]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
Bug 4495: Unknown SSL option SSL_OP_NO_TICKET
authorAmos Jeffries <squid3@treenet.co.nz>
Wed, 20 Apr 2016 11:56:48 +0000 (23:56 +1200)
committerAmos Jeffries <squid3@treenet.co.nz>
Wed, 20 Apr 2016 11:56:48 +0000 (23:56 +1200)
src/cf.data.pre

index 3bb232379afd34df0d168a07712037b2de594f55..adbd0063189c67658eb16040cba9a226a2f72eaf 100644 (file)
@@ -2537,13 +2537,16 @@ DOC_START
            NO_TLSv1    Disallow the use of TLSv1.0
            NO_TLSv1_1  Disallow the use of TLSv1.1
            NO_TLSv1_2  Disallow the use of TLSv1.2
+
            SINGLE_DH_USE
                      Always create a new key when using temporary/ephemeral
                      DH key exchanges
-           SSL_OP_NO_TICKET
+
+           NO_TICKET
                      Disable use of RFC5077 session tickets. Some servers
                      may have problems understanding the TLS extension due
                      to ambiguous specification in RFC4507.
+
            ALL       Enable various bug workarounds suggested as "harmless"
                      by OpenSSL. Be warned that this may reduce SSL/TLS
                      strength to some attacks.
@@ -3273,9 +3276,16 @@ DOC_START
                            NO_TLSv1    Disallow the use of TLSv1.0
                            NO_TLSv1_1  Disallow the use of TLSv1.1
                            NO_TLSv1_2  Disallow the use of TLSv1.2
+
                            SINGLE_DH_USE
                                      Always create a new key when using
                                      temporary/ephemeral DH key exchanges
+
+                           NO_TICKET
+                                     Disable use of RFC5077 session tickets. Some servers
+                                     may have problems understanding the TLS extension due
+                                     to ambiguous specification in RFC4507.
+
                            ALL       Enable various bug workarounds
                                      suggested as "harmless" by OpenSSL
                                      Be warned that this reduces SSL/TLS