Le samedi 2 février 2013 22:25:51, Jason Johnson a écrit :
> I've just tried another test here and seen what looks like a problem.  If I
> point spam to an openssl test connection it fails in the following way.
> 
> root@myserver:~# openssl s_server -accept 989 -cert
> /etc/ssl/certs/myserver_ldap_cert.pem -key
> /etc/ssl/private/myserver_ldap_key.pem
> Using default temp DH parameters
> Using default temp ECDH parameters
> ACCEPT
> ERROR
> 7447:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown
> protocol:s23_srvr.c:578:
> shutting down SSL
> CONNECTION CLOSED
> ACCEPT
> 
> This looks like DSPAM doesn't speak the right protocol, no?

Hi Jason,

sorry for the delay. Could you run the same test by adding -msg (hopefully -
debug won't be needed). I'd like to see what are the messages sent by dspam.

Thanks a lot.

Thomas

Attachment: signature.asc
Description: This is a digitally signed message part.

Reply via email to