diff options
author | Matthias Andree <matthias.andree@gmx.de> | 2011-04-11 14:08:32 +0200 |
---|---|---|
committer | Matthias Andree <matthias.andree@gmx.de> | 2011-04-11 14:08:32 +0200 |
commit | c22a3afca46c83ee6d53a6ee58deb122f309c460 (patch) | |
tree | 7b91c2e12dcc8ca2253fc239761207e9ee6fabb0 /po | |
parent | 4ab1f5f5f64505f46789c61a6e5a206f3c2ee83e (diff) | |
download | fetchmail-c22a3afca46c83ee6d53a6ee58deb122f309c460.tar.gz fetchmail-c22a3afca46c83ee6d53a6ee58deb122f309c460.tar.bz2 fetchmail-c22a3afca46c83ee6d53a6ee58deb122f309c460.zip |
Remove support for SSLv2 (fixes Debian Bug #622054).
SSLv2 has been deprecated since 1996, and is insecure.
Remove --sslproto SSL2 support.
Set SSL_OP_NO_SSLvSSL_CTX 2 option so that the SSLv23 multi-version
client no longer negotiates SSLv2.
Note that some distributions (such as Debian) build OpenSSL 1.0.0
without SSLv2 support, so on those, the build would fail.
Fixes Debian Bug #622054
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622054
Diffstat (limited to 'po')
-rw-r--r-- | po/de.po | 8 |
1 files changed, 4 insertions, 4 deletions
@@ -2269,8 +2269,8 @@ msgstr "" "Servers.\n" #: options.c:654 -msgid " --sslproto force ssl protocol (SSL2/SSL3/TLS1)\n" -msgstr " --sslproto SSL-Protokoll erzwingen (SSL2/SSL3/TLS1)\n" +msgid " --sslproto force ssl protocol (SSL23/SSL3/TLS1)\n" +msgstr " --sslproto SSL-Protokoll erzwingen (SSL23/SSL3/TLS1)\n" #: options.c:656 msgid " --plugin specify external command to open connection\n" @@ -3174,9 +3174,9 @@ msgstr "Datei-Deskriptor außerhalb des Bereichs für SSL" #: socket.c:901 #, c-format -msgid "Invalid SSL protocol '%s' specified, using default (SSLv23).\n" +msgid "Invalid SSL protocol '%s' specified, using default (SSL23).\n" msgstr "" -"Ungültiges SSL-Protokoll „%s“ angegeben, benutze Voreinstellung (SSLv23).\n" +"Ungültiges SSL-Protokoll „%s“ angegeben, benutze Voreinstellung (SSL23).\n" #: socket.c:994 msgid "Certificate/fingerprint verification was somehow skipped!\n" |