Ed V.

Results 14 comments of Ed V.

The only reason I tried `/tls-seclevel:5` at all was to see if it had anything to do with setting the TLS version first attempted (e.g. TLS 1.3, TLS 1.2, etc.)....

Linking /version issues - maybe? I installed Remmina using Flatpak per: [How to install Remmina](https://remmina.org/how-to-install-remmina/) Client OS: ``` $ lsb_release -a No LSB modules are available. Distributor ID: Ubuntu Description:...

I'm feeling not-so-smart... Since I'm not a Flatpak developer, I decided to make sure my environment was as clean as possible. I un-installed the current `org.remmina.Remmina` package, then installed the...

Compiled successfully after a bit of -dev library install... I did use the DEBUG statements you requested above `-DWITH_DEBUG_NEGO=ON -DWITH_DEBUG_NLA=ON -DWITH_DEBUG_NTLM=ON` in hopes that the local compile would either work...

Figured out how to toggle "NLA extended security" - here's the result (still no connection). ``` [11:38:15:122] [48883:48883] [DEBUG][com.freerdp.utils] - Registering signal hook... [11:38:15:128] [48883:48883] [DEBUG][com.freerdp.client.common.cmdline] - windows: 0/1 posix:...

Is there anything else I can do to help troubleshoot? Another build or flag to set?

@akallabeth & @antenore I did some more searching and found this [Debian 912206](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=912206) from a few years back. That lead me down the path of testing via OpenSSL, which was...

You got it - and the link gave me the correct syntax to use to select "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", which is "ECDHE-RSA-AES256-GCM-SHA384", so the command line was: $ G_MESSAGES_PREFIXED=all G_MESSAGES_DEBUG=all /tmp/test/bin/xfreerdp /tls-ciphers:ciphers=ECDHE-RSA-AES256-GCM-SHA384...

Thought I had seen TLS 1.2 and 1.3 ciphers used different switches /syntax from what I read in the "s_client" help text (`-cipher` vs `-ciphersuites`, 1.2 using hyphens, 1.3 underscores,...

From OpenSSL v1.1.11 and why I initially used hyphens to specify the cipher: ``` $ openssl ciphers -v | grep TLSv1.3 TLS_AES_256_GCM_SHA384 TLSv1.3 Kx=any Au=any Enc=AESGCM(256) Mac=AEAD TLS_CHACHA20_POLY1305_SHA256 TLSv1.3 Kx=any...