Re: cf3 cf-serverd core dump (illegal cipher length)

2009-12-12 Thread Mark Burgess
Possibly. I wonder why no one has seen it before. It could be something special to do with the AIX implementation of the threads. Keep me informed. It certainly does no harm to move the lock M Matt Richards wrote: > I think we may be onto something. The cf-serverd on the policy host seems to

Re: cf3 cf-serverd core dump (illegal cipher length)

2009-12-12 Thread Matt Richards
I think we may be onto something. The cf-serverd on the policy host seems to have ran through the night no problem. I wouldn't call it fixed yet, but it is encouraging. I'll let it run a couple more days and see if that does it. Does moving the ThreadUnlock make any sense or am I way off track?

Re: cf3 cf-serverd core dump (illegal cipher length)

2009-12-11 Thread Matt Richards
Well, it is still doing it. I think it is the cf-server actually causing the illegal cipher length in the client. I am using openSSL 0.9.8l. I don't have the client side dialog, as it is very random on which host does it (and when). I do have the server debug session from the core dump. Ooops, I

Re: cf3 cf-serverd core dump (illegal cipher length)

2009-12-11 Thread Mark Burgess
Your email is like the scene in Alice in Wonderland where she is walking down a corridor that gets smaller and smaller...the font size seems to disappear into oblivion with each line ;-) Any chance you could capture one of these sessions in debug mode (cut out the relevant dialogue)? My coll

cf3 cf-serverd core dump (illegal cipher length)

2009-12-10 Thread Matt Richards
Well some good news and some bad news. cf-serverd did core dump last night on the policy host. I did get output from two clients at the same time. one was from a regular cf-agent regular run (06:22:02 am): Protocol transaction sent illegal cipher length !! Authentication dialogue with x.xx.xx.