Bug 1252649

Summary: elinks sends SSLv2 style Hello
Product: Red Hat Enterprise Linux 6 Reporter: Jan Kurik <jkurik>
Component: nss_compat_osslAssignee: Matthew Harmsen <mharmsen>
Status: CLOSED ERRATA QA Contact: Marek Haicman <mhaicman>
Severity: urgent Docs Contact:
Priority: urgent    
Version: 6.7CC: ekeck, fkrska, jherrman, jkurik, kdudka, ksrot, mhaicman, mharmsen, msaxena, nkinder, rcritten
Target Milestone: rcKeywords: Patch, ZStream
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: nss_compat_ossl-0.9.6-2.el6_7 Doc Type: Bug Fix
Doc Text:
When establishing a secure connection, the nss_compat_ossl service previously requested the Network Security Services (NSS) library to initiate an SSL 2.0 handshake with the remote server. However, because NSS no longer supports the SSL 2.0 protocol, the handshake failed. With this update, nss_compat_ossl no longer uses SSL 2.0, and secure connections can be properly established using SSL 3.0, TLS 1.0, or their later versions. Result:
Story Points: ---
Clone Of: 1233122 Environment:
Last Closed: 2015-09-22 14:03:07 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1233122    
Bug Blocks:    

Description Jan Kurik 2015-08-12 01:00:23 UTC
This bug has been copied from bug #1233122 and has been proposed
to be backported to 6.7 z-stream (EUS).

Comment 6 errata-xmlrpc 2015-09-22 14:03:07 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-1826.html