Enables a countermeasure against a SSL 3.0/TLS 1.0 protocol vulnerability
+affecting CBC ciphers, which cannot be handled by some broken SSL
+implementations. This option has no effect for connections using other ciphers.
+This option clears the SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS
OpenSSL
+connection flag which is set by default.
+
This does not protect against the "BEAST" attack itself, which +is performed from the client side, but is related to the vulnerability +used by "BEAST". Some background is available at + +http://www.openssl.org/~bodo/tls-cbc.txt +
+