[02:44] <Flannel> Unit193: I had it!  They deprecated it! So now I have to some manual tweaks and compiles and things to make it work again.
[02:45] <Unit193> Flannel: Aha!  You used dh-blowfish, just switch to PLAIN and you're a-ok.
[02:45] <Unit193> Erm, you're not connecting over ssl, don't use PLAIN.
[02:45] <Flannel> Well, half the point of SASL is to not send things over plaintext :P
[02:47] <Unit193> That's SSL.
[02:48] <Flannel> No, SASL accomplished the same thing (where 'things' is a password)
[02:49] <Unit193> Eh, not well, due to blowfish.  But anyway, yes you can do ECDSACHALLENGE, I do.
[06:46] <Mikaela> Flannel: SASL PLAIN sends the username and password in plain text and DH-* were removed because they were insecure and people thought them to be more secure than SASL PLAIN + SSL. More about that at https://nullroute.eu.org/~grawity/irc-sasl-dh.html (down?) and http://kaniini.dereferenced.org/2014/12/26/do-not-use-DH-AES-or-DH-BLOWFISH.html .
[21:59] <cm-t> Hi, I confirm ubuntu/member/cm-t is the cloack I'm asking for. Thanks to have asked this for me hggdh
[23:46] <hggdh> cm-t: welcome :-)