On Sat, Dec 06, 2014 at 10:08:30AM +0100, Walter H. wrote:
> On 05.12.2014 23:08, Kurt Roeckx wrote:
> >On Fri, Dec 05, 2014 at 02:50:00PM -0700, Philip Prindeville wrote:
> >>On Dec 5, 2014, at 1:57 PM, Walter H. wrote:
> >>
> >>>On 05.12.2014 21:46, Kurt R
On Fri, Dec 05, 2014 at 02:50:00PM -0700, Philip Prindeville wrote:
> On Dec 5, 2014, at 1:57 PM, Walter H. wrote:
>
> > On 05.12.2014 21:46, Kurt Roeckx wrote:
> >> On Fri, Dec 05, 2014 at 07:34:13PM +, TJ wrote:
> >>> On 26/11/14 02:05, Salz, Rich wrot
On Fri, Dec 05, 2014 at 09:57:05PM +0100, Walter H. wrote:
> On 05.12.2014 21:46, Kurt Roeckx wrote:
> >On Fri, Dec 05, 2014 at 07:34:13PM +, TJ wrote:
> >>On 26/11/14 02:05, Salz, Rich wrote:> We will soon be freezing the mailing
> >>list memberships for a coup
On Fri, Dec 05, 2014 at 07:34:13PM +, TJ wrote:
> On 26/11/14 02:05, Salz, Rich wrote:> We will soon be freezing the mailing
> list memberships for a couple of days.
> >
> >We are moving to a new server and upgrading the mail infrastructure
>
> Are you aware that the headers for the mailman c
On Wed, Dec 03, 2014 at 04:04:16PM +0530, T@Run..! Polisetty wrote:
> Hai All,
>
>We are using Openssl for DTLS Negotiations. When we run the Valgrind
> with this setup. We are finding some major loss of memory at one place.
Can you check with a current git version? There have b
On Mon, Nov 24, 2014 at 03:30:20PM +0800, ?? wrote:
> Hi all,
> From the release notes, seems TLS1.2 is only supported in 1.0.1 branch,
> however it is not an easy job to migrate from 0.9.8 to 1.0.1 unless there is
> no any other resort.
> If this is true, is there a plan to support TLS1.2 in 0.9
On Fri, Nov 14, 2014 at 06:35:51AM +, Viktor Dukhovni wrote:
> On Fri, Nov 14, 2014 at 06:26:24AM +, Vaghasiya, Nimesh wrote:
>
> [ It is rude to ask user questions on the dev list (moved to Bcc). ]
>
> > We are in process of disabling SSLv3 and SSLv2 protocols from all of our
> > FreeBS
On Wed, Nov 05, 2014 at 07:04:37PM +0100, Kurt Roeckx wrote:
> On Wed, Nov 05, 2014 at 03:57:48PM +0530, Venkat V wrote:
> > Hi
> >
> > Can you please let me know if FTP service can be impacted by POODLE
> > vulnerability
>
> The attack depends on being able to
On Wed, Nov 05, 2014 at 02:07:16PM -0500, Salz, Rich wrote:
> > It boggles the mind that to this day that patch has not been integrated in
> > the
> > 5 years since the bug was opened.
>
> So many things about openssl can boggle the mind :)
>
> In this particular case, I think the issue is that
On Wed, Nov 05, 2014 at 03:57:48PM +0530, Venkat V wrote:
> Hi
>
> Can you please let me know if FTP service can be impacted by POODLE
> vulnerability
The attack depends on being able to let the client connect
multiple times and have control over part of the plain text.
In theory a browser could
On Tue, Nov 04, 2014 at 02:39:41PM -0500, Salz, Rich wrote:
> Thanks for the detailed feedback!
>
> > 1. The list of applicable signing keys included in the tarballs and
> > elsewhere only lists the fingerprints
>
> We'll fix that.
I don't think their is anything wrong with fingerprints. Howev
On Thu, Sep 11, 2014 at 12:20:47PM -0600, The Doctor wrote:
> ../util/shlib_wrap.sh ../apps/openssl verify -CApath ../certs/demo
> ../certs/demo/*.pem
> ls: error initializing month strings
> ../certs/demo/ca-cert.pem: C = AU, ST = Queensland, O = CryptSoft Pty Ltd, CN
> = Test CA (1024 bit)
> er
101 - 112 of 112 matches
Mail list logo