Hi!
I'm having a difficult time getting X11 forwarding to work.
Since I've read the docs completely about this, this must be an SSH bug
which is likely because I'm using Gentoo as the SSH server.
When trying to forward X11 connections, I get
X11 connection rejected because of wrong authentic
Thanks for your patience ;) This will be in the next release of openssl; it is
checked into master.
--
Rich Salz, OpenSSL dev team; rs...@openssl.org
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
According to our records, your request has been resolved. If you have any
further questions or concerns, please respond to this message.
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
Just removes some duplication in the header file. Patch attached.
BBB
>From ad6f09994d0cb2dd49d7356cff1dcf294d908f3f Mon Sep 17 00:00:00 2001
From: Billy Brumley
Date: Fri, 22 May 2015 17:44:49 +0300
Subject: [PATCH] fix copy paste error in ec_GF2m function prototypes
---
crypto/ec/ec_lcl.h |
Am 22.05.2015 um 18:32 schrieb Nayna Jain:
Ok, I think this is what I didn't know. I was using openssl 1.0.1g client.
I still didn't have openssl 1.0.2 .
If it were trivial I think showing the temp key size would be a welcome
backport to 1.0.1 before the next release. It is very useful in lig
Ok, I think this is what I didn't know. I was using openssl 1.0.1g client.
I still didn't have openssl 1.0.2 .
Thanks..
Thanks & Regards,
Nayna Jain
From: "Salz, Rich"
To: "openssl-dev@openssl.org"
Date: 05/22/2015 09:31 PM
Subject:Re: [openssl-dev] What key length is used f
Did you follow the full instructions - using a 1.0.2 openssl client?
The blog posting is pretty clear.
https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailm
Hi Hubert,
Thanks..
I tried the command you mentioned i.e.
openssl s_client -connect hostname:443 -cipher EDH /dev/null |
grep 'Server Temp Key'
But it didn't output anything.
Thanks & Regards,
Nayna Jain
From: Hubert Kario
To: openssl-dev@openssl.org
Cc: Nayna Jain/India/IBM@IB
On Friday 22 May 2015 15:41:09 Nayna Jain wrote:
> Hi,
>
> With the latest logjam attack, as I was trying to verify if my server
> (lighttpd) accepts DHE_xxx ciphers, I saw that it accepted and I didn't
> do any configuration setting done for DH parameters explicitly.
There's no default in Open
Hi,
With the latest logjam attack, as I was trying to verify if my server
(lighttpd) accepts DHE_xxx ciphers, I saw that it accepted and I didn't
do any configuration setting done for DH parameters explicitly.
But I couldn't verify what is the key length did it use by default
512/1024/2048 ?
Patch applied. Many thanks.
Matt
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev
The hash files (md5, sha1) for validating downloaded source are not
correclty formed, breaking the check (-c) function:
wget https://www.openssl.org/source/openssl-1.0.1m.tar.gz
wget https://www.openssl.org/source/openssl-1.0.1m.tar.gz.sha1
build@c7test:~/p4/zimbra/main/ThirdParty/openssl/src$ sh
12 matches
Mail list logo