Skip to content
This repository was archived by the owner on Apr 22, 2023. It is now read-only.

crypto: allow forcing SSLv2/v3 via secureProtocol#8575

Closed
indutny wants to merge 1 commit intonodejs:v0.10from
indutny:feature/force-enable-sec-proto
Closed

crypto: allow forcing SSLv2/v3 via secureProtocol#8575
indutny wants to merge 1 commit intonodejs:v0.10from
indutny:feature/force-enable-sec-proto

Conversation

@indutny
Copy link
Copy Markdown
Member

@indutny indutny commented Oct 18, 2014

Force-enable SSLv2/v3 when secureProtocol is explicitly set
to SSLv2_method or SSLv3_method.

see discussion at #8551

Force-enable SSLv2/v3 when `secureProtocol` is explicitly set
to `SSLv2_method` or `SSLv3_method`.

see discussion at nodejs#8551
Comment thread lib/crypto.js
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This isn't 100% right, the secureProtocol should also handle the undefined case, but should happen below not when we're defining the default options, it should be set when flags is undefined and when secureProtocol isn't SSLv23...

@tjfontaine
Copy link
Copy Markdown

Landed in a slightly different javascript implementation -- 1349b68

@DomT4
Copy link
Copy Markdown

DomT4 commented Oct 20, 2014

I presume the end-user gets some kind of flag to note the less-secure-than-desired connection in these rare cases?

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants