similar to: [Announcement] Version 1.1pre4 released

Displaying 20 results from an estimated 300 matches similar to: "[Announcement] Version 1.1pre4 released"

2009 Jan 21
2
Bug or other issue? Jan 22 00:02:09 argon postfix/pipe[21251]: E8126A3671: to=<mbj@seonic.net>, orig_to=<root>, relay=dovecot, delay=0.38, delays=0.03/0/0/0.35, dsn=5.3.0, status=bounced (Command died with signal 6: "/usr/libexec/dovecot/deliver")
Hi, I found the following in my logfiles: The failure is not reproducable at the moment. System is delivering mails to mailboxes with no problems at all. It is a production installation with medium load. dovecot --version: 1.1.7 OS: Linux (Gentoo/x86 stable) - grsec enabled kernel deliver.log: deliver(user at example.tld): Panic: file istream-tee.c: line 144 (i_stream_tee_read): assertion
2014 Feb 07
2
[Announcement] Tinc version 1.1pre10 released
With pleasure we announce the release of tinc version 1.1pre10. Here is a summary of the changes: * Added a benchmark tool (sptps_speed) for the new protocol. * Fixed a crash when using Name = $HOST while $HOST is not set. * Use AES-256-GCM for the new protocol. * Updated support for Solaris. * Allow running tincd without a private ECDSA key present when ExperimentalProtocol is not
2014 Feb 07
2
[Announcement] Tinc version 1.1pre10 released
With pleasure we announce the release of tinc version 1.1pre10. Here is a summary of the changes: * Added a benchmark tool (sptps_speed) for the new protocol. * Fixed a crash when using Name = $HOST while $HOST is not set. * Use AES-256-GCM for the new protocol. * Updated support for Solaris. * Allow running tincd without a private ECDSA key present when ExperimentalProtocol is not
2012 Oct 14
0
[Announcement] Version 1.1pre3 released
With pleasure we announce the release of version 1.1pre3. Here is a summary of the changes: * New experimental protocol: * Uses 521 bit ECDSA keys for authentication. * Uses AES-256-CTR and HMAC-SHA256. * Always provides perfect forward secrecy. * Used for both meta-connections and VPN packets. * VPN packets are encrypted end-to-end. * Many improvements to tincctl: *
2012 Oct 14
0
[Announcement] Version 1.1pre3 released
With pleasure we announce the release of version 1.1pre3. Here is a summary of the changes: * New experimental protocol: * Uses 521 bit ECDSA keys for authentication. * Uses AES-256-CTR and HMAC-SHA256. * Always provides perfect forward secrecy. * Used for both meta-connections and VPN packets. * VPN packets are encrypted end-to-end. * Many improvements to tincctl: *
2013 Jan 20
0
[Announcement] Tinc version 1.1pre5 released
With pleasure we announce the release of tinc version 1.1pre5. Here is a summary of the changes: * Fixed long delays and possible hangs on Windows. * Fixed support for the tunemu device on iOS, the UML and VDE devices. * Small improvements to the documentation and error messages. * Fixed broadcast packets not reaching the whole VPN. * Tincctl now connects via a UNIX socket to the tincd
2013 Jan 20
0
[Announcement] Tinc version 1.1pre5 released
With pleasure we announce the release of tinc version 1.1pre5. Here is a summary of the changes: * Fixed long delays and possible hangs on Windows. * Fixed support for the tunemu device on iOS, the UML and VDE devices. * Small improvements to the documentation and error messages. * Fixed broadcast packets not reaching the whole VPN. * Tincctl now connects via a UNIX socket to the tincd
2012 Dec 07
1
Tinc 1.1pre3, 1.1pre4 hangs after some time, on win32 platform
Dear tinc members! Recently I ran into some problems when trying to test the new tinc 1.1 builds under windows. The main problem is that the tincd daemon randomly hangs (usually in first 1-3 minutes after start). Sometimes it happens quietly, and the log does not display anything. But from time to time, there are bunch of decryption errors ("Error while decrypting: error:06065064:digital
2013 Jan 14
3
tinc 1.1pre4 Win7x64 import does not recognize Unix EOL
[This email is either empty or too large to be displayed at this time]
2013 Jan 13
2
tinc 1.1pre4 on Win7x64 unusually high latency
ping times to ConnectTo machine are often over a second or at least 300 milliseconds. Hundreds or thousands of times slower than other nodes from same physical location.
