Age | Commit message (Collapse) | Author |
|
|
|
|
|
|
|
As far as I can see this was broken back in 2013, f4c1088 for 4.82
|
|
|
|
Broken-by: cc55f4208e
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Report & fix from James <list@xdrv.co.uk>; additional tidying and testcase by JGH
Broken-by: acec9514b1
|
|
|
|
|
|
directories. Bug 2213
|
|
This is because we cannot do the required CA-anchor and names checks for TA-mode
and not for EE-mode, without knowing which usage TLSA was used.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Not quite right for a mixed TA+EE set of TLSA records, but better than always-enforcing
|
|
|
|
|
|
|
|
|
|
GnuTLS version 3.0.0 onwards; still Experimental
|
|
|
|
|
|
|
|
Broken-by: 854586e149
|
|
|
|
Broken-by: 854586e149
|
|
Broken-by: 854586e149
|
|
OpenSSL 1.0.1t is known bad. 1.0.2 and 1.1.0 are apparently ok.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Issue found by: Frank Elsner
|
|
|
|
|
|
|
|
|
|
|