Thanks Arne!
I'll fix this in the next upload.
On Wed, Jan 04, 2017 at 07:21:07PM +0100, Arne Schwabe wrote:
> Am 21.11.16 um 10:10 schrieb Alberto Gonzalez Iniesta:
> > Hi,
> >
> > I'm preparing an upload to Debian Experimental of 2.4-beta1 in order to
&g
On Mon, Jan 02, 2017 at 03:26:46PM +0100, Gert Doering wrote:
> Hi,
>
> On Mon, Jan 02, 2017 at 03:17:23PM +0100, Alberto Gonzalez Iniesta wrote:
> > I just got this [1] bug report on OpenVPN 2.4 threating all certs as
> > expired when upgrading from 2.3. I find this quite we
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 5347 CBD8 3E30 A9EB 4D7D 4BF2 009B 3375 6B9A AA55
unstable now. If all goes well it'll be
in Stretch in 10 days.
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 5347 CBD8 3E30 A9EB
On Tue, Dec 06, 2016 at 01:36:04PM +0100, Arne Schwabe wrote:
> Am 06.12.16 um 13:26 schrieb Gert Doering:
> > The existing code can leak socket FDs to the "--up" script, which is
> > not desired. Brought up by Alberto Gonzalez Iniesta, based on debian
> > bug 3
On Mon, Dec 05, 2016 at 09:05:04PM +0100, Gert Doering wrote:
> Hi,
>
> On Mon, Dec 05, 2016 at 08:01:14PM +0100, Alberto Gonzalez Iniesta wrote:
> > The patch, after being adjusted to the new source, is not working anymore:
> >
> > Mon Dec 5 19:39:34 2016 Set FD_CLOE
On Wed, Nov 23, 2016 at 07:43:21PM +0100, Gert Doering wrote:
> Hi,
>
> On Wed, Nov 23, 2016 at 11:20:18AM +0100, Gert Doering wrote:
> > The existing code can leak socket FDs to the "--up" script, which is
> > not desired. Brought up by Alberto Gonzalez Iniesta,
On Mon, Nov 21, 2016 at 03:37:45PM +0100, David Sommerseth wrote:
> On 21/11/16 14:32, Samuli Seppänen wrote:
> > Il 21/11/2016 11:10, Alberto Gonzalez Iniesta ha scritto:
> >> Hi,
> >>
> >> I'm preparing an upload to Debian Experimental of 2.4-beta1 in
&g
/bugreport.cgi?att=1;bug=367716;filename=openvpn_367716.diff;msg=10
Fixing this:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=367716
Thanks,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encr
ance to check if the stock openvpn version you had
> installed ships with a pre-created /var/run/openvpn directory? (or
> /run/openvpn, or whatever Debian uses as the runtime directory)
>
> Otherwise, great testing!
>
The Debian package creates /run/openvpn/.
/var/run is a syml
hanks,
Alberto
[1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=817797
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
mailto/sip: a...@inittab.org | en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 5347 CBD8 3E30 A9EB
patches: The VRF patches I consider for v2.4 just
> >> because this seems very useful and doesn't add a very complicated patch.
> >> Considering that 2.4 will live in Debian for a long while, that
> >> platform can make most out of this patch as we
On Mon, Apr 14, 2014 at 11:42:23AM +0200, Gert Doering wrote:
> Hi,
>
> On Mon, Apr 14, 2014 at 11:29:28AM +0200, Alberto Gonzalez Iniesta wrote:
> > There're already packages for PolarSSL in Debian (and thus, in Ubuntu).
> > So I don't think there's need to
. Will look at it next week. BTW,
openvpn-openssl & openvpn-polarssl (underscores not valid in package
names :-)
> Also, if we don't wish maintain our own set of PolarSSL .deb packages
> we'd have to limit ourselves to fairly recent Debian/Ubuntu versions.
When can always t
> said, if we start maintaining PolarSSL debs, we might as well do it
> upstream in the PolarSSL project instead of within the OpenVPN project.
