On 18.11.2021 21:00, Jeremy Harris via Exim-users wrote:> On 18/11/2021
10:35, Andrea Biscuola via Exim-users wrote:
>> is. From what I was able to understand, we should modify the
>> remote_smtp and
>> remote_smtp_forward_transport sections to solve the problem, with the
>>
On 31.05.2021 23:29, Viktor Dukhovni via Exim-users wrote:
I see, the version of OpenSSL may be relevant here.
Is the server in question "mail.fuze.pl"? On port 25 for that server I
This is not the server but It uses the same configuration and same
FreeBSD/openssl version - but as I tested
On 31.05.2021 22:59, Viktor Dukhovni via Exim-users wrote:
I checked on exim built on FreeBSD 12 (with openssl 1.1) and it works fine -
but fails on other installation with openssl 1.0.
So what version of FreeBSD and OpenSSL are on the system with the
reported issue? Support for negotiated
On 31.05.2021 14:42, Cyborg via Exim-users wrote:
The client did not offer a cipher you have allowed.
But it's not true (see details in my reponse to Viktor's mail).
You can do various tests to find out with openssl's s_client:
with s_client I always succeed - eg. when I use first cipher
On 31.05.2021 14:27, Viktor Dukhovni via Exim-users wrote:
On Mon, May 31, 2021 at 01:44:39PM +0200, Marcin Gryszkalis via Exim-users
wrote:
exim's cipher list is wide
ALL:!EXPORT:!DES:!RC2:!RC4:!MD5:!PSK:!aNULL:!eNULL:!EXP:!SRP:!DSS:!DHE:!3DES
What is the reason for disabling DHE ciphers
Hi, I have problem with one server connecting to my exim.
Just after Client Hello server sends "Handshake Failure" and closes
connection.
exim's cipher list is wide
ALL:!EXPORT:!DES:!RC2:!RC4:!MD5:!PSK:!aNULL:!eNULL:!EXP:!SRP:!DSS:!DHE:!3DES
and contains ciphers that are mentioned by client,
On 19.07.2020 23:00, Evgeniy Berdnikov via Exim-users wrote:
> On Sun, Jul 19, 2020 at 08:28:34PM +0200, Marcin Gryszkalis via
Exim-users wrote:
>> select regexp_replace('${quote_mysql:$authenticated_id}',
>> '[^A-Za-z0-9_.-]', '') }}/${tod_logfile}
>>
>> I know I
Hi
I'm testing 4.94 for possible issues regarding recent tainting changes -
and found one similar to one discussed in other thread but a bit
different (more info below).
It seems that Jeremy is all against creating generic string detaint -
but I don't agree and I still needed quick workaround so
On 2018-04-09 00:50, Jeremy Harris via Exim-users wrote:
Bug 2255.
bingo, it seems that exim's bugzilla is not crawled by google
I wonder if anybody observed similar behavior and managed to find
better
fix (on client side probably?).
Apparently not. We thought that disabling the sessions
Hi,
after upgrade to 4.90 I noticed strange behavior on Outlook@win7
(0x800CCC1A "Your Server does not support the connection encryption type
you have specified.")
but it was not typical ciphersuite mismatch - something was really strange
- outlook managed to send the message successfully on
10 matches
Mail list logo