1. 25 Jan, 2017 3 commits
  2. 23 Jan, 2017 10 commits
  3. 16 Jan, 2017 1 commit
  4. 14 Jan, 2017 3 commits
  5. 23 Dec, 2016 1 commit
  6. 22 Dec, 2016 2 commits
  7. 21 Dec, 2016 1 commit
  8. 20 Dec, 2016 3 commits
  9. 11 Nov, 2016 1 commit
  10. 10 Nov, 2016 1 commit
  11. 05 Nov, 2016 2 commits
  12. 29 Sep, 2016 1 commit
  13. 28 Sep, 2016 1 commit
    • tunnel: disable insecure openssl default protocols/ciphers · 463369c8
      It is still possible to re-enable SSLv3/compression through --insecure-ssl
      or config file, or to specify a different cipher-list.
      
      The insecure-ssl option covers both the option and cipher list as it is
      more accessible, and if SSLv3 is allowed then weak ciphers probably aren't
      too high on priority list...
      
      If the server does not accept either TLS protocols or cipher the user will
      get a message similar to this one:
      
      ERROR:  SSL_connect: error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
      You might want to try --insecure-ssl or specify a different --cipher-list
      
      Closes #69.
      Dominique Martinet committed
  14. 27 Sep, 2016 1 commit
  15. 20 Sep, 2016 1 commit
  16. 06 Sep, 2016 3 commits
  17. 12 Aug, 2016 4 commits
  18. 11 Aug, 2016 1 commit