Hi,
my diff against 3.1.3 has indeed reached 20338 lines, about twice the
size of a regular release, so I should put together a release. Haven't,
though, for various good and bad reasons.
Among other things, I've recently been fired. I was a contractor, the
company's owners decreed that costs
I feel like I'm crying wolf!, so let's put this bug on ice for a
moment: my previous hang issues were a showstopper for me and I got
really busy at work. I migrated my email out of aox because I didn't
have time to debug further.
Last night I saw that a release was likely approaching and I'm the
Hi,
since the whole Snowden/NSA sadness started I find my thoughts returning
to views every so often, and why gmail's views work well while aox'
views are not usable.
I've known they aren't usable for a while, but not been able to find out
why. After all, they can do everything.
But maybe it's
Am 29.08.2013 um 03:34 schrieb Mark Felder f...@feld.me:
git head is still broken on FreeBSD. Connections just hang/stall forever
without any obvious cause. My testing has been on FreeBSD 9.x
specifically, but I'll throw together a 10 jail shortly to test.
I have git HEAD in production since
Will THREAD be enabled before 3.1.4, or is it still considered too
experimental?
// enable these when the tb problem is resolved
//c.append( THREAD=ORDEREDSUBJECT );
//c.append( THREAD=REFS );
//c.append( THREAD=REFERENCES );
On Thu, Aug 29, 2013, at 9:58, Axel Rau wrote:
Am 29.08.2013 um 03:34 schrieb Mark Felder f...@feld.me:
git head is still broken on FreeBSD. Connections just hang/stall forever
without any obvious cause. My testing has been on FreeBSD 9.x
specifically, but I'll throw together a 10
Axel Rau axel@chaos1.de writes:
No, not really. Complexity often keeps users away from a feature. (-;
Yes. In this case, one of the results of the flexibility is that GUI
support is essentially impossible.
While we are talking about NSA, are you considering implementing
Diffie–Hellman key
Am 29.08.2013 um 21:44 schrieb Arnt Gulbrandsen a...@gulbrandsen.priv.no:
While we are talking about NSA, are you considering implementing
Diffie–Hellman key exchange?
I would happily add that. Right now the server uses the openssl default,
more or less:
SSL_CTX_set_cipher_list(
Axel Rau axel@chaos1.de writes:
In my nginx.conf, I have
ssl_ciphers HIGH:!aNULL:!MD5;
which produces PFS.
I added it now, but did not commit.
Arnt
On Thu, Aug 29, 2013, at 14:58, Arnt Gulbrandsen wrote:
Axel Rau axel@chaos1.de writes:
In my nginx.conf, I have
ssl_ciphers HIGH:!aNULL:!MD5;
which produces PFS.
I added it now, but did not commit.
current recommended cipher settings that defeat BEAST attack look like
this:
10 matches
Mail list logo