More comment docs on SSLCompression
parent
b8219e3e91
commit
0b6e03df75
|
@ -198,6 +198,9 @@ module Exploit::Remote::HttpServer
|
|||
|
||||
proto = (datastore["SSL"] ? "https" : "http")
|
||||
|
||||
# SSLCompression may or may not actually be available. For example, on
|
||||
# Ubuntu, it's disabled by default, unless the correct environment
|
||||
# variable is set. See https://github.com/rapid7/metasploit-framework/pull/2666
|
||||
if proto == "https" and datastore['SSLCompression']
|
||||
print_status("Intentionally using insecure SSL compression. Your operating system might not respect this!")
|
||||
end
|
||||
|
|
|
@ -61,7 +61,7 @@ class Rex::Socket::Parameters
|
|||
# @option hash [String] 'SSLCert' A file containing an SSL certificate (for
|
||||
# server sockets)
|
||||
# @option hash [String] 'SSLCipher' see {#ssl_cipher}
|
||||
# @option hash [Bool] 'SSLCompression' enable SSL-level compression
|
||||
# @option hash [Bool] 'SSLCompression' enable SSL-level compression where available
|
||||
# @option hash [String] 'SSLVerifyMode' SSL certificate verification
|
||||
# mechanism. One of 'NONE' (default), 'CLIENT_ONCE', 'FAIL_IF_NO_PEER_CERT ', 'PEER'
|
||||
# @option hash [String] 'Proxies' List of proxies to use.
|
||||
|
|
Loading…
Reference in New Issue