diff options
author | Marc Hoersken <info@marc-hoersken.de> | 2014-02-22 16:48:15 +0100 |
---|---|---|
committer | Marc Hoersken <info@marc-hoersken.de> | 2014-02-22 16:49:09 +0100 |
commit | b5486adc9bb335818e501b925544dcd6b3fd92e4 (patch) | |
tree | bbdb2c1ce1331ce7466f190f0523c4cf2b706d60 /docs | |
parent | a660c0dbe6a81317c64d6652ddc66658e2752d2e (diff) |
stunnel: regenerated self-signed test certificate with SHA1 hash
The previous test certificate contained a MD5 hash which is not
supported using TLSv1.2 with Schannel on Windows 7 or newer.
See the update to this blog post on IEInternals / MSDN:
http://blogs.msdn.com/b/ieinternals/archive/2011/03/25/
misbehaving-https-servers-impair-tls-1.1-and-tls-1.2.aspx
"Update: If the server negotiates a TLS1.2 connection with a
Windows 7 or 8 schannel.dll-using client application, and it
provides a certificate chain which uses the (weak) MD5 hash
algorithm, the client will abort the connection (TCP/IP FIN)
upon receipt of the certificate."
Diffstat (limited to 'docs')
0 files changed, 0 insertions, 0 deletions