@ralphholz (I want to create a whitelist of hostnames that we allow to fall back to SSL 3.0 insecurely, so we can stop doing it generally.)
@ralphholz Cool. What criteria are you using to detect intolerance? This is Firefox's logic: http://hg.mozilla.org/mozilla-central/annotate/da83eb7cb686/security/manager/ssl/src/nsNSSIOLayer.cpp#l940 …
-
-
@BRIAN_____ s/cipher list/default version order/Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@BRIAN_____ Reading through your code,I think we captured only a subset of what you need. But we can record handshakes and extract the errorThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@BRIAN_____ We used openssl's default cipher list and checked which servers would only pick SSLv3. That can be redone with different listThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.