jos Posted April 16, 2019 Posted April 16, 2019 Synergy 1.10.1-stable-8941241e installed on windows 10 as server. Everytime I enable TLS encryption the following is repeated again and again: 2019-04-16T12:37:32] ERROR: tls error occurred (system call failure) 2019-04-16T12:37:32] ERROR: eof violates tls protocol 2019-04-16T12:37:32] ERROR: failed to accept secure socket 2019-04-16T12:37:32] WARNING: client connection may not be secure If a connection is made, the mouse is incredibly laggy and unusable. Without encryption the connection works flawlessly. Please help! Quote
JDDoesIT Posted April 25, 2019 Posted April 25, 2019 What release of Windows are you running? 1803? 1809? Have you updated the NIC firmware? Are there versions of TLS that you have disabled? Quote
neatnerdprime Posted January 13, 2022 Posted January 13, 2022 (edited) GReetings everyone. I've ran also to this issue and it seems that it happens on rare occasions where you switch fast from one machine to the other. I've ran it with some debug mode n and this is what i got: [2022-01-13T18:54:10] DEBUG: starting process [2022-01-13T18:54:10] INFO: starting server [2022-01-13T18:54:10] INFO: config file: /tmp/Synergy.QuAHch [2022-01-13T18:54:10] INFO: log level: DEBUG1 [2022-01-13T18:54:10] INFO: log file: /home/REDACTED/synergy.log [2022-01-13T18:54:10] DEBUG1: logging to file (/home/REDACTED/synergy.log) enabled [2022-01-13T18:54:10] DEBUG: opening configuration "/tmp/Synergy.zXWApG" [2022-01-13T18:54:10] DEBUG: configuration read successfully [2022-01-13T18:54:10] DEBUG1: starting server [2022-01-13T18:54:10] DEBUG1: thread 0x00000002 entry [2022-01-13T18:54:10] DEBUG: XOpenDisplay(":1") [2022-01-13T18:54:10] DEBUG: xscreensaver window: 0x00000000 [2022-01-13T18:54:10] DEBUG: screen shape: 0,0 3120x1920 [2022-01-13T18:54:10] DEBUG: window is 0x05000004 [2022-01-13T18:54:10] DEBUG: adopting new buffer [2022-01-13T18:54:10] DEBUG: opened display [2022-01-13T18:54:10] DEBUG1: registered event type error as 4 [2022-01-13T18:54:10] DEBUG1: registered event type suspend as 5 [2022-01-13T18:54:10] DEBUG1: registered event type resume as 6 [2022-01-13T18:54:10] DEBUG1: creating primary screen [2022-01-13T18:54:10] DEBUG1: registered event type connecting as 7 [2022-01-13T18:54:10] DEBUG1: binding listen socket [2022-01-13T18:54:10] DEBUG1: listening for clients [2022-01-13T18:54:10] DEBUG1: registered event type connected as 8 [2022-01-13T18:54:10] DEBUG1: registered event type keyDown as 9 [2022-01-13T18:54:10] DEBUG1: registered event type keyUp as 10 [2022-01-13T18:54:10] DEBUG1: registered event type keyRepeat as 11 [2022-01-13T18:54:10] DEBUG1: registered event type buttonDown as 12 [2022-01-13T18:54:10] DEBUG1: registered event type buttonUp as 13 [2022-01-13T18:54:10] DEBUG1: registered event type motionOnPrimary as 14 [2022-01-13T18:54:10] DEBUG1: registered event type motionOnSecondary as 15 [2022-01-13T18:54:10] DEBUG1: registered event type wheel as 16 [2022-01-13T18:54:10] DEBUG1: registered event type screensaverActivated as 17 [2022-01-13T18:54:10] DEBUG1: registered event type screensaverDeactivated as 18 [2022-01-13T18:54:10] DEBUG1: registered event type switchToScreen as 19 [2022-01-13T18:54:10] DEBUG1: registered event type switchInDirection as 20 [2022-01-13T18:54:10] DEBUG1: registered event type keyboardBroadcast as 21 [2022-01-13T18:54:10] DEBUG1: registered event type lockCursorToScreen as 22 [2022-01-13T18:54:10] DEBUG1: registered event type fakeInputBegin as 23 [2022-01-13T18:54:10] DEBUG1: registered event type fakeInputEnd as 24 [2022-01-13T18:54:10] DEBUG1: registered event type shapeChanged as 25 [2022-01-13T18:54:10] DEBUG1: registered event type clipboardGrabbed as 26 [2022-01-13T18:54:10] DEBUG1: registered event type clipboardChanged as 27 [2022-01-13T18:54:10] DEBUG1: half-duplex caps-lock off [2022-01-13T18:54:10] DEBUG1: half-duplex num-lock off [2022-01-13T18:54:10] DEBUG1: half-duplex scroll-lock off [2022-01-13T18:54:10] DEBUG1: screen saver synchronization on [2022-01-13T18:54:10] DEBUG1: XTest is Xinerama unaware false [2022-01-13T18:54:10] DEBUG1: XKB mapping [2022-01-13T18:54:10] DEBUG1: modifiers on update: 0x2000 [2022-01-13T18:54:10] DEBUG1: registered event type hotKeyDown as 28 [2022-01-13T18:54:10] DEBUG1: