Instead output a warning about it and continue with the defaults.
These SSL versions are typically not supported by the TLS libraries since a
long time back already since they are inherently insecure and broken. Asking
for them to be used will just cause an error to be returned slightly later.
In the unlikely event that a user's TLS library actually still supports these
protocol versions, this change might make the request a little less insecure.
Closes #6772
Help: Use SSLv2
Category: tls
---
-Forces curl to use SSL version 2 when negotiating with a remote SSL
-server. Sometimes curl is built without SSLv2 support. SSLv2 is widely
-considered insecure (see RFC 6176).
+This option previously asked curl to use SSLv2, but starting in curl 7.77.0 this
+instruction is ignored. SSLv2 is widely considered insecure (see RFC 6176).
Help: Use SSLv3
Category: tls
---
-Forces curl to use SSL version 3 when negotiating with a remote SSL
-server. Sometimes curl is built without SSLv3 support. SSLv3 is widely
-considered insecure (see RFC 7568).
+This option previously asked curl to use SSLv3, but starting in curl 7.77.0
+this instruction is ignored. SSLv3 is widely considered insecure (see RFC
+7568).
break;
case '2':
/* SSL version 2 */
- config->ssl_version = CURL_SSLVERSION_SSLv2;
+ warnf(global, "Ignores instruction to use SSLv2\n");
break;
case '3':
/* SSL version 3 */
- config->ssl_version = CURL_SSLVERSION_SSLv3;
+ warnf(global, "Ignores instruction to use SSLv3\n");
break;
case '4':
/* IPv4 */