With pleasure we announce the release of tinc version 1.0.30. Here is a summary of the changes: * Fix troubles connecting to some HTTP proxies. * Add mitigations for the Sweet32 attack when using a 64-bit block cipher. * Use AES256 and SHA256 as the default encryption and digest algorithms. Please note that this version of tinc requires all nodes in the VPN to be linked with a version of OpenSSL or LibreSSL that supports the AES256 and SHA256 algorithms. While any reasonably up-to-date system should support those, some distribution versions older than five year might come with a version of OpenSSL with support for those algorithms disabled. -- Met vriendelijke groet / with kind regards, Guus Sliepen <guus at tinc-vpn.org> -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 819 bytes Desc: Digital signature URL: <http://www.tinc-vpn.org/pipermail/tinc/attachments/20161030/e5784dc6/attachment.sig>