> We could of course publish the PolarSSL packages in our own apt repos to
> make using them easier for our users.
There're already
> versions of OpenVPN software.
>
Hi Leroy,
Mind this patch is only required for Samuli's (backported) packages. The
packages in Debian (and later Ubuntu) do not need any patching, since
the required version of pkcs11 is already present in the development and
testing suites (si
apitalized. Please consider its inclusion, or an
alternative to address this matter.
Thanks,
Alberto
[1]
x509-username-field foo -> will look for a field named FOO
x509-username-field [emailAddress] -> will look for emailAddress
--
Alberto Gonzalez Iniesta| Formación, consultoría y sop
On Mon, Jun 17, 2013 at 05:36:23PM +0200, Gert Doering wrote:
> Hi,
>
> On Mon, Jun 17, 2013 at 04:36:44PM +0200, Alberto Gonzalez Iniesta wrote:
> > Seems like "cmsg_len" went nuts...
>
> Seems your compiler grew too much smarts and optimized that bug to death
On Mon, Jun 17, 2013 at 04:05:18PM +0200, Alberto Gonzalez Iniesta wrote:
> On Mon, Jun 17, 2013 at 01:51:13PM +0200, Gert Doering wrote:
> > Hi,
> >
> > On Mon, Jun 17, 2013 at 01:00:03PM +0200, Alberto Gonzalez Iniesta wrote:
> > > I applied the fix for CVE-20
On Mon, Jun 17, 2013 at 01:51:13PM +0200, Gert Doering wrote:
> Hi,
>
> On Mon, Jun 17, 2013 at 01:00:03PM +0200, Alberto Gonzalez Iniesta wrote:
> > I applied the fix for CVE-2013-2061 [0] to Debian's stable version of
> > openvpn (2.2.1) [1]. When the new package was
made or should we go back to 2.2.1 without
the patch to fix CVE-2013-2061?
Thanks,
Alberto
[0]
https://github.com/OpenVPN/openvpn/commit/11d21349a4e7e38a025849479b36ace7c2eec2ee
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=707329
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=71
orian wrote:
> I'll take a look at the one in unstable. I'm not sure what parts have been
> back ported to 2.2 that I have been testing in the 2.3 branch. I would
> have thought that 2.3 is mature enough to be in the debian repos by now.
>
>
> On Wed, May 29, 2013 at
orporating the IPv6 patches anyway that bring most of
> the 2.3 ipv6 functionality to 2.2?
Yes, it is. AFAIK.
Anyway, I'll try to make a backport one of these days, but the one in
unstable should work in Wheezy too.
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte téc
ns a workaround (editing PAM limits) and a plea to
document this behaviour. I guess it's better to document this (after
verification of the facts) in OpenVPN's man page rather than just
Debian's package.
Regards,
Alberto
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=40689
On Fri, Mar 16, 2012 at 02:09:44PM +0200, Alon Bar-Lev wrote:
> On Fri, Mar 16, 2012 at 1:47 PM, Alberto Gonzalez Iniesta
> wrote:
> > Since support for LZO is enabled/disabled in runtime configuration, I
> > don't see why disabling it on built time, thus limiting its
bian packages with LZO support (if I don't forget to
set the option when upgrading to the new version).
Since support for LZO is enabled/disabled in runtime configuration, I
don't see why disabling it on built time, thus limiting its use later.
Regards,
Alberto
--
Alberto Gonz
sted the patch successfully. It works for me(tm). OpenVPN stopped
adding those random routes, while it added the right one for the
"remote_host".
Thanks,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software li
g that with
the IP of the VPN server and see if that fixes it in the meantime.
Cheers,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Just a tiny fix.
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Index: openvpn-2.1.0
net/wiki/index.php/OpenVPN/IRC_meetings/Topics-2010-03-18
>
> David (dazo) won't be able to attend, unfortunately.
>
Hi,
I won't be able to attend either. I will next week, hopefully with news
on Debian packages build daily/weekly.
Regards,
Alberto
--
Alberto Gonzalez
y other requests for it.
