From: jered@MIT.EDU
To: cypherpunks@toad.com
Message Hash: e9481d487f5df9e8e7df1540e0c0c28d75db02e8d440e3ce919cfbda4cb8d072
Message ID: <199508242005.QAA03863@narn.atype.com>
Reply To: N/A
UTC Datetime: 1995-08-24 20:05:36 UTC
Raw Date: Thu, 24 Aug 95 13:05:36 PDT
From: jered@MIT.EDU
Date: Thu, 24 Aug 95 13:05:36 PDT
To: cypherpunks@toad.com
Subject: Re: SSL CHALLENGE: 0.11 borken?
Message-ID: <199508242005.QAA03863@narn.atype.com>
MIME-Version: 1.0
Content-Type: text/plain
I had several machines running brloop 0.03 and brclient 0.11, and
none of them appeared to be sending ACKs back to the server. Is this
a known problem? It might account for the large number of unACKed
keyspaces.
brloop 0.04 and brclient 0.12 seem to work well, however.
--Jered
jered@mit.edu
Return to August 1995
Return to “Thomas Grant Edwards <tedwards@src.umd.edu>”