Leandro Noferini <[email protected]> writes:
[...] >> You can check if your IMAP server is vulnerable with the command: >> $ openssl s_client -connect $SERVER:imaps -cipher "EDH" | grep >> "Server Temp Key" > >> Where $SERVER is the hostname of your IMAP server. If the result shows >> 768 bits or less then OpenSSL (and OfflineIMAP effectively) will refuse >> to connect. Soon, 1024 bits will also be treated as too weak and >> refused. > > Server Temp Key: DH, 768 bits > > Ok, it's clear! I created a new dhparam.pem file needed to courier of 2048 bytes and now it works normally. Thanks a lot to you all! -- leandro Scegli sempre un'idea che ti permetta poi di cambiarla http://6xukrlqedfabdjrb.onion
signature.asc
Description: PGP signature
_______________________________________________ OfflineIMAP-project mailing list: [email protected] http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/offlineimap-project OfflineIMAP homepages: - https://github.com/OfflineIMAP - http://offlineimap.org
