search for: ssl_proxy_new

Displaying 7 results from an estimated 7 matches for "ssl_proxy_new".

2007 Jul 17
2
assertion failed
I'm getting these in my log: Jul 17 11:40:42 postamt dovecot: imap-login: file ssl-proxy-openssl.c: line 460 (ssl_proxy_new): assertion failed: (fd != -1) Jul 17 11:40:42 postamt dovecot: child 26581 (login) killed with signal 6 Jul 17 11:51:12 postamt dovecot: imap-login: file ssl-proxy-openssl.c: line 460 (ssl_proxy_new): assertion failed: (fd != -1) Jul 17 11:51:12 postamt dovecot: child 24406 (login) killed with sig...
2004 Jun 22
2
Compile error
.../local/sbin"\" -I/usr/local/include -g -O2 -Wall -W -Wmissing-prototypes -Wmissing-declarations -Wpointer-arith -Wchar-subscripts -Wformat=2 -Wbad-function-cast -c ssl-proxy-gnutls.c ssl-proxy-gnutls.c:11:2: #error broken currently ssl-proxy-gnutls.c:310: error: conflicting types for `ssl_proxy_new' ssl-proxy.h:12: error: previous declaration of `ssl_proxy_new' ssl-proxy-gnutls.c: In function `ssl_proxy_new': ssl-proxy-gnutls.c:319: warning: passing arg 2 of `gnutls_transport_set_ptr' makes pointer from integer without a cast ssl-proxy-gnutls.c: In function `read_dh_parameters...
2007 Jul 06
0
assertion failed & invalid password field
I'm getting these in my log: Jul 6 09:52:51 postamt dovecot: imap-login: file ssl-proxy-openssl.c: line 460 (ssl_proxy_new): assertion failed: (fd != -1) Jul 6 09:52:51 postamt dovecot: child 31576 (login) killed with signal 6 Jul 6 10:37:44 postamt dovecot: imap-login: file ssl-proxy-openssl.c: line 460 (ssl_proxy_new): assertion failed: (fd != -1) Jul 6 10:37:44 postamt dovecot: child 25241 (login) killed with sig...
2005 Jan 15
1
STARTTLS and inetd
...that TLS is enabled when in fact it isn't (we're connecting to port 110 and port 143, so the --ssl parameter isn't present). The reason for that is found in login-common/main.c:main(): > if (fd != -1) > (void)client_create(fd, &ip, TRUE); I added a flag which I set when ssl_proxy_new() is successfully called (see the following diff) and it seems to work fine. Is there any reason it shouldn't? What's the reason that the code is the way it is? -- Magnus Holmgren holmgren at lysator.liu.se P.S. Nice software! --- src/login-common/main.c 2003-11-08 16:15:42.000000...
2003 Nov 04
0
PATCH: make local IP address available to auth modules
The attached patch makes the local IP address to which the client connected available to the authentication modules; i.e., the local IP address is available for substitution as %i for the mysql and pgsql modules. We needed this feature to support thousands of our legacy accounts which are authenticated by username/local_part (not the full email address) and IP address (one per domain). Timo,
2004 Dec 19
1
0.99.13-rc1
http://dovecot.org/rc/ I guess the RCing in 0.99.12 didn't help that much. SQL/LDAP authentication crashed because memory was freed wrong. Please test so it would actually work in 0.99.13. Also fixed SEARCH UNKEYWORD which wasn't working. Also added 1.0-test's oe-ns-eoh POP3 workaround built-in. -------------- next part -------------- A non-text attachment was scrubbed... Name:
2010 Feb 19
2
segfault - (imap|pop3)-login during nessus scan
We've been struggling with a problem for the past couple of days which to this point I've only gotten to be able to boil down to this: 1. Install nessus home edition (less pluggins I assume) 2. run all scans (sequentially or in parallel, doesn't seem to matter) 3. about 3 minutes in /var/log/messages will show segfaults on imap and/or pop3 imap-login[22185]: segfault at