registered event type hotKeyUp as 29 [2022-01-13T18:54:10] DEBUG1: registered event type connected as 30 [2022-01-13T18:54:10] DEBUG: registered hotkey ScrollLock (id=ef14 mask=0000) as id=1 [2022-01-13T18:54:10] DEBUG1: registered event type disconnected as 31 [2022-01-13T18:54:10] DEBUG1: registered event type screenSwitched as 32 [2022-01-13T18:54:10] NOTE: started server, waiting for clients [2022-01-13T18:54:10] DEBUG1: registered event type reloadConfig as 33 [2022-01-13T18:54:10] DEBUG1: registered event type forceReconnect as 34 [2022-01-13T18:54:10] DEBUG1: registered event type resetServer as 35 [2022-01-13T18:54:10] DEBUG: event queue is ready [2022-01-13T18:54:10] DEBUG: add pending events to buffer [2022-01-13T18:54:10] DEBUG: screen "agnes" shape changed [2022-01-13T18:54:10] DEBUG: Opening new socket: 271CD2B0 [2022-01-13T18:54:10] DEBUG: openssl version: OpenSSL 1.1.1d 10 Sep 2019 [2022-01-13T18:54:10] DEBUG1: openssl flags: compiler: gcc -fPIC -pthread -m64 -Wa,--noexecstack -Wall -Wa,--noexecstack -g -O2 -fdebug-prefix-map=/build/openssl-0cJNDS/openssl-1.1.1d=. -fstack-protector-strong -Wformat -Werror=format-security -DOPENSSL_USE_NODELETE -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM -DNDEBUG -Wdate-time -D_FORTIFY_SOURCE=2 [2022-01-13T18:54:10] DEBUG1: openssl built on: built on: Tue Aug 24 08:30:43 2021 UTC [2022-01-13T18:54:10] DEBUG1: openssl platform: platform: debian-amd64 [2022-01-13T18:54:10] DEBUG1: openssl dir: OPENSSLDIR: "/usr/lib/ssl" [2022-01-13T18:54:10] DEBUG1: registered event type accepted as 36 [2022-01-13T18:54:10] INFO: accepted secure socket [2022-01-13T18:54:10] DEBUG1: available local ciphers: [2022-01-13T18:54:10] DEBUG1: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: RSA-PSK-AES256-GCM-SHA384 TLSv1.2 Kx=RSAPSK Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-PSK-AES256-GCM-SHA384 TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: RSA-PSK-CHACHA20-POLY1305 TLSv1.2 Kx=RSAPSK Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-PSK-CHACHA20-POLY1305 TLSv1.2 Kx=DHEPSK Au=PSK Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-PSK-CHACHA20-POLY1305 TLSv1.2 Kx=ECDHEPSK Au=PSK Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: PSK-AES256-GCM-SHA384 TLSv1.2 Kx=PSK Au=PSK Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: PSK-CHACHA20-POLY1305 TLSv1.2 Kx=PSK Au=PSK Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: RSA-PSK-AES128-GCM-SHA256 TLSv1.2 Kx=RSAPSK Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-PSK-AES128-GCM-SHA256 TLSv1.2 Kx=DHEPSK Au=PSK Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: PSK-AES128-GCM-SHA256 TLSv1.2 Kx=PSK Au=PSK Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-PSK-AES256-CBC-SHA384 TLSv1 Kx=ECDHEPSK Au=PSK Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: ECDHE-PSK-AES256-CBC-SHA TLSv1 Kx=ECDHEPSK Au=PSK Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: SRP-RSA-AES-256-CBC-SHA SSLv3 Kx=SRP Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: SRP-AES-256-CBC-SHA SSLv3 Kx=SRP Au=SRP Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: RSA-PSK-AES256-CBC-SHA384 TLSv1 Kx=RSAPSK Au=RSA Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: DHE-PSK-AES256-CBC-SHA384 TLSv1 Kx=DHEPSK Au=PSK Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: RSA-PSK-AES256-CBC-SHA SSLv3 Kx=RSAPSK Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: DHE-PSK-AES256-CBC-SHA SSLv3 Kx=DHEPSK Au=PSK Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: PSK-AES256-CBC-SHA384 TLSv1 Kx=PSK Au=PSK Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: PSK-AES256-CBC-SHA SSLv3 Kx=PSK Au=PSK Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-PSK-AES128-CBC-SHA256 TLSv1 Kx=ECDHEPSK Au=PSK Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-PSK-AES128-CBC-SHA TLSv1 Kx=ECDHEPSK Au=PSK Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: SRP-RSA-AES-128-CBC-SHA SSLv3 Kx=SRP Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: SRP-AES-128-CBC-SHA SSLv3 Kx=SRP Au=SRP Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: RSA-PSK-AES128-CBC-SHA256 TLSv1 Kx=RSAPSK Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: DHE-PSK-AES128-CBC-SHA256 TLSv1 Kx=DHEPSK Au=PSK Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: RSA-PSK-AES128-CBC-SHA SSLv3 Kx=RSAPSK Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: DHE-PSK-AES128-CBC-SHA SSLv3 Kx=DHEPSK Au=PSK Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: PSK-AES128-CBC-SHA256 TLSv1 Kx=PSK Au=PSK Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: PSK-AES128-CBC-SHA SSLv3 Kx=PSK Au=PSK Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: available remote ciphers: [2022-01-13T18:54:10] DEBUG1: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any Au=any Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: TLS_AES_128_GCM_SHA256 TLSv1.3 Kx=any Au=any Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=ECDSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-RSA-CHACHA20-POLY1305 TLSv1.2 Kx=DH Au=RSA Enc=CHACHA20/POLY1305(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES128-GCM-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA384 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES256-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(256) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES128-SHA256 TLSv1.2 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES128-SHA256 TLSv1.2 Kx=DH Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES256-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES256-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-ECDSA-AES128-SHA TLSv1 Kx=ECDH Au=ECDSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: ECDHE-RSA-AES128-SHA TLSv1 Kx=ECDH Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: DHE-RSA-AES128-SHA SSLv3 Kx=DH Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: AES256-GCM-SHA384 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: AES128-GCM-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AESGCM(128) Mac=AEAD [2022-01-13T18:54:10] DEBUG1: AES256-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256 [2022-01-13T18:54:10] DEBUG1: AES256-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(256) Mac=SHA1 [2022-01-13T18:54:10] DEBUG1: AES128-SHA SSLv3 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA1 [2022-01-13T18:54:10] DEBUG: openssl cipher: TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD [2022-01-13T18:54:10] INFO: network encryption protocol: TLSv1.3 [2022-01-13T18:54:10] NOTE: accepted client connection [2022-01-13T18:54:10] DEBUG1: registered event type inputReady as 37 [2022-01-13T18:54:10] DEBUG1: registered event type outputError as 38 [2022-01-13T18:54:10] DEBUG1: registered event type inputShutdown as 39 [2022-01-13T18:54:10] DEBUG1: registered event type outputShutdown as 40 [2022-01-13T18:54:10] DEBUG1: saying hello [2022-01-13T18:54:10] DEBUG1: registered event type success as 41 [2022-01-13T18:54:10] DEBUG1: registered event type failure as 42 [2022-01-13T18:54:10] DEBUG1: registered event type outputFlushed as 43 [2022-01-13T18:54:10] DEBUG1: parsing hello reply [2022-01-13T18:54:10] DEBUG1: querying client "REDACTED" info [2022-01-13T18:54:10] DEBUG1: registered event type keepAlive as 44 [2022-01-13T18:54:10] DEBUG1: registered event type clipboardSending as 45 [2022-01-13T18:54:10] DEBUG1: created proxy for client "REDACTED" version 1.6 [2022-01-13T18:54:10] DEBUG1: registered event type ready as 46 [2022-01-13T18:54:10] DEBUG1: registered event type disconnected as 47 [2022-01-13T18:54:10] DEBUG: received client "REDACTED" info shape=0,0 1920x1080 at 960,540 [2022-01-13T18:54:10] DEBUG1: send info ack to "REDACTED" [2022-01-13T18:54:10] NOTE: client "REDACTED" has connected [2022-01-13T18:54:10] DEBUG1: send reset options to "REDACTED" [2022-01-13T18:54:10] DEBUG1: send set options to "REDACTED" size=30 [2022-01-13T18:54:12] DEBUG1: try to leave "REDACTED" on right Also of note: This is what I've seen on the journalctl: jan 13 18:54:10 MYHOSTNAME synergy.desktop[2281]: ("-f", "--no-tray", "--debug", "DEBUG1", "--name", "agnes", "--enable-crypto", "--tls-cert", "/home/READCTED/.synergy/SSL/Synergy.pem", "--log", "/home/REDACTED/synergy.log", "-c", "/tmp/Synergy.zXWApG", "--address", ":24800", "--serial-key", "MYSERIALDONOTSTEAL") jan 13 18:54:10 MYHOSTNAME synergy.desktop[2281]: QString::arg: Argument missing: Synergy is waiting for clients, TLSv1.3 Edited January 13, 2022 by neatnerdprime Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.