GNU bug report logs - #10904
24.0.93; Infinite loop in GnuTLS code during Gnus nnimap-initiated SSL handshake

Previous Next

Package: emacs;

Reported by: Thomas Fitzsimmons <fitzsim <at> fitzsim.org>

Date: Mon, 27 Feb 2012 23:57:02 UTC

Severity: normal

Found in version 24.0.93

Done: Lars Ingebrigtsen <larsi <at> gnus.org>

Bug is archived. No further changes may be made.

Full log


Message #53 received at 10904 <at> debbugs.gnu.org (full text, mbox):

From: Ted Zlatanov <tzz <at> lifelogs.com>
To: Lars Magne Ingebrigtsen <larsi <at> gnus.org>
Cc: Thomas Fitzsimmons <fitzsim <at> fitzsim.org>, 10904 <at> debbugs.gnu.org
Subject: Re: bug#10904: 24.0.93;
 Infinite loop in GnuTLS code during Gnus nnimap-initiated SSL
 handshake
Date: Wed, 10 Dec 2014 11:10:08 -0500
On Mon, 08 Dec 2014 21:06:21 +0100 Lars Magne Ingebrigtsen <larsi <at> gnus.org> wrote: 

LMI> Ted Zlatanov <tzz <at> lifelogs.com> writes:
>> I plan to follow Nikos' advice here:
>> 
>> http://permalink.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/6017
>> 
>> so we'll drop from NORMAL to PERFORMANCE, basically, if the user
>> approves.  After the 24.1 release I'll look at this.

LMI> Would it make sense to just default to PERFORMANCE now that we have the
LMI> NSM?

The default priority string should correspond to the medium
`network-security-level' so yes, I think so.  But I really think those
two should be bound closer together, as I mentioned.

Ted




This bug report was last modified 7 years and 40 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.