Hi James,
Just for the record, the same feature was requested in Debian [1] some 5
years ago :)
Regards,
Alberto
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=237251
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debia
x27;d[1]
> and uploaded rc20 diffs [2].
Hi All!
I just included the patch on the official Debian package. It will enter
the Sid repository today, hopefully a bunch of new people will test it
now. :)
Regards,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(init
asswords with wrong charset or gets it at
> all (echo $username:$password:TEST >> /var/log/openvpn/test) but it shows
> nothing for the password.
Hi,
You need --script-security 3 in order to get passwords passed to
scripts.
Regards,
Alberto
--
Alberto Gonzalez Iniesta
Oliver Seufer
- End forwarded message -
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4
to
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
Index: openvpn-2.1
a lot,
Alberto
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494998
[2] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495964
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=494998#10
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
truct, ...
Denis, you forgot to attach your documentation/patches to solve this.
Thanks,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.com
Key fingerprin
ss.
A possible solution would be to prefix all pushed environment
variables with something like 'OPENVPN_'.
--
What's your opinion on this?
Thanks,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y
On Tue, Apr 19, 2005 at 12:32:20PM -0600, James Yonan wrote:
>
> On Tue, 19 Apr 2005, Alberto Gonzalez Iniesta wrote:
> >
> > And the second issue I don't know how to handle is this:
> > - Start openvpn multiple times for a certain configuration.
> > - After
leave a process running
(one each).
- Even killing the first (successful) instance, the rest of the
processes will remain aroundi (doing nothing, I guess.
Is that a desirable behavior?
Thanks,
Alberto
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab
On Wed, Dec 22, 2004 at 05:11:51AM -0700, James Yonan wrote:
> On Wed, 22 Dec 2004, Charles Duffy wrote:
>
> > On Wed, 22 Dec 2004 11:00:09 +0100, Alberto Gonzalez Iniesta wrote:
> > > Recent updates of openvpn appear to have changed the handling of
> > > white
from Ron -
From: Ron
To: Alberto Gonzalez Iniesta
Subject: openvpn config parsing
List-Post: openvpn-devel@lists.sourceforge.net
Date: Fri, 10 Dec 2004 12:09:42 +1030
X-CRM114-Version: 20040816.BlameClockworkOrange-auto.3 (regex: TRE 0.6.8)
MF-A10FFB4C
X-CRM114-Status: Good ( pR: 0.9831
0 start
> exit $?
> ;;
>
> *)
> echo "Usage: $0 {start|stop|reload|restart}"
> exit 1
> ;;
> esac
>
> if [ $? == 0 ]; then
> exit 0
> else
> exit 1
> fi
>
>
> > > <<<<<<<<<
1500 --fragment 1300 --mssfix
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.org
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
On Wed, Nov 03, 2004 at 12:24:15PM -0700, James Yonan wrote:
> On Tue, 2 Nov 2004, Alberto Gonzalez Iniesta wrote:
>
> > Hi again,
> >
> > Another bug report received in the Debian BTS [1]. Quoting:
> > |when the link which was used for openvpn transport goes do
(eg.
|wavemon) can handle this situation more sanely.
Regards,
Alberto
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278933
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred
[2] Trey Kelso
[3] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=278302
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.org
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
debian.org/277838
--
Alberto Gonzalez Iniesta| Formación, consultoría y soporte técnico
agi@(inittab.org|debian.org)| en GNU/Linux y software libre
Encrypted mail preferred| http://inittab.org
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
On Sun, Oct 17, 2004 at 06:15:06PM +0200, Alberto Gonzalez Iniesta wrote:
> On Sun, Oct 17, 2004 at 01:36:33PM -, James Yonan wrote:
> > Alberto Gonzalez Iniesta said:
> >
> > > Hi all,
> > >
> > > After I decided to push OpenVPN 2.0 into Debian
On Sun, Oct 17, 2004 at 01:36:33PM -, James Yonan wrote:
> Alberto Gonzalez Iniesta said:
>
> > Hi all,
> >
> > After I decided to push OpenVPN 2.0 into Debian for future inclusion in
> > Sarge, I got this [1] bug report from one Debian user. It seems that
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=265632
--
Alberto Gonzalez Iniesta| BOFH excuse #175:
agi@(inittab.org|debian.org)| OS swapped to disk
Encrypted mail preferred|
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
i-bin/bugreport.cgi?bug=265632
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=270005
--
Alberto Gonzalez Iniesta | BOFH excuse #178:
agi@(agi.as|debian.org)| short leg on process table
Encrypted mail preferred |
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
route deleted from.
