From: <ma...@ne...> - 2014-01-18 14:25:04
|
Hello I do not recall that patch was checked in. Is there any improvemet to do on it? Any comment? Emmanuel Dreyfus <ma...@ne...> wrote: > Hi > > No feedback on that one? If the patch perfect? :-) > > > http://ftp.espci.fr/shadow/manu/imapproxy4.patch > > > > From README.ssl: > > tls_ca_file Path to CA file > > tls_ca_path Path to CA directory > > tls_cert_file Path to client certificate file > > tls_key_file Path to client private key > > tls_verify_server Enforce server certificate validation (default is false) > > tls_ciphers Specify cipher suite as documented in openssl_ciphers(1) > > tls_no_tlsv1 Disable TLSv1.0 > > tls_no_tlsv1.1 Disable TLSv1.1 > > tls_no_tlsv1.2 Disable TLSv1.2 > > force_tls Force TLS usage (default is false) > > > > There is no option to disable SSLv3: it is always disabled, as previous > > versions of imapproxy did not enable it (it was only able to do TLSv1.0) -- Emmanuel Dreyfus http://hcpnet.free.fr/pubz ma...@ne... |