I appreciate your detailed explanation, era. Thank you.

On 1/19/21 10:07 PM, era wrote:
The following is based on my -- possibly limited -- understanding based on 
reading through the bug reports around this.

On Wed, Jan 20, 2021, at 05:56, Deb-user wrote:
Thank you for your reply. Yes, the workaround works, but I feel that
this is still a bug in the package. I'm also not sure how safe it is to
disable TLS 1.3.
Your options at this point are then, in no particular order;

* Live without ELPA (easy if you can live with base Emacs; hard if you need 
ELPA packages);
* Find or create a backport of the TLS1.3 handling fix yourself, and use that 
instead of the Debian-packaged Emacs;
* Turn off TLS1.3 and take steps to mitigate the risks (not sure what exactly 
that would look like in practice)

I believe Emacs version 26.3 fixes this. I don't know how updating
packages works in stable releases, or if it is even possible. I am new
to Debian.
In normal circumstances, the "stable" version does not get updates except for 
critical security fixes. However, there was already one attempt at fixing this particular 
bug which however doesn't seem to work satisfactorily, which is apparently what caused 
this bug to be submitted.  There definitely won't be a 26.3 in Buster, but perhaps the 
maintainer would still like to take another stab at providing a backport for 26.1 which 
actually works, and release that fix to Buster.

Perhaps see also the discussion in the linked original bug 
https://bugs.debian.org/942413

/* era */


Reply via email to