Replace the term 'blacklist' in the change log

This commit is contained in:
cketti 2020-06-02 17:23:26 +02:00
parent c4e5e6b1ed
commit 8fa8b485c0

View file

@ -423,7 +423,7 @@
<change>Add posteo.de to providers.xml</change> <change>Add posteo.de to providers.xml</change>
<change>Return proper error message when certificate couldn't be verified against global key store</change> <change>Return proper error message when certificate couldn't be verified against global key store</change>
<change>Add support for bitcoin URIs</change> <change>Add support for bitcoin URIs</change>
<change>Change the way we harden SSL/TLS sockets Blacklist a couple of weak ciphers, bring known ones in a defined order and sort unknown ciphers at the end. Also re-enable SSLv3 because it's still used a lot.</change> <change>Change the way we harden SSL/TLS sockets. Disallow a couple of weak ciphers, bring known ones in a defined order and sort unknown ciphers at the end. Also re-enable SSLv3 because it's still used a lot.</change>
<change>Implement pruning of old certificates from LocalKeyStore. Certificates are deleted whenever server settings are changed or an account is deleted.</change> <change>Implement pruning of old certificates from LocalKeyStore. Certificates are deleted whenever server settings are changed or an account is deleted.</change>
<change>Fix inadequate certificate validation. Proper host name validation was not being performed for certificates kept in the local keystore. If an attacker could convince a user to accept and store an attacker's certificate, then that certificate could be used for MITM attacks, giving the attacker access to all connections to all servers in all accounts in K-9.</change> <change>Fix inadequate certificate validation. Proper host name validation was not being performed for certificates kept in the local keystore. If an attacker could convince a user to accept and store an attacker's certificate, then that certificate could be used for MITM attacks, giving the attacker access to all connections to all servers in all accounts in K-9.</change>
<change>Users can now use different certificates for different servers on the same host (listening to different ports).</change> <change>Users can now use different certificates for different servers on the same host (listening to different ports).</change>