2014 Jun 09
0
BindToAddress stopped working in 1.1pre10
Hello, First of all thank you very much for Tinc. I have been using 1.0.24 under Debian & Alpine Linux 32 bit using 'BindToAddress' in tinc.conf without any issues to bind to an IPv6 ULA Address. With 1.1pre10 'BindToAddress' in tinc.conf on the client machines fails with: ============================================================================== tincd 1.1pre10 (Jun
2012 Nov 11
1
Error when compiling tinc 1.1pre3 - configure: error: "curses header files not found."
Hi! I'm trying to compile tinc-vpn 1.1pre3 on Ubuntu 12.10, but I get this error: checking curses.h usability... no checking curses.h presence... no checking for curses.h... no configure: error: "curses header files not found." (See the attached text file for the output when running ./configure) I have searched on google after this error message but I can't find anything
2013 Mar 26
1
Automatic exchange of dynamic node-IPs between nodes
Hi, I'm new to Tinc, so a "Hello" to all! :-) In my setup one master node has a static public IP. All other nodes have dynamic public IPs changing every 24 hours (and yes, in Germany even Global IPv6 Unicast Prefixes are dynamic on DSL/Cable sockets :-( ). To distribute the dynamic node-IPs to all other nodes, the following "host-up" script is used:
2013 Jan 13
1
tinc 1.1pre4 on Win7x64 coughs on #comment in first line of host file
I have the habit of putting the name of the host within the host file as a comment usually on the first line. Helps when files are renamed and tracking. The new version exports Name = victor and so the old comment style is not necessary. I would think the new version should still simply ignore lines that begin with the '#' character. For example, a normal host file named victor that
2013 Jan 13
4
tinc 1.1pre4 on Win7x64 --mlock prevents service from starting
c:\APPS\TINC\tincd.exe --mlock --net=mynet --config=C:\APPS\tinc\mynet Without --mlock, the service starts OK. With --mlock, the service fails to start.
2012 Dec 28
4
tincctl localhost timeout
First off, thanks to all who have made tinc possible and continue to work developing it. I hope perhaps in time I can become a useful part of this community. :) I'm having an interesting issue with tincctl and was hoping someone could shed some light on it. Everything seems to work correctly when I build for OSX; however on linux and windows builds, I always receive connection
2009 May 26
1
BindToAddress: TCP connections originate from random source address.
Hi, I've stumbled upon a problem which I can't solve easily with the available options in tinc - at least as far as I see. If enlightenment is all I need, I'll happily accept pointers ;) I try to establish a connection between two hosts. Each host has multiple addresses assigned to it's internet interface. A stripped down list would be: Host 1: 2001:780:0:1e::1
2013 Feb 20
0
[Announcement] Tinc version 1.1pre6 released
With pleasure we announce the release of tinc version 1.1pre6. Here is a summary of the changes: * Fixed tincd exitting immediately on Windows. * Detect PMTU increases. * Fixed crashes when using a SOCKS5 proxy. * Fixed control connection when using a proxy. This is the sixth pre-release of the 1.1 branch of tinc. Tinc 1.1 is protocol compatible with 1.0.x, but will have large
2013 Feb 20
0
[Announcement] Tinc version 1.1pre6 released
With pleasure we announce the release of tinc version 1.1pre6. Here is a summary of the changes: * Fixed tincd exitting immediately on Windows. * Detect PMTU increases. * Fixed crashes when using a SOCKS5 proxy. * Fixed control connection when using a proxy. This is the sixth pre-release of the 1.1 branch of tinc. Tinc 1.1 is protocol compatible with 1.0.x, but will have large
2015 Jul 13
2
Please help debug Windows setup
Hi, Thanks to John Wice for helping me with an earlier question. My two PCs behind the same router are still having problems connecting. Would appreciate thoughts on what I?m doing wrong? Router: Port 655 forwarded to 192.168.1.45, both TCP and UDP Port 656 forwarded to 192.168.1.51, both TCP and UDP Machine #1. ========== Local IP address on LAN = 192.168.1.45 Windows Firewall