Am 30.08.17 um 10:39 schrieb casper....@oracle.com:
> 
> 
>>> After I figured out where we went wrong, I filed:
>>> 26336744 Solaris specific cleanup code breaks gcm_aes for, e.g., openvpn
>>> which has now been fixed in oracle solaris-userland on git hub
>>> https://github.com/oracle/solaris-userland/tree/master/components/openssl
>>
>> Cool, thanks a lot!
>>
>>> It cannot say exactly when it will be in Solaris 11.3 SRU (patch) release.
>>> Current workaround is disabling AES-GCM for openvpn but that should not be
>>> needed in the future.
>>
>> Is there a way to reliably detect this issue from a test program (or by
>> looking at system versions, like "uname")?  It might be worth adding a
>> configure test so users won't run into it ("AES-GCM disabled due to
>> bug 26336744 in Solaris OpenSSL").
> 
> Well, t_lpback would fail but that is late as then you would have 
> configured and compiled openvpn.
>

Does it fail reliable? If yes we could just run a quick version of
failing and if this fails disable AES support, especially disabling
cipher negoiation.

Arne

------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to