On Thu, Apr 10, 2008 at 05:41:49PM +0200, Jerome Louvel said:
> 
> > Could it be that you miss enough entropy? (Check
> > /proc/kernel/random/entropy_available during the failing connection).
> 
> I just did 'cat /proc/sys/kernel/random/entropy_avail' and got '0' as a
> result. Does it look bad?

That is bad.

Another method of testing would be openssl s_client or swaks.  openssl
may give you more verbose (but not necessarily more helpful :) errors
about ssl negotiation failures.
-- 
 --------------------------------------------------------------------------
|  Stephen Gran                  | This code passes Torvalds test grades   |
|  [EMAIL PROTECTED]             | 0, 1 and 2 (it looks ok, it compiles    |
|  http://www.lobefin.net/~steve | and it booted).    -- Alan Cox          |
 --------------------------------------------------------------------------

-- 
## List details at http://lists.exim.org/mailman/listinfo/exim-users 
## Exim details at http://www.exim.org/
## Please use the Wiki with this list - http://wiki.exim.org/

Reply via email to