From a4d40096dd0cf000c0b59fdf7fb9ceff59b6d50c Mon Sep 17 00:00:00 2001
From: Rainer Jung
Date: Mon, 15 Mar 2010 16:01:35 +0000
Subject: [PATCH] Correct referenced OpenSSL version.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@923313 13f79535-47bb-0310-9956-ffa450edef68
---
docs/manual/mod/mod_ssl.xml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml
index ff207868e6..d63e51a151 100644
--- a/docs/manual/mod/mod_ssl.xml
+++ b/docs/manual/mod/mod_ssl.xml
@@ -1821,8 +1821,8 @@ during a renegotiation. This vulnerability allowed an attacker to
server. A protocol extension was developed which fixed this
vulnerability if supported by both client and server.
-If mod_ssl is linked against OpenSSL version 1.0.0
-Beta 5 or later, by default renegotiation is only supported with
+
If mod_ssl is linked against OpenSSL version 0.9.8m
+or later, by default renegotiation is only supported with
clients supporting the new protocol extension. If this directive is
enabled, renegotiation will be allowed with old (unpatched) clients,
albeit insecurely.
--
2.50.1