On 05/22/2013 04:47 PM, michael p wrote:
I dont think it matters if they were true or not- Google and every other walled
garden uses spam as an excuse, and a poor excuse at that. Anybody can cut down
on spam by reducing access- real programmers/engineers/admins accept the
challenge of providin
On 12/02/11 12:25, Nicolas Vérité wrote:
Hi all,
Just a quick email to let you know that we are facing DoS attack on
Hosted.IM, our XMPP service hosting platform.
The attacker has "mafia_rullezz_*" in its multiple JIDs. It just sends
messages. At least another XMPP server suffered from these ki
Server details changed:
Software - ejabberd (was: openfire)
SSL Cert - CACert
Admin - adm...@conference.jabber.iitsp.com (was: nkuk...@jabber.iitsp.com)
Description - Free Jabber service sponsored by AllWorldIT
(http://www.allworldit.com) (was: A free Jabber service from iITSP.)
-N
signature
HI guys,
Got all my users exported out of openfire with their passwords still
intact. I used a compiled java plugin to do this.
Now I'm sitting with a little issue, I need to get the users transport
login details out of the database aswell. I can dump it to file no
problem, but they are encrypted
>> The Openfire guys might want to work on a fix, though, since it's
>> quite useful to have server-side.
>
> Openfire hasn't seen much activity since it moved out of focus of Jive
> Software's business goals. The latest release is from May 1, 2009, and
> it contains a major bug in the setup assis
>>> If it was C, I would be hacking the code and adding debugging to see
>>> where the connection is terminating ... etc.
>>
>> I'd be (secretly, of course) delighted if this were a reason to move
>> from a competitor's product, but that's not the case here. Even if
>> this server were written i
>> If it was C, I would be hacking the code and adding debugging to see
>> where the connection is terminating ... etc.
>
> I'd be (secretly, of course) delighted if this were a reason to move
> from a competitor's product, but that's not the case here. Even if
> this server were written in C, wit
>> [org.jivesoftware.openfire.net.SocketReadingMode.negotiateTLS(SocketReadingMode.java:77)]
>>
>> Error while negotiating TLS:
>> org.jivesoftware.openfire.net.socketconnect...@130fdeb socket:
>> Socket[addr=/174.142.114.101,port=50577,localport=5269] session:
>> org.jivesoftware.openfire.session
Hi there Matthew,
>>> Prosody Server: http://prosody.im
>>>
>> Prosody looks pretty cool lua ... I don't REALLY like scripting
>> languages, but at this point in time I'm close to trying anything
>> really. Not sure I have any hair left after all the hair pulling I've
>> been doing.
>>
Hi there Arsimael,
> I'm using prosody 0.7 and it was very easy do install and configure.
>
> My Server has a lot of transports (ICQ,MSN,Yahoo,myspace,facebook,AIM)
> and I COULD add IRC, GG,QQ an many more. Its very stable and just
> works great. Prosody is able to handle MUC and SSL.
>
Nice fe
Anyone running openfire 3.6.4 having issues with some SSL failure when
communicating with people on jabber.org?
Here is the openfire logs:
line
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
> I had heaps of trouble installing the chained certificate from
> XMPP.net on Openfire
>
I had no problems at all, apart from downloading and installing the
unlimited java key size whatever it was. Openfire 3.6.4 , just copied
and pasted the key and the cert and bobs your uncle, up and running
a
On 09/15/09 19:46, Peter Saint-Andre wrote:
> On 8/2/09 12:38 PM, Nigel Kukard wrote:
>
> > * *CA*: Starfield Technologies, Inc.
>
> Where can one obtain the root certificate for this CA? Their website
> seems to be broken:
>
> http://www.starfieldtech.com/
>
&
* *domain*: jabber.iitsp.com
* *website*: http://jabber.iitsp.com
* *year launched*: 2008
* *country*: USA
* *latitude*: 27.97
* *longitude*: 82.53
* *CA*: Starfield Technologies, Inc.
* *server software*: openfire 3.6.4
* *admin name*: Nigel Kukard
14 matches
Mail list logo