Le samedi 2 février 2013 22:25:51, Jason Johnson a écrit : > I've just tried another test here and seen what looks like a problem. If I > point spam to an openssl test connection it fails in the following way. > > root@myserver:~# openssl s_server -accept 989 -cert > /etc/ssl/certs/myserver_ldap_cert.pem -key > /etc/ssl/private/myserver_ldap_key.pem > Using default temp DH parameters > Using default temp ECDH parameters > ACCEPT > ERROR > 7447:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown > protocol:s23_srvr.c:578: > shutting down SSL > CONNECTION CLOSED > ACCEPT > > This looks like DSPAM doesn't speak the right protocol, no?
Hi Jason, sorry for the delay. Could you run the same test by adding -msg (hopefully - debug won't be needed). I'd like to see what are the messages sent by dspam. Thanks a lot. Thomas
signature.asc
Description: This is a digitally signed message part.