Bug 1275611
Summary: | misleading ssl protocol version in logs | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Filip Krska <fkrska> | |
Component: | stunnel | Assignee: | Tomas Mraz <tmraz> | |
Status: | CLOSED ERRATA | QA Contact: | Stefan Kremen <skremen> | |
Severity: | medium | Docs Contact: | ||
Priority: | medium | |||
Version: | 6.7 | CC: | avagarwa, hkario, skremen, tmraz | |
Target Milestone: | rc | Keywords: | EasyFix, Patch | |
Target Release: | --- | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | stunnel-4.29-5.el6 | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1275613 (view as bug list) | Environment: | ||
Last Closed: | 2016-05-11 00:40:58 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: |
Description
Filip Krska
2015-10-27 10:35:55 UTC
Yes, the negotiated cipher contains lowest protocol version that this cipher can be used with. The patch would be needed to display the actual protocol version used. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-0922.html |