New comment by classabbyamp on void-packages repository https://github.com/void-linux/void-packages/issues/49793#issuecomment-2048628282 Comment: then why did the issue not talk about this in the first place?! anyway, gnutls supports TLSv1, your issue is not TLSv1: ``` gnutls-cli -p 1010 tls-v1-0.badssl.com |<1>| There was a non-CA certificate in the trusted list: CN=localhost. Processed 171 CA certificate(s). Resolving 'tls-v1-0.badssl.com:1010'... Connecting to '104.154.89.105:1010'... - Certificate type: X.509 - Got a certificate list of 2 certificates. - Certificate[0] info: - subject `CN=*.badssl.com', issuer `CN=R3,O=Let's Encrypt,C=US', serial 0x038d399dce3f272a52aa08671d7603ff3741, RSA key 2048 bits, signed using RSA-SHA256, activated `2024-02-21 20:27:20 UTC', expires `2024-05-21 20:27:19 UTC', pin-sha256="JKXtzx/YH0ugREvDDr7Mc1XHuoXKiunCsuUxI6gR2H8=" Public Key ID: sha1:f18ff011801230f13168e060ed2231106ad03bab sha256:24a5edcf1fd81f4ba0444bc30ebecc7355c7ba85ca8ae9c2b2e53123a811d87f Public Key PIN: pin-sha256:JKXtzx/YH0ugREvDDr7Mc1XHuoXKiunCsuUxI6gR2H8= - Certificate[1] info: - subject `CN=R3,O=Let's Encrypt,C=US', issuer `CN=ISRG Root X1,O=Internet Security Research Group,C=US', serial 0x00912b084acf0c18a753f6d62e25a75f5a, RSA key 2048 bits, signed using RSA-SHA256, activated `2020-09-04 00:00:00 UTC', expires `2025-09-15 16:00:00 UTC', pin-sha256="jQJTbIh0grw0/1TkHSumWb+Fs0Ggogr621gT3PvPKG0=" - Status: The certificate is trusted. - Description: (TLS1.0-X.509)-(ECDHE-SECP256R1)-(AES-256-CBC)-(SHA1) - Session ID: F8:B4:2F:A2:84:D8:A7:CD:57:11:41:12:DB:67:A3:E0:6B:51:D6:F6:95:82:83:F2:00:2F:BB:AB:37:B6:7B:9F - Options: safe renegotiation, - Handshake was completed ``` you should probably contact your VPN admin and ask them to update their TLS configuration too