[1] http://bugs.debian.org/251304
--
Alberto Gonzalez Iniesta | BOFH excuse #263:
agi@(agi.as|debian.org)| It's stuck in the Web.
Encrypted mail preferred |
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
on things OpenVPN depends on (i.e. not requiring Perl).
I haven't tested this one (see attach) thoroughly but it seems to do
the job.
Thoughts?
--
Alberto Gonzalez Iniesta | BOFH excuse #5:
agi@(agi.as|debian.org)| static from plastic slide rules
Encrypted mail preferred |
Key fin
On Wed, Mar 31, 2004 at 12:31:13PM +0200, Alberto Gonzalez Iniesta wrote:
> Debian package available (for testing/unstable) at:
>
> http://tmp.inittab.org/~agi/openvpn_2.0_beta18-1_i386.deb
>
Sorry, that should read:
http://tmp.inittab.org/~agi/openvpn_2.0_test18-1_i386.deb
der it Beta, and report bugs to openvpn-devel@lists.sourceforge.net
(in case of openvpn related problem) or me (in case of packaging
errors).
--
Alberto Gonzalez Iniesta | BOFH excuse #191:
agi@(agi.as|debian.org)| Just type 'mv * /dev/null'.
Encrypted mail preferred |
Key
Be (tm) Any thoughts?
[1] http://bugs.debian.org/237251
--
Alberto Gonzalez Iniesta | BOFH excuse #304:
agi@(agi.as|debian.org)| routing problems on the neural net
Encrypted mail preferred |
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
On Thu, May 08, 2003 at 08:30:34AM -, James Yonan wrote:
> Alberto Gonzalez Iniesta said:
>
> > When compiled with 2.4.* kernel headers (libc6-dev 2.2.5-14.3 headers)
> > it detects this header file and defines HAVE_LINUX_IF_TUN_H. This allow
> > openvpn to work corre
(Robert de Bath )
<http://www.cix.co.uk/~mayday>
Google Homepage: http://www.google.com/search?btnI&q=Robert+de+Bath
----- End forwarded message -
--
Alberto Gonzalez Iniesta | BOFH excuse #2:
agi@(agi.as|debian.org)| s
Here's my last email with Markus about this subject. I'm forwarding it
as he requested. Maybe we should quote his exception somewhere in the
tarball, James?
- Forwarded message from "Markus F.X.J. Oberhumer"
-
From: "Markus F.X.J. Oberhumer"
To: Alberto
rded message from "Markus F.X.J. Oberhumer"
-
From: "Markus F.X.J. Oberhumer"
To: Alberto Gonzalez Iniesta
Subject: Re: Compiling and/or linking liblzo with OpenSSL
List-Post: openvpn-devel@lists.sourceforge.net
Date: Thu, 1 May 2003 20:02:55 +0200
X-no-Archive: yes
X-GPG-K
On Fri, May 02, 2003 at 06:07:07PM +0200, Matthias Andree wrote:
> On Mon, 28 Apr 2003, Alberto Gonzalez Iniesta wrote:
>
> > Sorry for the huge forward, but everything needed to understand this
> > problem should be there :)
>
> FYI:
>
> My post of the FreeBSD-p
On Fri, May 02, 2003 at 11:25:46AM +0200, Alberto Gonzalez Iniesta wrote:
> Anyway, I'm attaching Debian's init.d script in case you want to take a
> look at it.
