Linux ip-148-66-134-25.ip.secureserver.net 3.10.0-1160.119.1.el7.tuxcare.els10.x86_64 #1 SMP Fri Oct 11 21:40:41 UTC 2024 x86_64
Apache
: 148.66.134.25 | : 3.145.92.98
66 Domain
8.0.30
amvm
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
BLACK DEFEND!
README
+ Create Folder
+ Create File
/
opt /
alt /
openssl /
share /
doc /
alt-openssl-1.0.2k /
[ HOME SHELL ]
Name
Size
Permission
Action
FAQ
84
B
-rw-r--r--
NEWS
33.69
KB
-rw-r--r--
README
5.35
KB
-rw-r--r--
README.FIPS
2.81
KB
-rw-r--r--
README.legacy-settings
1.99
KB
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : README.legacy-settings
Guide for legacy support enablement =================================== To improve security provided by use of OpenSSL especially in context of TLS connections we regularly review and deprecate algorithms and algorithm settings which are no longer viewed as secure. For some of these deprecated algorithms we provide a way for the system administrator to reenable them. Deprecated algorithms, protocols and settings in OpenSSL ======================================================== Previous Red Hat Enterprise Linux 7 update releases: * SSL2 protocol disabled by default. * Minimum DH group size accepted by SSL/TLS client 768 bits. * Verification of certificates and signatures using MD5 hash disabled. Red Hat Enterprise Linux 7.4: * SSL2 protocol support completely disabled (cannot be re-enabled). * All SSL/TLS export ciphers disabled. * All SSL/TLS ciphersuites with keys smaller than 128 bits disabled. * Minimum DH group size accepted by SSL/TLS client 1024 bits. * Disabled support for verification of certificates and signatures using MD2, MD4, MD5, and SHA0 hashes. Legacy support enablement ========================= The OpenSSL now supports /etc/pki/tls/legacy-settings configuration file which can be created by the system administrator which contains lines with simple Key Value pairs. The library recognizes the following possible configuration settings in that file: LegacySigningMDs md2 md5 MinimumDHBits 512 The LegacySigningMDs option allows reenabling support for verification of signatures with the specified hash algorithms. These can be any combination of md2, md4, md5 and sha. (sha represents SHA0 algorithm, not SHA1.) Any unrecognized algorithms are ignored. The MinimumDHBits option allows setting of the minimum bit size of DH group accepted by SSL/TLS client. It can be any value between 512 and 10000. If the configuration file is not present the built-in defaults (that is the secure defaults) are used. Any unrecognized lines (with other parameter names or comments) are ignored.
Close