FWIW, our ldapserver uses the following, which gnutls26 does not support but gnutls30 in wily does:
- Status: The certificate is trusted. - Successfully sent 0 certificate(s) to server. - Description: (TLS1.2)-(ECDHE-RSA-SECP256R1)-(AES-256-CBC)-(SHA384) - Session ID: 8C:43:00:00:5D:F2:98:2F:60:C7:A1:3A:C4:DA:D3:2D:A3:76:8F:6D:83:AE:AA:D6:6C:E3:90:E4:10:91:C0:AD - Ephemeral EC Diffie-Hellman parameters - Using curve: SECP256R1 - Curve size: 256 bits - Version: TLS1.2 - Key Exchange: ECDHE-RSA - Server Signature: RSA-SHA1 - Cipher: AES-256-CBC - MAC: SHA384 - Compression: NULL - Handshake was completed
FWIW, our ldapserver uses the following, which gnutls26 does not support but gnutls30 in wily does:
- Status: The certificate is trusted. -(ECDHE- RSA-SECP256R1) -(AES-256- CBC)-(SHA384) 00:5D:F2: 98:2F:60: C7:A1:3A: C4:DA:D3: 2D:A3:76: 8F:6D:83: AE:AA:D6: 6C:E3:90: E4:10:91: C0:AD
- Successfully sent 0 certificate(s) to server.
- Description: (TLS1.2)
- Session ID: 8C:43:00:
- Ephemeral EC Diffie-Hellman parameters
- Using curve: SECP256R1
- Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-SHA1
- Cipher: AES-256-CBC
- MAC: SHA384
- Compression: NULL
- Handshake was completed