>
Doh! I ALWAYS forget to attach files! Sorry :)
--
Alberto Gonzalez Iniesta | They that give up es
or problem as my RH62 box started up:
> >
> > > $Starting openvpn: /etc/rc.d/init.d/openvpn: [: ==: binary operator
> > > expected
> >
> > That's two distinct, common errors:
> > - $localization stuff that doesn't work on bash1
> > - an == in a []
___
> Openvpn-devel mailing list
> Openvpn-devel@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/openvpn-devel
--
Alberto Gonzalez Iniesta | They that give up essential liberty
agi@(agi.as|debian.org)| to obtain a little temporary
ng to get lots of feedback,
Alberto
[1] http://www.openssl.org/support/faq.html#LEGAL2
[2] Yes, it's a joke
- Forwarded message from James Yonan -
From: James Yonan
To: Alberto Gonzalez Iniesta
Subject: Re: comp-lzo and licensing issues
List-Post: openvpn-devel@lists.sourceforg
nux and FreeBSD, it's not easy but it's
possible.
Let each tool do its job, and only that.
--
Alberto Gonzalez Iniesta | They that give up essential liberty
agi@(agi.as|debian.org)| to obtain a little temporary safety
Encrypted mail preferred | deserve neither liberty n
acker, but I think this should be better:
for(x = 3; x < 100; x++)
Since the first 3 fds (stdin, stdout and stderr) should be kept open.
Regards,
Alberto
--
Alberto Gonzalez Iniesta | They that give up essential liberty
agi@(agi.as|debian.org)| to obtain a little temporary safety
Encrypted mail preferred | deserve neither liberty nor safety.
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
You can see the report here:
http://bugs.debian.org/179551
Thanks.
--
Alberto Gonzalez Iniesta | They that give up essential liberty
agi@(agi.as|debian.org)| to obtain a little temporary safety
Encrypted mail preferred | deserve neither liberty nor safety.
Key fingerprint = 9782
orry James)
--
Alberto Gonzalez Iniesta | They that give up essential liberty
agi@(agi.as|debian.org)| to obtain a little temporary safety
Encrypted mail preferred | deserve neither liberty nor safety.
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
ion library.
ii libssl0.9.60.9.6g-2 SSL shared libraries
- End forwarded message -----
--
Alberto Gonzalez Iniesta | They that give up essential liberty
a...@agi.as | to obtain a little temporary safety
Encrypted mail preferred | deserve neither liberty n
On Thu, Jul 18, 2002 at 05:04:30PM -0500, Michael Grigoriev wrote:
> Hi all,
>
> I am wondering how OpenVPN overcomes the inherit vulnerability of UDP
> comunications to "replay" or "cut-and-paste" attacks, since it is
> impossible to implement cipher block chaining.
> Also, if anybody could poi
sions.
(I don't know if I'm clear in this point, some times my English level
seems not enough :-)
Regards,
Alberto
--
Alberto Gonzalez Iniesta | They that give up essential liberty
a...@agi.as | to obtain a little temporary safety
Encrypted mail preferred | deserve neither liberty nor safety.
Key fingerprint = 9782 04E7 2B75 405C F5E9 0C81 C514 AF8E 4BA4 01C3
e
> privilege using --user and/or --group. That means that when an OpenVPN
> daemon is ready to exit, it might lack the privilege to delete its own
> pidfile. I've seen other daemons deal with this by chowning the pid file to
> the user/group that the daemon plans to setuid/se
t
was that very same daemon that created it.
It has no sense to have the init.d scripts deleting these files (and
stoping nonexistent daemons) since the daemon could have been killed
before the init.d script tried to stop it.
Thanks in advance for any comments.
Best regards.
--
Alberto Gonzalez
c
+++ openvpn-1.2.0/configure.ac
@@ -284,7 +284,7 @@
CFLAGS="$CFLAGS -pthread"
;;
*)
- CFLAGS="$CFLAGS -pthread"
+ CFLAGS="$CFLAGS -lpthread"
;;
The new configure* scripts work flawlessly :-)
Regards,
Albe
76 matches
Mail list logo