[Users] [Bug 3193] SSL Certificate changed

noreply at thewildbeast.co.uk noreply at thewildbeast.co.uk
Fri May 30 17:34:00 CEST 2014


http://www.thewildbeast.co.uk/claws-mail/bugzilla/show_bug.cgi?id=3193

--- Comment #8 from lbickley <lbickley at bickleywest.com> ---
How weird. When I try I get:
-------------------------------------------------------
openssl s_client -host inbound.att.net -port 995
CONNECTED(00000003)
depth=3 C = US, O = "VeriSign, Inc.", OU = Class 3 Public Primary Certification
Authority
verify return:1
depth=2 C = US, O = "VeriSign, Inc.", OU = VeriSign Trust Network, OU = "(c)
2006 VeriSign, Inc. - For authorized use only", CN = VeriSign Class 3 Public
Primary Certification Authority - G5
verify return:1
depth=1 C = US, O = "VeriSign, Inc.", OU = VeriSign Trust Network, OU = Terms
of use at https://www.verisign.com/rpa (c)10, CN = VeriSign Class 3 Secure
Server CA - G3
verify return:1
depth=0 C = US, ST = Michigan, L = Southfield, O = "AT&T Services, Inc.", OU =
att.net Mail 2, CN = inbound.att.net
verify return:1
---
Certificate chain
 0 s:/C=US/ST=Michigan/L=Southfield/O=AT&T Services, Inc./OU=att.net Mail
2/CN=inbound.att.net
   i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at
https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3
 1 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at
https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3
   i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign,
Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification
Authority - G5
 2 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign,
Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification
Authority - G5
   i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/ST=Michigan/L=Southfield/O=AT&T Services, Inc./OU=att.net Mail
2/CN=inbound.att.net
issuer=/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=Terms of use at
https://www.verisign.com/rpa (c)10/CN=VeriSign Class 3 Secure Server CA - G3
---
No client certificate CA names sent
---
SSL handshake has read 4399 bytes and written 831 bytes
---
New, TLSv1/SSLv3, Cipher is RC4-SHA
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
SSL-Session:
    Protocol  : TLSv1
    Cipher    : RC4-SHA
    Session-ID:
3542C018AE96BBA11E2831793DD7A2657D0902B5753D1FA0AA2DE7A322494E7C
    Session-ID-ctx: 
    Master-Key:
0EA3A949E8865DAA5F33199A902C44328666E16968B4F48C529110DD81A685FCD1A748165FBF91169A9E41A0DE6CF30C
    Key-Arg   : None
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket:
    0000 - 08 31 c0 0e d0 f6 02 ea-b7 b7 bc 1c 17 fb 5d 96   .1............].
    0010 - 9c 5e 94 39 51 16 7c aa-17 ec 6f 2e 6d 31 59 d9   .^.9Q.|...o.m1Y.
    0020 - 61 4e f0 31 63 5a 21 db-bd 34 ff 2c 4e 17 65 b5   aN.1cZ!..4.,N.e.
    0030 - 77 62 14 f9 5c 66 5e 31-a5 c1 01 d8 72 38 51 42   wb..\f^1....r8QB
    0040 - f1 50 eb f8 f1 d5 f0 19-b6 a3 9a 47 aa fb 83 4e   .P.........G...N
    0050 - 6b 9a 03 06 18 d9 a7 80-36 9a ce 15 95 5b 81 96   k.......6....[..
    0060 - 88 8f a6 d9 22 5e 41 6a-7c 2e 8c 50 39 a5 40 9e   ...."^Aj|..P9. at .
    0070 - 63 52 ba 31 e6 ed 77 b4-94 d8 35 80 44 a7 4e b2   cR.1..w...5.D.N.
    0080 - 89 c6 f7 4a 49 6e 53 e2-11 3a f2 da bd fb e0 e0   ...JInS..:......
    0090 - 90 fe 3d 16 43 ba f0 eb-3d 97 ab a4 32 46 9c bf   ..=.C...=...2F..

    Start Time: 1401463718
    Timeout   : 300 (sec)
    Verify return code: 0 (ok)
---
+OK hello from popgate-0.8.0.504347 pop103.sbc.mail.ne1.yahoo.com 
read:errno=0
------------------------------------------------------------------

Which looks O.K.to me

I'm using OpenSSL 1.0.1g 7 Apr 2014

-- 
You are receiving this mail because:
You are the assignee for the bug.



More information about the Users mailing list