Bug 1252649 - elinks sends SSLv2 style Hello
elinks sends SSLv2 style Hello
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: nss_compat_ossl (Show other bugs)
6.7
All Linux
urgent Severity urgent
: rc
: ---
Assigned To: Matthew Harmsen
Marek Haicman
: Patch, ZStream
Depends On: 1233122
Blocks:
  Show dependency treegraph
 
Reported: 2015-08-11 21:00 EDT by Jan Kurik
Modified: 2015-09-22 10:03 EDT (History)
11 users (show)

See Also:
Fixed In Version: nss_compat_ossl-0.9.6-2.el6_7
Doc Type: Bug Fix
Doc Text:
When establishing a secure connection, the nss_compat_ossl service previously requested the Network Security Services (NSS) library to initiate an SSL 2.0 handshake with the remote server. However, because NSS no longer supports the SSL 2.0 protocol, the handshake failed. With this update, nss_compat_ossl no longer uses SSL 2.0, and secure connections can be properly established using SSL 3.0, TLS 1.0, or their later versions. Result:
Story Points: ---
Clone Of: 1233122
Environment:
Last Closed: 2015-09-22 10:03:07 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Jan Kurik 2015-08-11 21:00:23 EDT
This bug has been copied from bug #1233122 and has been proposed
to be backported to 6.7 z-stream (EUS).
Comment 6 errata-xmlrpc 2015-09-22 10:03:07 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-1826.html

Note You need to log in before you can comment on or make changes to this bug.