]> granicus.if.org Git - apache/commitdiff
Remove grossly outdated browser compatibility column
authorRich Bowen <rbowen@apache.org>
Mon, 23 Sep 2013 01:09:23 +0000 (01:09 +0000)
committerRich Bowen <rbowen@apache.org>
Mon, 23 Sep 2013 01:09:23 +0000 (01:09 +0000)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1525490 13f79535-47bb-0310-9956-ffa450edef68

docs/manual/ssl/ssl_intro.html.en
docs/manual/ssl/ssl_intro.xml

index 0a50c923c0402a916642a3fdf34349a6f6e56fef..eb11da613e57871d4da1855ac5d3365f42f4c7f0 100644 (file)
@@ -384,32 +384,28 @@ establishing a protocol session.</p>
     <tr><td>SSL v2.0</td>
         <td>Vendor Standard (from Netscape Corp.)</td>
         <td>First SSL protocol for which implementations exist</td>
-        <td>- NS Navigator 1.x/2.x<br />
-        - MS IE 3.x<br />
-        - Lynx/2.8+OpenSSL</td></tr>
+    </tr>
     <tr><td>SSL v3.0</td>
         <td>Expired Internet Draft (from Netscape Corp.) [<a href="#SSL3">SSL3</a>]</td>
         <td>Revisions to prevent specific security attacks, add non-RSA
         ciphers and support for certificate chains</td>
-        <td>- NS Navigator 2.x/3.x/4.x<br />
-        - MS IE 3.x/4.x<br />
-        - Lynx/2.8+OpenSSL</td></tr>
+    </tr>
     <tr><td>TLS v1.0</td>
         <td>Proposed Internet Standard (from IETF) [<a href="#TLS1">TLS1</a>]</td>
         <td>Revision of SSL 3.0 to update the MAC layer to HMAC, add block
         padding for block ciphers, message order standardization and more
         alert messages.</td>
-        <td>- Lynx/2.8+OpenSSL</td></tr>
+    </tr>
     <tr><td>TLS v1.1</td>
         <td>Proposed Internet Standard (from IETF) [<a href="#TLS11">TLS11</a>]</td>
         <td>Update of TLS 1.0 to add protection against Cipher block chaining
         (CBC) attacks.</td>
-        <td>-</td></tr>
+    </tr>
     <tr><td>TLS v1.2</td>
         <td>Proposed Internet Standard (from IETF) [<a href="#TLS12">TLS12</a>]</td>
         <td>Update of TLS 1.2 deprecating MD5 as hash, and adding incompatibility
         to SSL so it will never negotiate the use of SSLv2.</td>
-        <td>-</td></tr>
+    </tr>
     </table>
 
 
index 13f51e02507ebd37d6d84488227c5fe2e9fc6548..bf5d3087acab29b14ea7cde2cbae1610fb03830e 100644 (file)
@@ -389,36 +389,32 @@ establishing a protocol session.</p>
     <tr><td>SSL v2.0</td>
         <td>Vendor Standard (from Netscape Corp.)</td>
         <td>First SSL protocol for which implementations exist</td>
-        <td>- NS Navigator 1.x/2.x<br />
-        - MS IE 3.x<br />
-        - Lynx/2.8+OpenSSL</td></tr>
+    </tr>
     <tr><td>SSL v3.0</td>
         <td>Expired Internet Draft (from Netscape Corp.) [<a href="#SSL3"
         >SSL3</a>]</td>
         <td>Revisions to prevent specific security attacks, add non-RSA
         ciphers and support for certificate chains</td>
-        <td>- NS Navigator 2.x/3.x/4.x<br />
-        - MS IE 3.x/4.x<br />
-        - Lynx/2.8+OpenSSL</td></tr>
+    </tr>
     <tr><td>TLS v1.0</td>
         <td>Proposed Internet Standard (from IETF) [<a href="#TLS1"
         >TLS1</a>]</td>
         <td>Revision of SSL 3.0 to update the MAC layer to HMAC, add block
         padding for block ciphers, message order standardization and more
         alert messages.</td>
-        <td>- Lynx/2.8+OpenSSL</td></tr>
+    </tr>
     <tr><td>TLS v1.1</td>
         <td>Proposed Internet Standard (from IETF) [<a href="#TLS11"
         >TLS11</a>]</td>
         <td>Update of TLS 1.0 to add protection against Cipher block chaining
         (CBC) attacks.</td>
-        <td>-</td></tr>
+    </tr>
     <tr><td>TLS v1.2</td>
         <td>Proposed Internet Standard (from IETF) [<a href="#TLS12"
         >TLS12</a>]</td>
         <td>Update of TLS 1.2 deprecating MD5 as hash, and adding incompatibility
         to SSL so it will never negotiate the use of SSLv2.</td>
-        <td>-</td></tr>
+    </tr>
     </table>
 </section>