Download Latest Version Luadch_v2.13_svn443_syno-x86.7z (444.2 kB)
Email in envelope

Get an email when there's a new version of Luadch

Home / Luadch / v2.07
Name Modified Size InfoDownloads / Week
Parent folder
Update_v2.06_to_v2.07.7z 2015-05-31 29.6 kB
Luadch_v2.07_svn435_win32.7z 2015-05-31 878.8 kB
Luadch_v2.07_svn435_syno-x86.7z 2015-05-31 314.6 kB
Luadch_v2.07_svn435_syno-armv5te.7z 2015-05-31 278.7 kB
Luadch_v2.07_svn435_pi.7z 2015-05-31 274.7 kB
Luadch_v2.07_svn435_debian.7z 2015-05-31 314.6 kB
README_CHANGELOG_SVN435.txt 2015-05-31 2.6 kB
Totals: 7 Items   2.1 MB 0
--// svn 435 v2.07 [2015-05-31]

    - only some small TYPO fixes  / thx Sopor
        - changes: "scripts/lang/cmd_ban.lang.en
        - changes: "scripts/lang/cmd_reg.lang.en
        - changes: "scripts/lang/cmd_usersearch.lang.en
        - changes: "scripts/lang/etc_offlineusers.lang.en

    - update: "scripts/cmd_hubinfo.lua" from "v0.14" to "v0.15"
        - increase performance by caching functions on start
        - show Ubuntu version
        - show Debian Version
        - show Raspbian Version
        
    - changes: "certs/make_cert"
        - using prime256v1 to generate a cert with Elliptic-Curve key (ECDSA)

    - changes: "certs/make_cert.bat"
        - using prime256v1 to generate a cert with Elliptic-Curve key (ECDSA)

    - changes: "cfg/cfg.tbl"
        - changes in "SSL parameter settings"
            - removing all cipher suites without Elliptic-Curve key exchange because:
              Elliptic-Curve Diffie-Hellman (ECDH) key exchange avoids all known feasible
              cryptanalytic attacks.
            - from now on there are six possible TLS configs to your choice:

                - Config 1: TLSv1 with AES128 only

                    ECDHE-ECDSA-AES128-SHA
                    ECDHE-RSA-AES128-SHA

                - Config 2: TLSv1 with AES256 only

                    ECDHE-ECDSA-AES256-SHA
                    ECDHE-RSA-AES256-SHA

                - Config 3: TLSv1 with AES128 + AES256

                    ECDHE-ECDSA-AES256-SHA
                    ECDHE-RSA-AES256-SHA
                    ECDHE-ECDSA-AES128-SHA
                    ECDHE-RSA-AES128-SHA

                - Config 4: TLSv1.2 with AES128 only

                    ECDHE-ECDSA-AES128-GCM-SHA256
                    ECDHE-RSA-AES128-GCM-SHA256
                    ECDHE-ECDSA-AES128-SHA256
                    ECDHE-RSA-AES128-SHA256

                - Config 5: TLSv1.2 with AES256 only

                    ECDHE-ECDSA-AES256-GCM-SHA384
                    ECDHE-RSA-AES256-GCM-SHA384
                    ECDHE-ECDSA-AES256-SHA384
                    ECDHE-RSA-AES256-SHA384

                - Config 6: TLSv1.2 with AES128 + AES256

                    ECDHE-ECDSA-AES256-GCM-SHA384
                    ECDHE-RSA-AES256-GCM-SHA384
                    ECDHE-ECDSA-AES256-SHA384
                    ECDHE-RSA-AES256-SHA384
                    ECDHE-ECDSA-AES128-GCM-SHA256
                    ECDHE-RSA-AES128-GCM-SHA256
                    ECDHE-ECDSA-AES128-SHA256
                    ECDHE-RSA-AES128-SHA256
Source: README_CHANGELOG_SVN435.txt, updated 2015-05-31