Duncan: I posted this reply on 12-11 but AFAICT it never reached the mailing
list, so this is my second try--with fingers crossed:

On 12/11/2012 02:45 AM, Duncan wrote:
The broken/working/broken bit MAY be the NSP's server, serving different
>certs depending on what front-end you connect to.

I still think that may be it...

Aha!  Good guess :)  I'm not yet certain how many different keys I may be
getting from the same IP address (it's always the same address) but there
are at least two -- the broken one is RSA512 (weak) and the working one is
RSA1024.

Mind you, gnutls-2.x.x accepts both of those keys without problem, so
gnutls-3 must be doing something different with the 512-bit key.  I'm
still struggling with pan's gnutls code, so I don't know yet if pan is
asking gnutls to report on the cipher strength.  Now that I understand
what's happening I may be able to find the relevant piece of pan's code
and puzzle it out.

Thanks, as always, for being a good observer :)



_______________________________________________
Pan-users mailing list
Pan-users@nongnu.org
https://lists.nongnu.org/mailman/listinfo/pan-users

Reply via email to