The sylpheed mailer uses SSLv23_client_method to establish the imap/smtp
connections. My mailserver seems to understand only SSLv3. If I connect
manually using the commandline client, sslv2 fails while sslv3 seems to
work.

The sslv2 output is as follows:
$ openssl s_client -ssl2 -connect mailbox.rwth-aachen.de:993
CONNECTED(00000003)
139651264628368:error:1407F0E5:SSL routines:SSL2_WRITE:ssl handshake
failure:s2_pkt.c:429:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 7 bytes and written 48 bytes
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : SSLv2
    Cipher    : 0000
    Session-ID: 
    Session-ID-ctx: 
    Master-Key: 
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1389010802
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---

If I use -ssl3, the connection is established correctly. Sylpheed
however, which uses  SSL_CTX_new(SSLv23_client_method()) fails with 

SSL_connect() failed with error 1, ret = -1 (error:14077410:SSL
routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure)

I would like to tell openssl to enforce sslv3 only for that host as a
temporary workaround, is it possible to globally configure openssl in
that way or would I have to patch sylpheed until the issue is resolved?

Best regards

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to