Bug#885348: linux-image-4.14.0-2-amd64: aLatest kernel (linux-image-4.14.0-2-amd64) breaks e1000e driver on Intel 82579V Gigabit adapter

2017-12-26 Thread T.A. van Roermund
Package: src:linux Version: 4.14.7-1 Severity: critical Tags: patch upstream Justification: breaks the whole system Dear Maintainer, This morning, I updated the Linux kernel from linux-image-4.13.0-1-amd64 to linux-image-4.14.0-2-amd64. Afterwards, my Intel Gigabit adapter (details below) did no

Bug#727149: linux-image-3.10-3-amd64: Network adapter (Intel 82579V) hangs during TX, causing reset and undetected data corruption at the other side

2014-11-03 Thread T.A. van Roermund
I don't know, because until now I have been using the workaround (i.e. always disable TSO). I just re-enabled it to see if this error will still occur with the latest kernel. I'll report again in a week or so whether it is stable now. Unfortunately, the bug still occurs. See the log below

Bug#727149: linux-image-3.10-3-amd64: Network adapter (Intel 82579V) hangs during TX, causing reset and undetected data corruption at the other side

2014-10-31 Thread T.A. van Roermund
int Reczey - Date: Fri, 31 Oct 2014 09:17:50 +0100 From: Balint Reczey Subject: Re: linux-image-3.10-3-amd64: Network adapter (Intel 82579V) hangs during TX, causing reset and undetected data corruption at the other side To: 727...@bugs.debian.org, "T.A. van Roermund"

Bug#727149: linux-image-3.10-3-amd64: Network adapter (Intel 82579V) hangs during TX, causing reset and undetected data corruption at the other side

2013-10-23 Thread T.A. van Roermund
On 22-10-2013 20:02, T.A. van Roermund wrote: In the mean time I have found a solution to this problem: if I disable TCP segmentation offload using the command 'ethtool -K eth2 tso off', the problem does no longer occur. By the way: I found the solution here: https://bbs.arc

Bug#727149: linux-image-3.10-3-amd64: Network adapter (Intel 82579V) hangs during TX, causing reset and undetected data corruption at the other side

2013-10-22 Thread T.A. van Roermund
Package: src:linux Version: 3.10.11-1 Severity: critical Justification: causes serious data loss Dear Maintainer, Since the upgrade from kernel version 3.2.0-4 to 3.10-3 I get serious data corruption on the network connection between my server and my desktop PC. The server has the Intel Corpora

Bug#462588: Same problem

2008-02-09 Thread T.A. van Roermund
Steve Langasek wrote: Please try setting 'TLSVerifyClient allow' in your slapd.conf, and let us know whether that fixes the problem for you. In my tests, I see that the default client certificate handling for 2.4.7 with GnuTLS does not match what's documented in the slapd.conf manpage; I think w

Bug#462588: [Pkg-openldap-devel] Bug#462588: Bug#462588: Bug#462588: Bug#462588: Bug#462588: Same problem

2008-01-29 Thread T.A. van Roermund
Quanah Gibson-Mount wrote: That would be a problem if "server-timo.van-roermud.nl" is not in subjectAltName for the certs. I changed the certificate (self signed), it now looks like this (only the relevant parts): Certificate: Data: Signature Algorithm: sha1WithRSAEncr

Bug#462588: [Pkg-openldap-devel] Bug#462588: Bug#462588: Bug#462588: Bug#462588: Same problem

2008-01-29 Thread T.A. van Roermund
Quanah Gibson-Mount wrote: Ok. Does your certificate have a proper cn, matching the fqdn of your server? That's the only other case where I can reproduce the described behavior, but I don't know if that's a behavior change relative to the OpenSSL version. (I would have hoped that OpenSSL would

Bug#462588: [Pkg-openldap-devel] Bug#462588: Bug#462588: Same problem

2008-01-29 Thread T.A. van Roermund
Steve Langasek wrote: Well, I can reproduce the problem when using this value for TLSCipherSuite. But why would you set this value, rather than leaving TLSCipherSuite blank to use the default? I don't see the point of listing *all* the cipher types if you don't intend to exclude some of them.

Bug#462588: [Pkg-openldap-devel] Bug#462588: Bug#462588: Same problem

2008-01-27 Thread T.A. van Roermund
Quanah Gibson-Mount wrote: Have you verified that port 636 is open? I.e., telnet localhost 636 The port is open: $ telnet localhost 636 Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. And: $ netstat --listening --numeric --program | gre

Bug#462588: [Pkg-openldap-devel] Bug#462588: Same problem

2008-01-26 Thread T.A. van Roermund
Quanah Gibson-Mount wrote: Have you verified whether or not you can connect using LDAPS via the command line tools? (ldapsearch, ldapwhoami, etc). Yes I did: $ ldapsearch -H ldaps://localhost:636/ -X cn=admin ldap_sasl_interactive_bind_s: Can't contact LDAP server (-1) The rel

Bug#462588: Same problem

2008-01-25 Thread T.A. van Roermund
Hi, I have the same problem. Following your suggestion, I listed all the cipher suites using "gnutls-cli -l" and tried all of them. Now, slapd does start, but still Thunderbird cannot connect to the daemon, no matter which cipher suite was selected. Regards, Timo -- To UNSUBSCRIBE, emai