Back out 1b0ac7950129, as SSLv3 appears to still be in moderate use on the network...
authorMatthew Wild <mwild1@gmail.com>
Tue, 12 Nov 2013 02:13:01 +0000 (02:13 +0000)
committerMatthew Wild <mwild1@gmail.com>
Tue, 12 Nov 2013 02:13:01 +0000 (02:13 +0000)
core/certmanager.lua

index 1a8da6a618b91cbaaab8a56a0fcf2ec84c5c7d57..976b0a885cd5d179b6e99a22de7d8ca581ed5ac8 100644 (file)
@@ -33,7 +33,7 @@ module "certmanager"
 local default_ssl_config = configmanager.get("*", "ssl");
 local default_capath = "/etc/ssl/certs";
 local default_verify = (ssl and ssl.x509 and { "peer", "client_once", }) or "none";
-local default_options = { "no_sslv2", "no_sslv3", "cipher_server_preference", luasec_has_noticket and "no_ticket" or nil };
+local default_options = { "no_sslv2", "cipher_server_preference", luasec_has_noticket and "no_ticket" or nil };
 local default_verifyext = { "lsec_continue", "lsec_ignore_purpose" };
 
 if ssl and not luasec_has_verifyext and ssl.x509 then