Hi all, anybody using ssltelnet?
I'm using: ii libssl08 0.8.1-7 SSL shared libraries ii ssleay 0.8.1-7 Secure Socket Layer and related cryptographi ii ssltelnet 0.11.1-2 SSLtelnet(d) is telnet(d) replacement with e I setup certificates and private key using req -new -x509 -nodes -out telnetd.pem -keyout telnetd.pem ln -s telnetd.pem `x509 -noout -hash < telnetd.pem`.0 also verified... verify telnetd.pem as the READMEs say... but or it cores dump (when telneting to localhost) but it seems to work when I telnet to some ssl aware host: bash-2.01$ telnet -z ssl localhost Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. Segmentation fault bash-2.01$ telnet -z ssl www.bemarnet.es 443 Trying 194.179.67.200... Connected to www.bemarnet.es. Escape character is '^]'. I would like to know what is really happening before sending a bug to [EMAIL PROTECTED] If I execute telnet client as bash-2.01$ telnet -z ssl -z verbose -z cert=/usr/lib/ssl/certs/telnetd.pem localhost Trying 127.0.0.1... SSL_connect:PINIT before SSL initalisation SSL_connect:23WCHA SSLv2/v3 write client hello A SSL_connect:error in 23RSHA SSLv2/v3 read server hello A Connected to localhost. Escape character is '^]'. Segmentation fault The same happens if -z cert=... is ommited Does I need to setup something more? Any comment will be greatly appreciated, Ulisses PD: yes, xinetd (an inetd replacement) has reloaded its configuration -- Unsubscribe? mail -s unsubscribe [EMAIL PROTECTED] < /dev/null