522272
--- lib/IO/Socket/SSL.pm
522272
+++ lib/IO/Socket/SSL.pm
522272
@@ -194,7 +194,7 @@ if ( defined &Net::SSLeay::CTX_set_min_p
522272
 # global defaults
522272
 my %DEFAULT_SSL_ARGS = (
522272
     SSL_check_crl => 0,
522272
-    SSL_version => 'SSLv23:!SSLv3:!SSLv2', # consider both SSL3.0 and SSL2.0 as broken
522272
+    SSL_version => '',
522272
     SSL_verify_callback => undef,
522272
     SSL_verifycn_scheme => undef,  # fallback cn verification
522272
     SSL_verifycn_publicsuffix => undef,  # fallback default list verification
522272
@@ -2383,7 +2383,7 @@ sub new {
522272
 
522272
     my $ssl_op = $DEFAULT_SSL_OP;
522272
 
522272
-    my $ver;
522272
+    my $ver = '';
522272
     for (split(/\s*:\s*/,$arg_hash->{SSL_version})) {
522272
 	m{^(!?)(?:(SSL(?:v2|v3|v23|v2/3))|(TLSv1(?:_?[123])?))$}i
522272
 	or croak("invalid SSL_version specified");
522272
--- lib/IO/Socket/SSL.pod
522272
+++ lib/IO/Socket/SSL.pod
522272
@@ -1043,11 +1043,12 @@ All values are case-insensitive.  Instea
522272
 'TLSv1_3' one can also use 'TLSv11', 'TLSv12', and 'TLSv13'.  Support for
522272
 'TLSv1_1', 'TLSv1_2', and 'TLSv1_3' requires recent versions of Net::SSLeay
522272
 and openssl.
522272
+The default SSL_version is defined by the underlying cryptographic library.
522272
 
522272
 Independent from the handshake format you can limit to set of accepted SSL
522272
 versions by adding !version separated by ':'.
522272
 
522272
-The default SSL_version is 'SSLv23:!SSLv3:!SSLv2' which means, that the
522272
+For example, 'SSLv23:!SSLv3:!SSLv2' means that the
522272
 handshake format is compatible to SSL2.0 and higher, but that the successful
522272
 handshake is limited to TLS1.0 and higher, that is no SSL2.0 or SSL3.0 because
522272
 both of these versions have serious security issues and should not be used