Skip to content
This repository has been archived by the owner on Jun 24, 2021. It is now read-only.

Explicitly drop SSLv3 connections (SSL_OP_NO_SSLv3) - might break TLS-ca... #73

Merged
merged 1 commit into from
Nov 5, 2014

Conversation

pgodschalk
Copy link

...pable clients that still depend on SSLv23 handshake

…-capable clients that still depend on SSLv23 handshake
@pgodschalk
Copy link
Author

[13:18:45] <Sput> Argure: current versions of Quassel try TLS first

Off the top of my head, of major irc clients only ancient KVirc builds on Windows still use SSLv23 handshakes now that quassel defaults to tls.

@kaniini
Copy link
Contributor

kaniini commented Nov 4, 2014

What is mIRC's behaviour? We don't want to break that one.

@MrBenC
Copy link

MrBenC commented Nov 4, 2014

I implemented a similar fix in a Charybdis fork about a couple weeks ago. https://bitbucket.org/chatlounge/chatircd/commits/49bb7f67d5479a624bb029eec432fc2c50ae3de0#chg-libratbox/src/openssl.c

Before pushing the commit, I tested the behavior with several different clients, including mIRC (also HexChat, Irssi, WeeChat, and ZNC). It will connect and as far as I can tell, everything works as it should.

Ben

@attilamolnar
Copy link
Contributor

@kaniini
Copy link
Contributor

kaniini commented Nov 5, 2014

Is xchat relevant anymore now that HexChat has taken it's place?

@jlu5
Copy link
Contributor

jlu5 commented Nov 5, 2014

XChat still exists, I know some people that still use it as their client (not something I'd recommend in 2014 but still). A lot of Linux distros still carry packages of it, with varying degrees of patch-work done.

@aaronmdjones
Copy link
Contributor

I had this problem fixed in HexChat months back. It's literally a 2-character patch. It shouldn't be hard to get those devs to do the same.

kaniini added a commit that referenced this pull request Nov 5, 2014
Explicitly drop SSLv3 connections (SSL_OP_NO_SSLv3) - might break TLS-ca...
@kaniini kaniini merged commit 5d4a995 into charybdis-ircd:master Nov 5, 2014
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants