Skip to content
This repository was archived by the owner on Apr 22, 2023. It is now read-only.

Commit d671291

Browse files
committed
doc: document why SSL2/SSL3 is disabled
PR-URL: #8551 Reviewed-By: Ben Noordhuis <[email protected]>
1 parent 0ec78c9 commit d671291

File tree

1 file changed

+10
-1
lines changed

1 file changed

+10
-1
lines changed

doc/api/tls.markdown

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,6 +38,14 @@ To create .pfx or .p12, do this:
3838
- `certfile`: all CA certs concatenated in one file like
3939
`cat ca1-cert.pem ca2-cert.pem > ca-cert.pem`
4040

41+
## Protocol support
42+
43+
Node.js is compiled without SSL2/SSL3 protocol support by default. These
44+
protocols are insecure and could be easily compromised as was shown by
45+
[CVE-2014-3566][]. However, in some situations, it may cause
46+
problems with legacy clients/servers (such as Internet Explorer 6). If you do
47+
really wish to use them, please rebuild node.js with `./configure --with-ssl3`.
48+
4149

4250
## Client-initiated renegotiation attack mitigation
4351

@@ -573,4 +581,5 @@ The numeric representation of the remote port. For example, `443`.
573581
[Stream]: stream.html#stream_stream
574582
[SSL_METHODS]: http://www.openssl.org/docs/ssl/ssl.html#DEALING_WITH_PROTOCOL_METHODS
575583
[tls.Server]: #tls_class_tls_server
576-
[SSL_CTX_set_options]: https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html
584+
[SSL_CTX_set_options]: https://www.openssl.org/docs/ssl/SSL_CTX_set_options.html
585+
[CVE-2014-3566]: https://access.redhat.com/articles/1232123

0 commit comments

Comments
 (0)