Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 338122 Details for
Bug 455810
net-misc/openvpn-2.3.0 with dev-libs/openssl-1.0.1d - openvpn: Assertion failed at ssl.c:1857
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
verb=5 output
openvpndebug.txt (text/plain), 17.13 KB, created by
Albert W. Hopkins
on 2013-02-06 17:04:37 UTC
(
hide
)
Description:
verb=5 output
Filename:
MIME Type:
Creator:
Albert W. Hopkins
Created:
2013-02-06 17:04:37 UTC
Size:
17.13 KB
patch
obsolete
>Feb 06 11:50:56 flagship bug-455810[14224]: Current Parameter Settings: >Feb 06 11:50:56 flagship bug-455810[14224]: config = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: mode = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: persist_config = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: persist_mode = 1 >Feb 06 11:50:56 flagship bug-455810[14224]: show_ciphers = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: show_digests = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: show_engines = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: genkey = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: key_pass_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: show_tls_ciphers = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: Connection profiles [default]: >Feb 06 11:50:56 flagship bug-455810[14224]: proto = tcp-client >Feb 06 11:50:56 flagship bug-455810[14224]: local = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: local_port = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote = 'remote.vpn.host' >Feb 06 11:50:56 flagship bug-455810[14224]: remote_port = 1194 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_float = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: bind_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: bind_local = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: connect_retry_seconds = 5 >Feb 06 11:50:56 flagship bug-455810[14224]: connect_timeout = 10 >Feb 06 11:50:56 flagship bug-455810[14224]: connect_retry_max = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: socks_proxy_server = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: socks_proxy_port = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: socks_proxy_retry = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tun_mtu = 1500 >Feb 06 11:50:56 flagship bug-455810[14224]: tun_mtu_defined = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: link_mtu = 1500 >Feb 06 11:50:56 flagship bug-455810[14224]: link_mtu_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tun_mtu_extra = 32 >Feb 06 11:50:56 flagship bug-455810[14224]: tun_mtu_extra_defined = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: mtu_discover_type = -1 >Feb 06 11:50:56 flagship bug-455810[14224]: fragment = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: mssfix = 1450 >Feb 06 11:50:56 flagship bug-455810[14224]: explicit_exit_notification = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: Connection profiles END >Feb 06 11:50:56 flagship bug-455810[14224]: remote_random = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ipchange = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: dev = 'tap' >Feb 06 11:50:56 flagship bug-455810[14224]: dev_type = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: dev_node = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: lladdr = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: topology = 1 >Feb 06 11:50:56 flagship bug-455810[14224]: tun_ipv6 = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_local = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_remote_netmask = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_noexec = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_nowarn = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_ipv6_local = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_ipv6_netbits = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_ipv6_remote = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: shaper = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: mtu_test = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: mlock = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: keepalive_ping = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: keepalive_timeout = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: inactivity_timeout = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: ping_send_timeout = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: ping_rec_timeout = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: ping_rec_timeout_action = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: ping_timer_remote = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: remap_sigusr1 = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: persist_tun = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: persist_local_ip = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: persist_remote_ip = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: persist_key = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: passtos = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: resolve_retry_seconds = 1000000000 >Feb 06 11:50:56 flagship bug-455810[14224]: username = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: groupname = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: chroot_dir = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: cd_dir = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: writepid = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: up_script = '/usr/libexec/nm-openvpn-service-openvpn-helper' >Feb 06 11:50:56 flagship bug-455810[14224]: down_script = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: down_pre = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: up_restart = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: up_delay = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: daemon = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: inetd = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: log = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: suppress_timestamps = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: nice = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: verbosity = 5 >Feb 06 11:50:56 flagship bug-455810[14224]: mute = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: gremlin = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: status_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: status_file_version = 1 >Feb 06 11:50:56 flagship bug-455810[14224]: status_file_update_freq = 60 >Feb 06 11:50:56 flagship bug-455810[14224]: occ = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: rcvbuf = 65536 >Feb 06 11:50:56 flagship bug-455810[14224]: sndbuf = 65536 >Feb 06 11:50:56 flagship bug-455810[14224]: mark = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: sockflags = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: fast_io = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: lzo = 7 >Feb 06 11:50:56 flagship bug-455810[14224]: route_script = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: route_default_gateway = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: route_default_metric = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: route_noexec = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: route_delay = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: route_delay_window = 30 >Feb 06 11:50:56 flagship bug-455810[14224]: route_delay_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: route_nopull = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: route_gateway_via_dhcp = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: max_routes = 100 >Feb 06 11:50:56 flagship bug-455810[14224]: allow_pull_fqdn = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: management_addr = '127.0.0.1' >Feb 06 11:50:56 flagship bug-455810[14224]: management_port = 1194 >Feb 06 11:50:56 flagship bug-455810[14224]: management_user_pass = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: management_log_history_cache = 250 >Feb 06 11:50:56 flagship bug-455810[14224]: management_echo_buffer_size = 100 >Feb 06 11:50:56 flagship bug-455810[14224]: management_write_peer_info_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: management_client_user = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: management_client_group = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: management_flags = 2 >Feb 06 11:50:56 flagship bug-455810[14224]: shared_secret_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: key_direction = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: ciphername_defined = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ciphername = 'AES-128-CBC' >Feb 06 11:50:56 flagship bug-455810[14224]: authname_defined = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: authname = 'SHA1' >Feb 06 11:50:56 flagship bug-455810[14224]: prng_hash = 'SHA1' >Feb 06 11:50:56 flagship bug-455810[14224]: prng_nonce_secret_len = 16 >Feb 06 11:50:56 flagship bug-455810[14224]: keysize = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: engine = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: replay = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: mute_replay_warnings = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: replay_window = 64 >Feb 06 11:50:56 flagship bug-455810[14224]: replay_time = 15 >Feb 06 11:50:56 flagship bug-455810[14224]: packet_id_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: use_iv = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: test_crypto = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tls_server = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tls_client = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: key_method = 2 >Feb 06 11:50:56 flagship bug-455810[14224]: ca_file = 'path/to/my/ca.crt' >Feb 06 11:50:56 flagship bug-455810[14224]: ca_path = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: dh_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: cert_file = '/path/to/my.crt' >Feb 06 11:50:56 flagship bug-455810[14224]: priv_key_file = '/path/to/my.key' >Feb 06 11:50:56 flagship bug-455810[14224]: pkcs12_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: cipher_list = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: tls_verify = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: tls_export_cert = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: tls_remote = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: crl_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ns_cert_type = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_ku[i] = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: remote_cert_eku = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ssl_flags = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: tls_timeout = 2 >Feb 06 11:50:56 flagship bug-455810[14224]: renegotiate_bytes = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: renegotiate_packets = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: renegotiate_seconds = 3600 >Feb 06 11:50:56 flagship bug-455810[14224]: handshake_window = 60 >Feb 06 11:50:56 flagship bug-455810[14224]: transition_window = 3600 >Feb 06 11:50:56 flagship bug-455810[14224]: single_session = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: