Browse Source

tls: note that SSLv3 should not be used if high security is needed

- the note was already for SSLv2
Daniel-Constantin Mierla 11 years ago
parent
commit
5fe0d14745
2 changed files with 7 additions and 3 deletions
  1. 4 2
      modules/tls/README
  2. 3 1
      modules/tls/doc/params.xml

+ 4 - 2
modules/tls/README

@@ -508,7 +508,8 @@ Revoking a certificate and using a CRL
        with openssl/libssl v1.0.1)
        with openssl/libssl v1.0.1)
      * TLSv1 - only TLSv1 connections are accepted. This is the default
      * TLSv1 - only TLSv1 connections are accepted. This is the default
        value.
        value.
-     * SSLv3 - only SSLv3 connections are accepted
+     * SSLv3 - only SSLv3 connections are accepted. Note: you shouldn't
+       use SSLv3 for anything which should be highly secure.
      * SSLv2 - only SSLv2 connections, for old clients. Note: you
      * SSLv2 - only SSLv2 connections, for old clients. Note: you
        shouldn't use SSLv2 for anything which should be highly secure.
        shouldn't use SSLv2 for anything which should be highly secure.
        Newer versions of libssl don't include support for it anymore.
        Newer versions of libssl don't include support for it anymore.
@@ -517,7 +518,8 @@ Revoking a certificate and using a CRL
        message must be V2 (in the initial hello all the supported
        message must be V2 (in the initial hello all the supported
        protocols are advertised enabling switching to a higher and more
        protocols are advertised enabling switching to a higher and more
        secure version). This means connections from SSLv3 or TLSv1 clients
        secure version). This means connections from SSLv3 or TLSv1 clients
-       will be accepted.
+       will be accepted. Note: you shouldn't use SSLv2 or SSLv3 for
+       anything which should be highly secure.
 
 
    If rfc3261 conformance is desired, TLSv1 must be used. For
    If rfc3261 conformance is desired, TLSv1 must be used. For
    compatibility with older clients SSLv23 is a good option.
    compatibility with older clients SSLv23 is a good option.

+ 3 - 1
modules/tls/doc/params.xml

@@ -39,7 +39,8 @@
 			</listitem>
 			</listitem>
 			<listitem>
 			<listitem>
 				<para>
 				<para>
-				<emphasis>SSLv3</emphasis> - only SSLv3 connections are accepted
+				<emphasis>SSLv3</emphasis> - only SSLv3 connections are accepted.
+				Note: you shouldn't use SSLv3 for anything which should be highly secure.
 				</para>
 				</para>
 			</listitem>
 			</listitem>
 			<listitem>
 			<listitem>
@@ -56,6 +57,7 @@
 				message must be V2 (in the initial hello all the supported protocols
 				message must be V2 (in the initial hello all the supported protocols
 				are advertised enabling switching to a higher and more secure version).
 				are advertised enabling switching to a higher and more secure version).
 				This means connections from SSLv3 or TLSv1 clients will be accepted.
 				This means connections from SSLv3 or TLSv1 clients will be accepted.
+				Note: you shouldn't use SSLv2 or SSLv3 for anything which should be highly secure.
 				</para>
 				</para>
 			</listitem>
 			</listitem>
 	</itemizedlist>
 	</itemizedlist>