From b24f71121c5186cfd1abe9c8a6435859810ceab7 Mon Sep 17 00:00:00 2001 From: p-bo Date: Sat, 19 Nov 2022 22:03:12 +0100 Subject: [PATCH] Removed obsolete note regarding pending backport of NSS into RHEL & derivatives Backport described in linked bug https://bugzilla.redhat.com/show_bug.cgi?id=1241172 was already completed in https://access.redhat.com/errata/RHBA-2016:2335.html Signed-off-by: p-bo --- admin_manual/configuration_server/security_setup_warnings.rst | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/admin_manual/configuration_server/security_setup_warnings.rst b/admin_manual/configuration_server/security_setup_warnings.rst index e09582f37..a624648a9 100644 --- a/admin_manual/configuration_server/security_setup_warnings.rst +++ b/admin_manual/configuration_server/security_setup_warnings.rst @@ -110,9 +110,7 @@ There are known bugs in older OpenSSL and NSS versions leading to misbehavior in combination with remote hosts using SNI. A technology used by most of the HTTPS websites. To ensure that Nextcloud will work properly you need to update OpenSSL to at least 1.0.2b or 1.0.1d. For NSS the patch version depends on your distribution -and an heuristic is running the test which actually reproduces the bug. There -are distributions such as RHEL/CentOS which have this backport still `pending -`_. +and an heuristic is running the test which actually reproduces the bug. Your Web server is not set up properly to resolve /.well-known/caldav/ or /.well-known/carddav/ -----------------------------------------------------------------------------------------------