-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 2016-12-19 02:14, Lew Wolfgang wrote:
On 12/18/2016 05:09 PM, Lew Wolfgang wrote:
Since no one else is reporting similar issues, my latest hypothesis is that a deep-packet-inspection intrusion prevention device somewhere on my connection path is finding a false-positive hit in the binary and force-closing the connection. I've checked on our local IPS (Tippingpoint) and don't see any hits, but there might be others farther upstream. This is a very large organization.
So if my hypothesis is correct, a TLS connection to pacman would allow the updates to complete.
BTW, I should have mentioned that I haven't had a chance to confirm my hypothesis with tcpdump yet, maybe I can get to that tomorrow.
Try download the file manually with a browser. - -- Cheers / Saludos, Carlos E. R. (from 13.1 x86_64 "Bottle" (Minas Tirith)) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iF4EAREIAAYFAlhXPUsACgkQja8UbcUWM1wWuQD/f5yxiR7j0ejJSlzEOL9KEKUs 777XrZ2drdUwHZNPwTABAJKvyPNYlUzh+AzE+QX4CinqlhpQTS+SoOv6K760zb12 =6A0L -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse-security+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-security+owner@opensuse.org