Allow non-standard EC groups with OpenSSL3
This statement just is not correct: This has not a lot to do with EC.
What about "Enable setting any TLS1.3 group [provided by the underlying
crypto libraries]. "?
A bit long for a commit subject. Maybe just:
Enable usage of TLS groups not identif
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
EasyRSA development is back on-track.
Happy to help.
BR
--- Original Message ---
On Monday, March 28th, 2022 at 14:56, Michael Baentsch wrote:
> Am 28.03.22 um 13:52 schrieb Arne Schwabe:
> >
> > Easyrsa has become also separate projec
Am 28.03.22 um 13:52 schrieb Arne Schwabe:
Am 27.03.22 um 17:52 schrieb Michael Baentsch:
Thanks again for your explanations: I finally figured out to correct
my git send-email configuration `smtpencryption` to be set to "ssl"
(instead of "tls": The latter caused a hang that I debugged for way
Am 27.03.22 um 17:52 schrieb Michael Baentsch:
Thanks again for your explanations: I finally figured out to correct my
git send-email configuration `smtpencryption` to be set to "ssl"
(instead of "tls": The latter caused a hang that I debugged for way too
long :-(. Maybe worth while adding to s
Hi,
On Fri, Mar 25, 2022 at 06:10:10PM +0100, Michael Baentsch wrote:
> I'm not quite sure I understand what you're asking me to do. Why not
> simply use standard github cooperation mechanisms?
Because our master repo is not "on github", and we do patch review
via the mailing list, with archived
I'm not quite sure I understand what you're asking me to do. Why not
simply use standard github cooperation mechanisms?
Whatever, I put the stuff into
https://github.com/OpenVPN/openvpn/pull/170 but couldn't run the command
suggested there:
$ git send-email --to=openvpn-devel@lists.sourcefor
On 25/03/2022 16:04, Arne Schwabe wrote:
Am 25.03.22 um 08:21 schrieb Michael Baentsch:
Thanks very much for the quick and thorough feedback. Indeed your last
question is pivotal making the patch _much_ simpler (attached): The
problem manifests itself only in the presence of providers introduce
Am 25.03.22 um 08:21 schrieb Michael Baentsch:
Thanks very much for the quick and thorough feedback. Indeed your last
question is pivotal making the patch _much_ simpler (attached): The
problem manifests itself only in the presence of providers introduced in
OpenSSL3.0. At the same time, the cu
Thanks very much for the quick and thorough feedback. Indeed your last
question is pivotal making the patch _much_ simpler (attached): The
problem manifests itself only in the presence of providers introduced in
OpenSSL3.0. At the same time, the curve name causing the "dance code" is
permitted
Am 24.03.22 um 14:40 schrieb Michael Baentsch:
Hello,
as per https://community.openvpn.net/openvpn/ticket/1460 the current
openvpn master fails when activating a TLS1.3 group implemented in an
external provider.
The patch attached fixes this and enables successful OpenSSL key
establishm
10 matches
Mail list logo