Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Aug 2016 16:08:12 -0400
From:      Lowell Gilbert <freebsd-ports-local@be-well.ilk.org>
To:        Bernard Spil <brnrd@FreeBSD.org>
Cc:        Matt Smith <fbsd@xtaz.co.uk>, Mathieu Arnold <mat@freebsd.org>, ports@freebsd.org
Subject:   Re: Upcoming OpenSSL 1.1.0 release
Message-ID:  <44lgzm53rn.fsf@be-well.ilk.org>
In-Reply-To: <ba968d48738a1b5f05546993e70abf7d@imap.brnrd.eu> (Bernard Spil's message of "Wed, 24 Aug 2016 21:18:14 %2B0200")
References:  <6d35459045985929d061f3c6cca85efe@imap.brnrd.eu> <0E328A9485C47045F93C19AB@atuin.in.mat.cc> <20160823124201.GB48814@xtaz.uk> <ba968d48738a1b5f05546993e70abf7d@imap.brnrd.eu>

next in thread | previous in thread | raw e-mail | index | archive | help
Bernard Spil <brnrd@FreeBSD.org> writes:

> Today new vulnerabilities with (3)DES and BlowFish were made public

You're referring to something different than the HTTPS/OpenVPN
attacks?  Because it really wouldn't be accurate to describe those
as vulnerabilities in the ciphers.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?44lgzm53rn.fsf>