From: Rainer Jung
Date: Mon, 15 Mar 2010 16:02:10 +0000 (+0000)
Subject: Correct referenced OpenSSL version.
X-Git-Tag: 2.2.16~108
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=23a032c1157a4cf3b0fd38de8a12463b2a5e299e;p=thirdparty%2Fapache%2Fhttpd.git
Correct referenced OpenSSL version.
Backport of r923313.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@923314 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index a3635a00ab7..f441b725565 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -1827,8 +1827,8 @@ during a renegotiation. This vulnerability allowed an attacker to
server. A protocol extension was developed which fixed this
vulnerability if supported by both client and server.
-If mod_ssl is linked against OpenSSL version 1.0.0
-Beta 5 or later, by default renegotiation is only supported with
+
If mod_ssl is linked against OpenSSL version 0.9.8m
+or later, by default renegotiation is only supported with
clients supporting the new protocol extension. If this directive is
enabled, renegotiation will be allowed with old (unpatched) clients,
albeit insecurely.