On Thu, Apr 10, 2008 at 05:41:49PM +0200, Jerome Louvel said: > > > Could it be that you miss enough entropy? (Check > > /proc/kernel/random/entropy_available during the failing connection). > > I just did 'cat /proc/sys/kernel/random/entropy_avail' and got '0' as a > result. Does it look bad?
That is bad. Another method of testing would be openssl s_client or swaks. openssl may give you more verbose (but not necessarily more helpful :) errors about ssl negotiation failures. -- -------------------------------------------------------------------------- | Stephen Gran | This code passes Torvalds test grades | | [EMAIL PROTECTED] | 0, 1 and 2 (it looks ok, it compiles | | http://www.lobefin.net/~steve | and it booted). -- Alan Cox | -------------------------------------------------------------------------- -- ## List details at http://lists.exim.org/mailman/listinfo/exim-users ## Exim details at http://www.exim.org/ ## Please use the Wiki with this list - http://wiki.exim.org/
