aboutsummaryrefslogtreecommitdiff
path: root/tests/certs
diff options
context:
space:
mode:
authorMarc Hoersken <info@marc-hoersken.de>2014-02-22 16:48:15 +0100
committerMarc Hoersken <info@marc-hoersken.de>2014-02-22 16:49:09 +0100
commitb5486adc9bb335818e501b925544dcd6b3fd92e4 (patch)
treebbdb2c1ce1331ce7466f190f0523c4cf2b706d60 /tests/certs
parenta660c0dbe6a81317c64d6652ddc66658e2752d2e (diff)
stunnel: regenerated self-signed test certificate with SHA1 hash
The previous test certificate contained a MD5 hash which is not supported using TLSv1.2 with Schannel on Windows 7 or newer. See the update to this blog post on IEInternals / MSDN: http://blogs.msdn.com/b/ieinternals/archive/2011/03/25/ misbehaving-https-servers-impair-tls-1.1-and-tls-1.2.aspx "Update: If the server negotiates a TLS1.2 connection with a Windows 7 or 8 schannel.dll-using client application, and it provides a certificate chain which uses the (weak) MD5 hash algorithm, the client will abort the connection (TCP/IP FIN) upon receipt of the certificate."
Diffstat (limited to 'tests/certs')
0 files changed, 0 insertions, 0 deletions