Le mercredi 29 mai 2013 08:16:24, Jason a écrit :
> Hi
>
> I noticed Weezy has been released. Did the fixes for DSPAM make it in?
Not this one. As said before I don't intend to add this patch to the packaging
as long as upstream don't accept it. Since the project seems a bit silent
these days,
Hi
I noticed Weezy has been released. Did the fixes for DSPAM make it in?
Thanks
Jason
On Apr 11, 2013, at 4:04 PM, "Thomas Preud'homme" wrote:
> Le jeudi 11 avril 2013 10:59:28, Jason Johnson a écrit :
>> Wonderful. Tranks for your help! For now I would need a special repo for
>> it. I'm cur
Le jeudi 11 avril 2013 10:59:28, Jason Johnson a écrit :
> Wonderful. Tranks for your help! For now I would need a special repo for
> it. I'm currently using DSPAM in Squeeze via the backports repo.
Alright, I'll provide you a version you can upgrade from backport without
using the version from
Wonderful. Tranks for your help! For now I would need a special repo for it.
I'm currently using DSPAM in Squeeze via the backports repo.
Thanks again,
Jason
Sent from my iPad
On 07.04.2013, at 16:10, "Thomas Preud'homme" wrote:
> Le samedi 2 mars 2013 09:34:32, Jason a écrit :
>> I think w
Le samedi 2 mars 2013 09:34:32, Jason a écrit :
> I think we've already figured it out. The problem is that DSPAM currently
> only supports TLS via STARTTLS but I'm using ldaps which is a different
> protocol. I would have submitted a patch already but I currently don't
> have a Linux dev environme
I think we've already figured it out. The problem is that DSPAM currently only
supports TLS via STARTTLS but I'm using ldaps which is a different protocol. I
would have submitted a patch already but I currently don't have a Linux dev
environment to do the build on (only a server which, for secur
Le samedi 2 février 2013 22:25:51, Jason Johnson a écrit :
> I've just tried another test here and seen what looks like a problem. If I
> point spam to an openssl test connection it fails in the following way.
>
> root@myserver:~# openssl s_server -accept 989 -cert
> /etc/ssl/certs/myserver_ldap_
I've just tried another test here and seen what looks like a problem. If I
point spam to an openssl test connection it fails in the following way.
root@myserver:~# openssl s_server -accept 989 -cert
/etc/ssl/certs/myserver_ldap_cert.pem -key
/etc/ssl/private/myserver_ldap_key.pem
Using default te
Oh sorry, it doesn't say "no mapping found" it says "Backend initialization
failure: Can't contact LDAP server" as per the log file section of my
previous mail.
On Thu, Jan 24, 2013 at 8:44 AM, Jason Johnson
wrote:
> Yes, I described the log message from openldap because DSPAM doesn't
> produce
Yes, I described the log message from openldap because DSPAM doesn't
produce one. It simply comes back with "no mapping found" as seen below.
extlookup.conf:
ExtLookup on
ExtLookupMode strict
ExtLookupDriver ldap
ExtLookupServer localhost
ExtLookupPort 636
ExtLookupDB "ou=people,dc=home,dc=lan"
Le mardi 22 janvier 2013 22:19:30, vous avez écrit :
> Package: dspam
> Version: 3.10.2+dfsg-5
>
> I am trying to use the LDAP external user verification mechanism for
> DSPAM but the connection fails with a "negotiation failure". I am
> able to use the same DM and password via the command line L
11 matches
Mail list logo