Hi Alpine community,
since we got few questions on the latest OpenSSL commit , we'd like
clarify the reasons for re-enabling SSLv2 and weak ciphers.
Essentially we have reverted to the default behavior of OpenSSL 1.0.2f
and 1.0.1r. Disabling SSLv2 and weak ciphers breaks ABI compatibility.
Please note that even enabling SSLv2 and weak ciphers your application
will not use it unless you configure it to do so .
We see this as a temporary solution for not breaking current build.
We're looking forward to remove SSLv2/weak ciphers support from OpenSSL
by rebuilding world against OpenSSL or switching to LibreSSL sooner than
Even if "enable-ssl2" is used, users who want to negotiate SSLv2 via the
version-flexible SSLv23_method() will need to explicitly call either of:
as appropriate. Even if either of those is used, or the application
explicitly uses the version-specific SSLv2_method() or its client or
server variants, SSLv2 ciphers vulnerable to exhaustive search key
recovery have been removed. Specifically, the SSLv2 40-bit EXPORT
ciphers, and SSLv2 56-bit DES are no longer available.
Received on Wed Mar 02 2016 - 16:59:08 UTC