Problems with cyrus 2.5.10 after system update
    Patrick Goetz 
    pgoetz at mail.utexas.edu
       
    Wed May 17 11:01:55 EDT 2017
    
    
  
Hi -
No, the private key and certificate should match; I'm using the same 
key/cert pair for webmail, and that one works fine.  I'm still thinking 
cyrus 2.5.10 isn't compatible with the newest version of openssl.  Here 
is the "enumerate ciphers" nmap output for the mail, and webmail 
servers, respectively:
[root at toad ~]# nmap --script +ssl-enum-ciphers -p 143 
mail.episcopalarchives.org
Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-17 09:59 CDT
Nmap scan report for mail.episcopalarchives.org (216.82.212.230)
Host is up (0.019s latency).
PORT    STATE SERVICE
143/tcp open  imap
Nmap done: 1 IP address (1 host up) scanned in 2.80 seconds
[root at toad ~]# nmap --script +ssl-enum-ciphers -p 443 
mail.episcopalarchives.org
Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-17 10:00 CDT
Nmap scan report for mail.episcopalarchives.org (216.82.212.230)
Host is up (0.018s latency).
PORT    STATE SERVICE
443/tcp open  https
| ssl-enum-ciphers:
|   TLSv1.0:
|     ciphers:
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: client
|   TLSv1.1:
|     ciphers:
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: client
|   TLSv1.2:
|     ciphers:
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
|       TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
|       TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|       TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
|       TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
|     compressors:
|       NULL
|     cipher preference: client
|_  least strength: A
Nmap done: 1 IP address (1 host up) scanned in 2.87 seconds
On 05/17/2017 09:52 AM, Wolfgang Breyha wrote:
> Patrick Goetz wrote on 17/05/17 16:40:
>> SSL alert number 40
> 
> This error has nothing to do with SSLv3 or protocol version at all. Maybe your
> private key and certificate do not match on server side.
> 
> Greetings, Wolfgang
> 
    
    
More information about the Info-cyrus
mailing list