push_peer_info = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tls_exit = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tls_auth_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: server_network = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: server_netmask = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: server_network_ipv6 = :: >Feb 06 11:50:56 flagship bug-455810[14224]: server_netbits_ipv6 = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: server_bridge_ip = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: server_bridge_netmask = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: server_bridge_pool_start = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: server_bridge_pool_end = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_pool_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_pool_start = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_pool_end = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_pool_netmask = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_pool_persist_filename = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_pool_persist_refresh_freq = 600 >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_ipv6_pool_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_ipv6_pool_base = :: >Feb 06 11:50:56 flagship bug-455810[14224]: ifconfig_ipv6_pool_netbits = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: n_bcast_buf = 256 >Feb 06 11:50:56 flagship bug-455810[14224]: tcp_queue_limit = 64 >Feb 06 11:50:56 flagship bug-455810[14224]: real_hash_size = 256 >Feb 06 11:50:56 flagship bug-455810[14224]: virtual_hash_size = 256 >Feb 06 11:50:56 flagship bug-455810[14224]: client_connect_script = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: learn_address_script = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: client_disconnect_script = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: client_config_dir = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: ccd_exclusive = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: tmp_dir = '/tmp' >Feb 06 11:50:56 flagship bug-455810[14224]: push_ifconfig_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: push_ifconfig_local = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: push_ifconfig_remote_netmask = 0.0.0.0 >Feb 06 11:50:56 flagship bug-455810[14224]: push_ifconfig_ipv6_defined = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: push_ifconfig_ipv6_local = ::/0 >Feb 06 11:50:56 flagship bug-455810[14224]: push_ifconfig_ipv6_remote = :: >Feb 06 11:50:56 flagship bug-455810[14224]: enable_c2c = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: duplicate_cn = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: cf_max = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: cf_per = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: max_clients = 1024 >Feb 06 11:50:56 flagship bug-455810[14224]: max_routes_per_client = 256 >Feb 06 11:50:56 flagship bug-455810[14224]: auth_user_pass_verify_script = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: auth_user_pass_verify_script_via_file = DISABLED >Feb 06 11:50:56 flagship bug-455810[14224]: port_share_host = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: port_share_port = 0 >Feb 06 11:50:56 flagship bug-455810[14224]: client = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: pull = ENABLED >Feb 06 11:50:56 flagship bug-455810[14224]: auth_user_pass_file = '[UNDEF]' >Feb 06 11:50:56 flagship bug-455810[14224]: OpenVPN 2.3.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Jan 12 2013 >Feb 06 11:50:56 flagship bug-455810[14224]: MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:1194 >Feb 06 11:50:56 flagship bug-455810[14224]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. >Feb 06 11:50:56 flagship bug-455810[14224]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts >Feb 06 11:50:56 flagship bug-455810[14224]: LZO compression initialized >Feb 06 11:50:56 flagship bug-455810[14224]: Control Channel MTU parms [ L:1592 D:140 EF:40 EB:0 ET:0 EL:0 ] >Feb 06 11:50:56 flagship bug-455810[14224]: Socket Buffers: R=[87380->131072] S=[16384->131072] >Feb 06 11:50:56 flagship bug-455810[14224]: Data Channel MTU parms [ L:1592 D:1450 EF:60 EB:135 ET:32 EL:0 AF:3/1 ] >Feb 06 11:50:56 flagship bug-455810[14224]: Local Options String: 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client' >Feb 06 11:50:56 flagship bug-455810[14224]: Expected Remote Options String: 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server' >Feb 06 11:50:56 flagship bug-455810[14224]: Local Options hash (VER=V4): '39ac68d4' >Feb 06 11:50:56 flagship bug-455810[14224]: Expected Remote Options hash (VER=V4): 'de0ebdfe' >Feb 06 11:50:56 flagship bug-455810[14224]: Attempting to establish TCP connection with [AF_INET]107.15.88.150:1194 [nonblock] >Feb 06 11:50:57 flagship bug-455810[14224]: TCP connection established with [AF_INET]107.15.88.150:1194 >Feb 06 11:50:57 flagship bug-455810[14224]: TCPv4_CLIENT link local: [undef] >Feb 06 11:50:57 flagship bug-455810[14224]: TCPv4_CLIENT link remote: [AF_INET]107.15.88.150:1194 >Feb 06 11:50:57 flagship bug-455810[14224]: TLS: Initial packet from [AF_INET]107.15.88.150:1194, sid=e140d182 1f9efd8e >Feb 06 11:50:59 flagship bug-455810[14224]: VERIFY OK: ....................... >Feb 06 11:50:59 flagship bug-455810[14224]: VERIFY OK: ....................... >Feb 06 11:51:00 flagship bug-455810[14224]: Assertion failed at ssl.c:1857 >Feb 06 11:51:00 flagship bug-455810[14224]: Exiting due to fatal error
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 455810
:
338094
|
338096
| 338122 |
338152
|
338162