Hi,

I have a linux box running QPopper 4.04 (from Eudora). After generating a self-signed 
certificate for it, I tried connecting to it with The Bat!. The result is that TB! 
drops the connection after getting / verifying the certificate. Not giving up I tried 
connecting to it with Outlook Express and everything worked fine. I imported the 
certificate in both TB! and OE, so that can't be the problem.

After examining the QPopper log files I noticed a difference in the cyphers used.

Here's an extract:

This is when connecting with TB! 1.61 <--
Jul 12 16:10:25 gateway qpopper[23179]: (v4.0.4) TLSv1/SSLv3 handshake with client at 
gateway.cainites.net (192.168.0.1); new session-id; cipher: DES-CBC3-SHA (DES-CBC3-SHA 
SSLv3 Kx=RSA Au=RSA Enc=3DES(168) Mac=SHA1), 168 bits
Jul 12 16:11:16 gateway qpopper[23179]: (null) at gateway.cainites.net (192.168.0.1): 
-ERR POP EOF or I/O Error
-->

This is what I get when I connect with Outlook Express <--
Jul 12 16:21:35 gateway qpopper[23299]: (v4.0.4) TLSv1/SSLv3 handshake with client at 
enden.wldelft.nl (145.9.223.251); new session-id; cipher: RC4-MD5 (RC4-MD5 SSLv3 
Kx=RSA Au=RSA Enc=RC4(128) Mac=MD5 ), 128 bits
Jul 12 16:21:36 gateway qpopper[23299]: Stats: tremere 0 0 0 0 enden.wldelft.nl 
145.9.223.251
-->

This is what I used to generate the certificate:
openssl genrsa -out server.key 1024
openssl req -new -key server.key -out server.csr
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt

Does anyone have any experience using QPopper and TB! or know of a way to get this to 
work? Did I use invalid commandline options when generating the certificate.

Any help will be much appreciated.

Best regards,
Ralf van der Enden


________________________________________________________
Current Ver: 1.60q
FAQ        : http://faq.thebat.dutaint.com 
Unsubscribe: mailto:[EMAIL PROTECTED]
Archives   : http://tbudl.thebat.dutaint.com
Moderators : mailto:[EMAIL PROTECTED]
TBTech List: mailto:[EMAIL PROTECTED]
Bug Reports: https://www.ritlabs.com/bt/

Reply via email to