Had repeated .ilist instead of .next in the openssl_options value list.
Old sdop: segfault. New sdop: memory exhaustion.
Oops!
used) to the client, based upon the value of the SNI extension.
The value will be retained for the lifetime of the message. During outbound
used) to the client, based upon the value of the SNI extension.
The value will be retained for the lifetime of the message. During outbound
-SMTP deliveries, it reflects the value of the tls_sni option on the transport.
+SMTP deliveries, it reflects the value of the &%tls_sni%& option on
+the transport.
This is currently only available when using OpenSSL, built with support for
SNI.
This is currently only available when using OpenSSL, built with support for
SNI.
Possible options may include:
.ilist
&`all`&
Possible options may include:
.ilist
&`all`&
&`allow_unsafe_legacy_renegotiation`&
&`allow_unsafe_legacy_renegotiation`&
&`cipher_server_preference`&
&`cipher_server_preference`&
&`dont_insert_empty_fragments`&
&`dont_insert_empty_fragments`&
&`legacy_server_connect`&
&`legacy_server_connect`&
&`microsoft_big_sslv3_buffer`&
&`microsoft_big_sslv3_buffer`&
&`microsoft_sess_id_bug`&
&`microsoft_sess_id_bug`&
&`msie_sslv2_rsa_padding`&
&`msie_sslv2_rsa_padding`&
&`netscape_challenge_bug`&
&`netscape_challenge_bug`&
&`netscape_reuse_cipher_change_bug`&
&`netscape_reuse_cipher_change_bug`&
&`no_session_resumption_on_renegotiation`&
&`no_session_resumption_on_renegotiation`&
&`ssleay_080_client_dh_bug`&
&`ssleay_080_client_dh_bug`&
&`sslref2_reuse_cert_type_bug`&
&`sslref2_reuse_cert_type_bug`&
&`tls_block_padding_bug`&
&`tls_block_padding_bug`&
&`tls_rollback_bug`&
.endlist
&`tls_rollback_bug`&
.endlist