X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=bugs%2FSSLv3;h=a75a1652d953db0c8f7c2fc0a72681649afde6d8;hp=db53e1343a0e0b23edc70a226dcac175c721f816;hb=2c730f6fc294357eb032e8ad85d51d40738f2290;hpb=de469ef21e4117908cc770f9ca25a26a01f9be38;ds=sidebyside diff --git a/bugs/SSLv3 b/bugs/SSLv3 index db53e1343a..a75a1652d9 100644 --- a/bugs/SSLv3 +++ b/bugs/SSLv3 @@ -29,7 +29,7 @@ RC4-MD5, but a re-connect tries to use DES-CBC-SHA. So netscape, when doing a re-connect, always takes the first cipher in the cipher list. If we accept a netscape connection, demand a client cert, have a -non-self-sighed CA which does not have it's CA in netscape, and the +non-self-signed CA which does not have it's CA in netscape, and the browser has a cert, it will crash/hang. Works for 3.x and 4.xbeta Netscape browsers do not really notice the server sending a