:: On Mon, 22 Dec 2014 12:12:39 +0100
:: <20141222121239.00001...@gmx.net>
:: Grayhat <gray...@gmx.net> wrote:

> :: On Mon, 22 Dec 2014 12:02:48 +0100
> ::
> <titc.9433ab725d.of306905e4.80bd1da5-onc1257db6.003ae7d5-c1257db6.003ca...@thockar.com>
>  ::
> Thomas Eckardt <thomas.ecka...@thockar.com> wrote:
> 
> > Net::SSLeay
> 
> C:\> ppm s Net-SSLeay
> 1: Net-SSLeay
>    Perl extension for using OpenSSL (1.0.1j)
>    Version: 1.66
>    Author: Maintained by Mike McCauley and Florian Ragwitz since
> November 2005 Repo: bribes.org
>    CPAN: http://search.cpan.org/dist/Net-SSLeay-1.66/
>    Installed: 1.66 (site)
>    Installed: 1.52 (perl)
> 
> sounds like the installed version should support TLS1.1 and 1.2 but
> judging from the openssl tests I ran this doesn't seem to be the case;
> I wonder if that version difference between "site" and "perl" may be
> the source of the issue (not sure what it means)

Ok, found a possible hint; when I try running

openssl s_client -starttls smtp -tls1_1 -connect my.assp.xyz:25

ASSP logs the following message

[5728] (ASSP): 2014-12-22 03:26:19 [Worker_3] xx.xx.xx.xx error:
Couldn't upgrade to TLS for client xx.xx.xx.xx: SSL connect accept
failed because of handshake problems error:1409442E:SSL
routines:SSL3_READ_BYTES:tlsv1 alert protocol version

same goes if I try with TLS 1.2; no problem with the vanilla TLSv1; the
installed openssl is version 1.0.1j not sure what else to check


------------------------------------------------------------------------------
Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server
from Actuate! Instantly Supercharge Your Business Reports and Dashboards
with Interactivity, Sharing, Native Excel Exports, App Integration & more
Get technology previously reserved for billion-dollar corporations, FREE
http://pubads.g.doubleclick.net/gampad/clk?id=164703151&iu=/4140/ostg.clktrk
_______________________________________________
Assp-test mailing list
Assp-test@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/assp-test

Reply via email to