Bug#857436: libgnutls-openssl27: OpenSSL wrapper not exposing TLS 1.1/1.2 ciphers

2017-03-10 Thread Justin Coffman
Package: libgnutls-openssl27 Version: 3.5.10-1 Severity: important Certain packages that rely on this OpenSSL wrapper library are unable to connect using TLS 1.1/1.2 cipher suites. Even though the server (and the client, when compiled against OpenSSL) supports the full array of TLS 1.1/1.2 ciph

Bug#842120: tf5: TLSv1.1/1.2 cipher suites not functioning

2016-10-25 Thread Justin Coffman
>> Justin Coffman writes: >> >> Package: tf5 >> Version: 5.0beta8-5+b1 >> Severity: important >> >> TinyFugue, when compiled from upstream source against OpenSSL, is >> capable of the full set of expected ciphersuites (up to and including >

Bug#842120: tf5: TLSv1.1/1.2 cipher suites not functioning

2016-10-25 Thread Justin Coffman
Package: tf5 Version: 5.0beta8-5+b1 Severity: important TinyFugue, when compiled from upstream source against OpenSSL, is capable of the full set of expected ciphersuites (up to and including TLSv1.2), such as those utilizing AES-GCM and EC Diffie-Hellman. The version packaged in Debian, compi

Bug#796752: IPv6 Nameservers

2015-08-25 Thread Justin Coffman
I've done a little bit more testing on this. Removing IPv6 nameservers from /etc/resolv.conf does seem to resolve this issue on my test system. I must have goofed the initial testing on that.

Bug#796752: libsres: could not bind to random port above [port]

2015-08-23 Thread Justin Coffman
Package: irssi Version: 0.8.17-1 Severity: normal Tags: ipv6 Dear Maintainer, Starting irssi causes approximately ten lines of 20150823::16:55:28 libsres: could not bind to random port above 44300 to be displayed per server on initial connection. Port number is randomized for each message. C