|  | Commit message (Collapse) | Author | Age | Files | 
|---|
| | 
| 
| 
| 
| | It's best to use a stock (clean) environment when possible.  We only
need to test TLS protocol version <1.2 for tests/tls-protocols. | 
| | |  | 
| | 
| 
| 
| 
| 
| | handshake is aborted.
(Unless STARTTLS is used to upgrade the connection.) | 
| | 
| 
| 
| 
| 
| 
| 
| | Using the libssl interface simplifies our protocol black/whitelist
greatly; this only allows simple min/max bounds, but holes are arguably
not very useful here.
Using the new settings bumps the required libssl version to 1.1.0. | 
| | 
| 
| 
| 
| 
| 
| 
| | Namely, use the system default instead of "!SSLv2 !SSLv3 !TLSv1 !TLSv1.1".
As of Debian Buster (OpenSSL 1.1.1) this does not make a difference,
however using the system default provides better compatibility with
future libssl versions. | 
|  | SSL connections are accepted on TCP port 10993.  Also, fix STARTTLS
directive, broken since fba1c36… |