SPDY errors in log

tunist nginx-forum at nginx.us
Sun Oct 19 23:37:34 UTC 2014

thanks, yes - i just thought to do that before i read your reply. the test
says my server is not vulnerable to the attack - so the bugfixes appear to
have been integrated into the latest fedora version of openssl, even though
running the openssl version command does not show this to be the case.

so i just put up with the regular error log entries for inflate?

mex Wrote:
> hi tunist, 
> if you want to test your server for CCS-vuln you might use
> https://www.ssllabs.com/ssltest/
> or the testscript from  https://testssl.sh/
> when you prefer to test locally.
> > 
> > though when i run openssl version, i see: OpenSSL 1.0.1e-fips 11
> Feb
> > 2013 not sure why..!?
> distros backport patched but usually dont ship new versions,
> thus dont update version-numbers; same here, although 
> this system is fully patched
> $ openssl version
> OpenSSL 1.0.1e 11 Feb 2013

Posted at Nginx Forum: http://forum.nginx.org/read.php?2,254144,254149#msg-254149

More information about the nginx mailing list