1995-08-24 - Re: SSL CHALLENGE: 0.11 borken?

Header Data

From: jered@MIT.EDU
To: cypherpunks@toad.com
Message Hash: e9481d487f5df9e8e7df1540e0c0c28d75db02e8d440e3ce919cfbda4cb8d072
Message ID: <199508242005.QAA03863@narn.atype.com>
Reply To: N/A
UTC Datetime: 1995-08-24 20:05:36 UTC
Raw Date: Thu, 24 Aug 95 13:05:36 PDT

Raw message

From: jered@MIT.EDU
Date: Thu, 24 Aug 95 13:05:36 PDT
To: cypherpunks@toad.com
Subject: Re: SSL CHALLENGE: 0.11 borken?
Message-ID: <199508242005.QAA03863@narn.atype.com>
MIME-Version: 1.0
Content-Type: text/plain



   I had several machines running brloop 0.03 and brclient 0.11, and
none of them appeared to be sending ACKs back to the server.  Is this
a known problem? It might account for the large number of unACKed
keyspaces.

  brloop 0.04 and brclient 0.12 seem to work well, however.

--Jered
jered@mit.edu





Thread