Do you experience problems during downloading?
Check your connection in Status and Interface settings window.
Use Test Server in Config > Servers.
We will probably ask you to do a test using only basic settings.
Do you experience problems during repair or unpacking?
Enable +Debug logging in the Status and Interface settings window and share the relevant parts of the log here using [ code ] sections.
After updating from Ubuntu 14.04 to 14.10 (later to 15.04) I am getting now this error when connecting to my Usenet server via SSL:
[Errno 111] Failed to connect: [('SSL routines', 'SSL3_CHECK_CERT_AND_ALGORITHM', 'dh key too small')]-1@news.tweaknews.eu:443
dh refers to the Diffie-Hellman key. I would assume this is related to the Logjam vulnerability, but how can I fix this? I assume this needs to be fixed inside Sabnzbd, generate a new key. But I don't know how.
And, yes, the problem is on the side of news.tweaknews.eu. At least that's how I interpret this: https://weakdh.org/sysadmin.html says for news.tweaknews.eu:
Warning! This site uses weak Diffie-Hellman parameters. Your site is vulnerable to attack and may stop working in Chrome, Firefox, Safari, and Internet Explorer with upcoming patches. You need to generate new, 2048-bit Diffie-Hellman parameters.
IP Connected TLS Insecure DHE_EXPORT DHE Chrome
176.124.71.34 No Insecure Parameters (short-bit) Insecure Parameters (short-bit)
We have updated our certificate. A recent update caused SSL connections to fail on certain systems. Please try again. Our apologies for any inconvenience.
I checked news.tweaknews.eu via https://weakdh.org/sysadmin.html, and it says "2048-bits". Good.
I checked in SABnzbd, and no error anymore. Good.
So it seems Tweaknews has solved their DH problem.