[Pkg-dspam-misc] Bug#698732: dspam external map does not work with TLS enabled

Thomas Preud'homme robotux at debian.org
Fri Feb 22 19:03:17 UTC 2013


Le samedi 2 février 2013 22:25:51, Jason Johnson a écrit :
> I've just tried another test here and seen what looks like a problem.  If I
> point spam to an openssl test connection it fails in the following way.
> 
> root at myserver:~# openssl s_server -accept 989 -cert
> /etc/ssl/certs/myserver_ldap_cert.pem -key
> /etc/ssl/private/myserver_ldap_key.pem
> Using default temp DH parameters
> Using default temp ECDH parameters
> ACCEPT
> ERROR
> 7447:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown
> protocol:s23_srvr.c:578:
> shutting down SSL
> CONNECTION CLOSED
> ACCEPT
> 
> This looks like DSPAM doesn't speak the right protocol, no?

Hi Jason,

sorry for the delay. Could you run the same test by adding -msg (hopefully -
debug won't be needed). I'd like to see what are the messages sent by dspam.

Thanks a lot.

Thomas
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.alioth.debian.org/pipermail/pkg-dspam-misc/attachments/20130222/29bc3902/attachment-0001.pgp>


More information about the Pkg-dspam-misc mailing list