Leandro Noferini <[email protected]> writes:

[...]

>> You can check if your IMAP server is vulnerable with the command:
>>     $ openssl s_client -connect $SERVER:imaps -cipher "EDH" | grep
>> "Server Temp Key"
>
>> Where $SERVER is the hostname of your IMAP server. If the result shows
>> 768 bits or less then OpenSSL (and OfflineIMAP effectively) will refuse
>> to connect. Soon, 1024 bits will also be treated as too weak and
>> refused.
>
> Server Temp Key: DH, 768 bits
>
> Ok, it's clear!

I created a new dhparam.pem file needed to courier of 2048 bytes and now
it works normally.

Thanks a lot to you all!

-- 
leandro
Scegli sempre un'idea che ti permetta poi di cambiarla
http://6xukrlqedfabdjrb.onion

Attachment: signature.asc
Description: PGP signature

_______________________________________________
OfflineIMAP-project mailing list: [email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/offlineimap-project

OfflineIMAP homepages:
- https://github.com/OfflineIMAP
- http://offlineimap.org

Reply via email to