- Original Message -
Tomas Hozza tho...@redhat.com writes:
- Original Message -
On Thursday 10 July 2014 08:37:23 Tomas Hozza wrote:
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas
Tomas Hozza tho...@redhat.com writes:
I agree. The patch didn't take any configuration possibility from the user.
The users would be able to configure whatever in the same way they were
before.
Please really see some of those patches I sent. The discussion was little
bit confusing at some
Tomas Hozza tho...@redhat.com writes:
- Original Message -
On Thursday 10 July 2014 08:37:23 Tomas Hozza wrote:
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
I'm afraid this is
On 11/07/14 10:30, Tomas Hozza wrote:
I think you misunderstood me. My intention was NOT to handle PFS or any other
method
specially. The intention is to replace ALL occurrences of hard-coded ciphers
priority
list strings with value defined when running ./configure.
That's why I don't want to
- Original Message -
On Thursday 10 July 2014 08:37:23 Tomas Hozza wrote:
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
I'm afraid this is not suitable for us. We need to be able
On Friday 11 July 2014 04:30:04 Tomas Hozza wrote:
- Original Message -
On Thursday 10 July 2014 08:37:23 Tomas Hozza wrote:
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
- Original Message -
On Friday 11 July 2014 04:30:04 Tomas Hozza wrote:
- Original Message -
On Thursday 10 July 2014 08:37:23 Tomas Hozza wrote:
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
I'm afraid this is not suitable for us. We need to be able to define the
policy somewhere in /etc, where the user is not able to change it (only
the system administrator).
I
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
I'm afraid this is not suitable for us. We need to be able to define the
policy somewhere in /etc, where the user is not able to change it (only
Am Dienstag, 8. Juli 2014, 16:57:35 schrieb Giuseppe Scrivano:
Tomas Hozza thoz...@gnu.org writes:
What do you think about extending --secure-protocol and having a runtime
option instead of a compile time option ? Users could set the system wide
default value in /etc/wgetrc and people are
On Thursday 10 July 2014 08:37:23 Tomas Hozza wrote:
- Original Message -
On Tuesday 08 July 2014 16:14:42 Petr Pisar wrote:
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
I'm afraid this is not suitable for us. We need to be able to define
the
policy
- Original Message -
Tomas Hozza thoz...@gnu.org writes:
What do you think about extending --secure-protocol and having a runtime
option instead of a compile time option ? Users could set the system wide
default value in /etc/wgetrc and people are able to override it through
On Tue, Jul 08, 2014 at 10:00:24AM -0400, Tomas Hozza wrote:
I'm afraid this is not suitable for us. We need to be able to define the
policy somewhere in /etc, where the user is not able to change it (only
the system administrator).
I hope can also prevent the user from running his own wget
- Original Message -
On 07/07/14 21:46, Tomas Hozza wrote:
Hi.
In Fedora we are moving to a system-wide policy of used
ciphers. [1] Therefore we need wget to be compiled with other
than hard-coded set of ciphers when using OpenSSL.
I'm attaching patch adding new configure
On Tuesday 08 July 2014 04:43:20 Tomas Hozza wrote:
- Original Message -
On 07/07/14 21:46, Tomas Hozza wrote:
Hi.
In Fedora we are moving to a system-wide policy of used
ciphers. [1] Therefore we need wget to be compiled with other
than hard-coded set of ciphers when
- Original Message -
On Tuesday 08 July 2014 04:43:20 Tomas Hozza wrote:
- Original Message -
On 07/07/14 21:46, Tomas Hozza wrote:
Hi.
In Fedora we are moving to a system-wide policy of used
ciphers. [1] Therefore we need wget to be compiled with other
On 07/07/14 21:46, Tomas Hozza wrote:
Hi.
In Fedora we are moving to a system-wide policy of used
ciphers. [1] Therefore we need wget to be compiled with other
than hard-coded set of ciphers when using OpenSSL.
I'm attaching patch adding new configure option
--with-openssl-ciphers-list=LIST,
17 matches
Mail list logo