Index: openssl/doc/ssl/SSL_CTX_set_options.pod |
=================================================================== |
--- openssl/doc/ssl/SSL_CTX_set_options.pod (revision 105093) |
+++ openssl/doc/ssl/SSL_CTX_set_options.pod (working copy) |
@@ -78,19 +78,8 @@ |
=item SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG |
-ssl3.netscape.com:443, first a connection is established with RC4-MD5. |
-If it is then resumed, we end up using DES-CBC3-SHA. It should be |
-RC4-MD5 according to 7.6.1.3, 'cipher_suite'. |
+As of OpenSSL 0.9.8q and 1.0.0c, this option has no effect. |
-Netscape-Enterprise/2.01 (https://merchant.netscape.com) has this bug. |
-It only really shows up when connecting via SSLv2/v3 then reconnecting |
-via SSLv3. The cipher list changes.... |
- |
-NEW INFORMATION. Try connecting with a cipher list of just |
-DES-CBC-SHA:RC4-MD5. For some weird reason, each new connection uses |
-RC4-MD5, but a re-connect tries to use DES-CBC-SHA. So netscape, when |
-doing a re-connect, always takes the first cipher in the cipher list. |
- |
=item SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG |
... |
@@ -219,8 +208,7 @@ |
=item SSL_OP_NO_TICKET |
Normally clients and servers will, where possible, transparently make use |
-of RFC4507bis tickets for stateless session resumption if extension support |
-is explicitly set when OpenSSL is compiled. |
+of RFC4507bis tickets for stateless session resumption. |
If this option is set this functionality is disabled and tickets will |
not be used by clients or servers. |