arch ? # uname -a On 06/09/2011 05:13 AM, ron wrote: > OS is Centos 5.6 > Linux kernel is 2.6.18-238.9.1.el5 > Server is a DL380 G4 > Centos runs under VMWare ESXi 4.0 > > Here is the "run" file. > > #!/bin/sh > QMAILDUID=`id -u vpopmail` > NOFILESGID=`id -g vpopmail` > MAXSMTPD=`cat /var/qmail/control/concurrencyincoming` > SPAMDYKE="/usr/local/bin/spamdyke" > SPAMDYKE_CONF="/etc/spamdyke/spamdyke.conf" > SMTPD="/var/qmail/bin/qmail-smtpd" > TCP_CDB="/etc/tcprules.d/tcp.smtp.cdb" > HOSTNAME=`hostname` > VCHKPW="/home/vpopmail/bin/vchkpw" > REQUIRE_AUTH=0 > > exec /usr/bin/softlimit -m 20000000 \ > /usr/bin/tcpserver -v -R -H -l $HOSTNAME -x $TCP_CDB -c "$MAXSMTPD" \ > -u "$QMAILDUID" -g "$NOFILESGID" 0 smtp \ > $SPAMDYKE --config-file $SPAMDYKE_CONF \ > $SMTPD $VCHKPW /bin/true 2>&1 > > On 6/8/2011 4:50 PM, Sam Clippinger wrote: >> OK, I'll try to run back through this thread and respond to the various >> questions in one email... >> >> To turn off TLS in spamdyke, you can do one of several things. You can >> prohibit both spamdyke and qmail from using TLS by using this option: >> tls-level=none >> Or you can simply remove/comment out the tls-certificate-file option to >> allow spamdyke to pass encrypted traffic through to qmail. That will >> bypass some of spamdyke's filters but would allow you to continue to >> receive encrypted email. >> >> spamdyke does not implement TLS or SSL on its own, it just calls the >> installed OpenSSL library for encryption/decryption as needed. The >> version you have installed looks fine to me (my own server has 0.9.7f >> installed) and since TLS works with qmail, it should work with >> spamdyke. From the headers you sent, it looks like the remote server is >> running Windows Server 2003, probably with Exchange 2003. I correspond >> regularly with clients on that same setup (as you did before installing >> spamdyke), so I doubt the remote server is at fault. >> >> By default, spamdyke specifies the cipher list as "DEFAULT" (unless you >> override that with the "tls-cipher-list" option). The meaning of >> "DEFAULT" depends on your version of OpenSSL and the way it was >> compiled. Typically, it includes all of the usable ciphers that aren't >> known to be too weak or too computationally expensive. See this page >> for more details: >> http://www.openssl.org/docs/apps/ciphers.html#CIPHER_STRINGS >> >> Overall, I don't see anything wrong with your configuration file. I'm >> curious to know what OS, version and architecture you're using. My #1 >> suspicion is that spamdyke is running out of memory. Can you check your >> "run" file where the spamdyke command line is located and look for the >> "softlimit" command? Try doubling/tripling that number and see if this >> problem persists (don't forget to restart tcpserver after you change the >> "run" file). >> http://www.spamdyke.org/documentation/FAQ.html#TROUBLE9 >> >> -- Sam Clippinger >> >> On 6/8/11 3:03 PM, Eric Shubert wrote: >>> The first cipher listed is the same one that qmail used with a >>> successful transmission. >>> >>> Looks to me from all of this that there is a bug in spamdyke with >>> regards to that particular remote server software and TLS. >>> >>> I think this is the point where Sam can best continue helping to debug >>> this situation. >>> >>> Sam? >>> >>> >> _______________________________________________ >> spamdyke-users mailing list >> spamdyke-users@spamdyke.org >> http://www.spamdyke.org/mailman/listinfo/spamdyke-users >> >>
-- -Eric 'shubes' _______________________________________________ spamdyke-users mailing list spamdyke-users@spamdyke.org http://www.spamdyke.org/mailman/listinfo/spamdyke-users