From owner-freebsd-questions@freebsd.org Sun May 31 16:10:45 2020 Return-Path: Delivered-To: freebsd-questions@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id A15193384DC for ; Sun, 31 May 2020 16:10:45 +0000 (UTC) (envelope-from guru@unixarea.de) Received: from ms-10.1blu.de (ms-10.1blu.de [178.254.4.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 49Zjvm4r59z4KrT for ; Sun, 31 May 2020 16:10:44 +0000 (UTC) (envelope-from guru@unixarea.de) Received: from [80.187.82.30] (helo=[172.20.10.4]) by ms-10.1blu.de with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.86_2) (envelope-from ) id 1jfQXp-0007Xd-Tr for freebsd-questions@freebsd.org; Sun, 31 May 2020 18:10:41 +0200 From: Matthias Apitz To: Subject: IMAP && Server certificate has expired Date: Sun, 31 May 2020 18:10:40 +0200 User-Agent: Dekko/0.6.20; Qt/5.4.1; ubuntumirclient; Linux; MIME-Version: 1.0 Message-ID: <5e1a71cd-6837-47f1-b485-c583550db48a@unixarea.de> In-Reply-To: <20200531132051.GA7974@c720-r342378> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: quoted-printable X-Con-Id: 51246 X-Con-U: 0-guru X-Originating-IP: 80.187.82.30 X-Rspamd-Queue-Id: 49Zjvm4r59z4KrT X-Spamd-Bar: +++ Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of guru@unixarea.de has no SPF policy when checking 178.254.4.101) smtp.mailfrom=guru@unixarea.de X-Spamd-Result: default: False [3.61 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; HAS_XOIP(0.00)[]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(0.81)[0.807]; MIME_GOOD(-0.10)[text/plain]; TO_DN_NONE(0.00)[]; DMARC_NA(0.00)[unixarea.de]; AUTH_NA(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; RCVD_IN_DNSWL_LOW(-0.10)[178.254.4.101:from]; NEURAL_SPAM_MEDIUM(0.99)[0.986]; NEURAL_SPAM_LONG(1.01)[1.014]; RWL_MAILSPIKE_POSSIBLE(0.00)[178.254.4.101:from]; R_SPF_NA(0.00)[no SPF record]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:42730, ipnet:178.254.4.0/24, country:DE]; RCVD_TLS_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; RCVD_COUNT_TWO(0.00)[2] X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 31 May 2020 16:10:45 -0000 Hello, When I connect with the MUA mutt directly with IMAP to my ISP with: $ mutt -f imap://imap.1blu.de:143/ I get since some hours: Server certificate has expired and the cert presented gives the information below. I can overcome the situation with 'set ssl_verify_dates=3Dno' in .muttrc, but I'm wondering what should I tell to my ISP as no information about his server (1blu.de) shows up in the expired certificate. Or is this because something on my OpenSSL installation expired? FreeBSD is an older CURRENT from January 2019 and ports of the same time. Any ideas? =09matthias >=20 >=20 > This certificate belongs to: > AddTrust External CA Root > Unknown > AddTrust AB > AddTrust External TTP Network > Unknown > Unknown > SE >=20 > This certificate was issued by: > AddTrust External CA Root > Unknown > AddTrust AB > AddTrust External TTP Network > Unknown > Unknown > SE >=20 > This certificate is valid > from May 30 10:48:38 2000 GMT > to May 30 10:48:38 2020 GMT >=20 > SHA1 Fingerprint: 02FA F3E2 9143 5468 6078 5769 4DF5 E45B 6885 1868 > SHA256 Fingerprint: 687F A451 3822 78FF F0C8 B11F 8D43 D576 > 671C 6EB2 BCEA B413 FB83 D965 D06D 2FF2 >=20 >=20 --=20 Sent from my Ubuntu phone http://www.unixarea.de/ NO to the EU! NEIN zur EU!