is set then the If the option B<SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION> is set then the
renegotiation between unpatched clients and patched servers is permitted as above restrictions are relaxed. Renegotiation is permissible and initial
well as initial connections and renegotiation between patched clients and initial connections to unpatched servers will succeed.
unpatched servers. This option should be used with caution because it leaves
both clients and servers vulnerable. However unpatched servers and clients are This option should be used with caution because it leaves both clients and
likely to be around for some time and simply refusing to connect to unpatched servers vulnerable. However unpatched servers and clients are likely to be
servers may well be considered unacceptable. So applications may be forced to around for some time and refusing to connect to unpatched servers or denying
use this option for the immediate future. renegotion altogether may be unacceptable. So applications may be forced to
tolerate unsafe renegotiation for the immediate future.
The function SSL_get_secure_renegotiation_support() indicates whether the peer The function SSL_get_secure_renegotiation_support() indicates whether the peer
supports secure renegotiation. supports secure renegotiation.
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册