Skip to content
This repository has been archived by the owner on Apr 22, 2023. It is now read-only.
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: nodejs/node-v0.x-archive
base: 35443862a231
Choose a base ref
...
head repository: nodejs/node-v0.x-archive
compare: ea69dd7584a9
Choose a head ref
  • 6 commits
  • 9 files changed
  • 2 contributors

Commits on Oct 21, 2014

  1. 2014.10.20, Version 0.10.33 (Stable)

    * openssl: Update to 1.0.1j (Addressing multiple CVEs)
    
    * uv: Update to v0.10.29
    
    * child_process: properly support optional args (cjihrig)
    
    * crypto: Disable autonegotiation for SSLv2/3 by default (Fedor Indutny,
    Timothy J Fontaine, Alexis Campailla)
    
    This is a behavior change, by default we will not allow the negotiation to
    SSLv2 or SSLv3. If you want this behavior, run Node.js with either
    `--enable-ssl2` or `--enable-ssl3` respectively.
    
    This does not change the behavior for users specifically requesting
    `SSLv2_method` or `SSLv3_method`. While this behavior is not advised, it is
    assumed you know what you're doing since you're specifically asking to use
    these methods.
    tjfontaine committed Oct 21, 2014
    Copy the full SHA
    fe2e8a4 View commit details
    Browse the repository at this point in the history

Commits on Oct 23, 2014

  1. tls: honorCipherOrder should not degrade defaults

    Specifying honorCipherOrder should not change the SSLv2/SSLv3 defaults
    for a TLS server.
    
    Use secureOptions logic in both lib/tls.js and lib/crypto.js
    tjfontaine committed Oct 23, 2014
    Copy the full SHA
    b9283cf View commit details
    Browse the repository at this point in the history
  2. tls: enforce secureOptions on incoming clients

    Reuse the secureProtocol and secureOptions of the server when creating
    the secure context for incoming clients.
    tjfontaine committed Oct 23, 2014
    Copy the full SHA
    69080f5 View commit details
    Browse the repository at this point in the history
  3. tests: add TLS tests matrix

    Add a test that goes through the whole matrix of:
    - command line options (--enable-ssl*)
    - secureOptions
    - secureProtocols
    
    and makes sure that compatible test setups actually work as expected.
    
    The test works by spawning two processes for each test case: one client
    and one server. The test passes if a SSL/TLS connection from the client
    to the server is successful and the test case was supposed to pass, or
    if the connection couldn't be established and the test case was supposed
    to fail.
    
    The test is currently located in the directory 'test/external' because
    it has external dependencies.
    Julien Gilli authored and tjfontaine committed Oct 23, 2014
    Copy the full SHA
    8d045a3 View commit details
    Browse the repository at this point in the history
  4. Copy the full SHA
    e59eca5 View commit details
    Browse the repository at this point in the history
  5. Now working on 0.10.34

    tjfontaine committed Oct 23, 2014
    Copy the full SHA
    ea69dd7 View commit details
    Browse the repository at this point in the history