From a4d40096dd0cf000c0b59fdf7fb9ceff59b6d50c Mon Sep 17 00:00:00 2001 From: Rainer Jung Date: Mon, 15 Mar 2010 16:01:35 +0000 Subject: [PATCH] Correct referenced OpenSSL version. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@923313 13f79535-47bb-0310-9956-ffa450edef68 --- docs/manual/mod/mod_ssl.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index ff207868e6..d63e51a151 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -1821,8 +1821,8 @@ during a renegotiation. This vulnerability allowed an attacker to server. A protocol extension was developed which fixed this vulnerability if supported by both client and server.

-

If mod_ssl is linked against OpenSSL version 1.0.0 -Beta 5 or later, by default renegotiation is only supported with +

If mod_ssl is linked against OpenSSL version 0.9.8m +or later, by default renegotiation is only supported with clients supporting the new protocol extension. If this directive is enabled, renegotiation will be allowed with old (unpatched) clients, albeit insecurely.

-- 2.50.1