From: Rainer Jung Date: Mon, 15 Mar 2010 16:02:10 +0000 (+0000) Subject: Correct referenced OpenSSL version. X-Git-Tag: 2.2.16~108 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=23a032c1157a4cf3b0fd38de8a12463b2a5e299e;p=thirdparty%2Fapache%2Fhttpd.git Correct referenced OpenSSL version. Backport of r923313. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@923314 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index a3635a00ab7..f441b725565 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -1827,8 +1827,8 @@ during a renegotiation. This vulnerability allowed an attacker to server. A protocol extension was developed which fixed this vulnerability if supported by both client and server.

-

If mod_ssl is linked against OpenSSL version 1.0.0 -Beta 5 or later, by default renegotiation is only supported with +

If mod_ssl is linked against OpenSSL version 0.9.8m +or later, by default renegotiation is only supported with clients supporting the new protocol extension. If this directive is enabled, renegotiation will be allowed with old (unpatched) clients, albeit insecurely.