| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
|
|
|
| |
static one
|
|
|
|
| |
DSA and ECDH certs/keys.
|
|
|
|
| |
network. Also, although obsolete, SSLv3 isn't documented to have any weaknesses that TLS 1.0 (the most common version used today) doesn't also have. Get your act together clients!
|
|
|
|
| |
cipher strength and to disable triple-DES (weaker and much slower than AES)
|
| |
|
|
|
|
| |
of the array
|
|
|
|
| |
default, as clients have been shown to commonly select weak and insecure ciphers even when they support stronger ones
|
| |
|
|
|
|
| |
ReadConsoleOutputAttribute (fixes issue#362, thanks yanjun).
|
|
|
|
| |
seemingly due to a missing value tag for the room description if the description has not been set
|
| |
|
| |
|
| |
|
|
|
|
| |
instead of a callback
|
|
|
|
| |
to not honour the 'ciphers' option. This change will apply 0.9's default cipher string for LuaSec 0.4.1 users.
|
|
|
|
| |
correctly
|
| |
|
| |
|
| |
|
|
|
|
| |
issue (thanks Lonnie Abelbeck)
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
|
|
|
|
| |
configurable through c2s_tcp_keepalives
|
| |
|
| |
|
|
|
|
| |
now) (tested only in my head)
|
| |
|
|
|
|
| |
regarded as 'HIGH' strength (by OpenSSL). In particular this disables RC4.
|
| |
|
|
|
|
| |
asterix)
|
| |
|
|
|
|
| |
other listeners. This ensures that stanzas following a traceback-causing stanza in a request will still be processed (as would happen on normal c2s).
|
|
|
|
| |
filters
|
|
|
|
| |
preventing potentially harmful 'top-level errors'
|
| |
|
|
|
|
| |
number of arguments are passed
|
|
|
|
| |
per-host
|
|
|
|
| |
outgoing requests, as per the HTTP RFC
|
| |
|
| |
|
| |
|
|
|
|
| |
interface addresses
|
|
|
|
| |
supports IPv6
|
|
|
|
| |
3.0)
|