Package: kernel-patch-mppe Version: 2.4.2+20040216-4 Followup-For: Bug #304990
Your trouble with mppe is quite foreseeable, as the implementation of some cryptographic algorithms that ships with the mppe patches is broken in a dangerous way. This fact - and patches to cure the problem - has been reported to the pptpclient-devel mailing list numerous times. Bear with me that I refer to my own posting from Oct. 2003 here: http://sourceforge.net/mailarchive/forum.php?thread_id=3324727&forum_id=773 Please note that the patch I was giving there is by no means the best solution you can find in the mailing list archive (just search for the keyword sha1). The best way to go is IMHO the patch to use 2.6 kernel's crypto API implementation of these algorithms (a patch was also postet about half a year ago). My own patch has the only advantage that it did work for me the last 18 months under kernel 2.4 - for my very specific set-up. As a note to the package maintainer: As long as this patch is not fixed, I would suggest to remove it from all 64bit architectures as it's bound to cause kernel heap corruption there. -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (990, 'testing') Architecture: alpha Kernel: Linux 2.6.11.8pelzi-1 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages kernel-patch-mppe depends on: ii bash 2.05b-26 The GNU Bourne Again SHell ii grep-dctrl 2.1.10 Grep Debian package information ii gzip 1.3.5-9 The GNU compression utility ii patch 2.5.9-2 Apply a diff file to an original -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]