Self signed certificate
Alain Spineux
aspineux at gmail.com
Tue May 27 18:48:15 CEST 2008
On Tue, May 27, 2008 at 5:25 PM, Helga Mayer
<Helga.Mayer at uni-hohenheim.de> wrote:
>
> Hello,
>
> I'm sure this has been discussed before, but I did not find a suitable
> answer.
> I'm running Kolab Server 2.2 Release Candidate 2
>
> I've a self signed certificate for testing.
> When I use 'openssl s_client -connect mailbox1.rz.uni-hohenheim.de:993'
> I get:
> CONNECTED(00000003)
> depth=0 /C=de/ST=Baden-Wuerttemberg/L=Stuttgart/O=University of
> Hohenheim/OU=Computing
> Center/CN=mailbox1.rz.uni-hohenheim.de/emailAddress=rz-mail at uni-hohenheim.de
> verify error:num=18:self signed certificate
> verify return:1
> depth=0 /C=de/ST=Baden-Wuerttemberg/L=Stuttgart/O=University of
> Hohenheim/OU=Computing
> Center/CN=mailbox1.rz.uni-hohenheim.de/emailAddress=rz-mail at uni-hohenheim.de
> verify return:1
> ---
> Certificate chain
> 0 s:/C=de/ST=Baden-Wuerttemberg/L=Stuttgart/O=University of
> Hohenheim/OU=Computing
> Center/CN=mailbox1.rz.uni-hohenheim.de/emailAddress=rz-mail at uni-hohenheim.de
> i:/C=de/ST=Baden-Wuerttemberg/L=Stuttgart/O=University of
> Hohenheim/OU=Computing
> Center/CN=mailbox1.rz.uni-hohenheim.de/emailAddress=rz-mail at uni-hohenheim.de---
> Server certificate
> -----BEGIN CERTIFICATE-----
> .......
> -----END CERTIFICATE-----
> subject=/C=de/ST=Baden-Wuerttemberg/L=Stuttgart/O=University of
> Hohenheim/OU=Computing
> Center/CN=mailbox1.rz.uni-hohenheim.de/emailAddress=rz-mail at uni-hohenheim.de
> issuer=/C=de/ST=Baden-Wuerttemberg/L=Stuttgart/O=University of
> Hohenheim/OU=Computing
> Center/CN=mailbox1.rz.uni-hohenheim.de/emailAddress=rz-mail at uni-hohenheim.de
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 1669 bytes and written 331 bytes
> ---
> New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
> Server public key is 1024 bit
> Compression: NONE
> Expansion: NONE
> SSL-Session:
> Protocol : TLSv1
> Cipher : DHE-RSA-AES256-SHA
> Session-ID:
> DB9D792764710EDCCA9D4712B0562B4C1F5ED4CC690DF9E5C4FCBE2D8AF0765F
> Session-ID-ctx:
> Master-Key:
> FEB49D01EEFACF4F361A399291FB45C31A8D2C6D93D6CD68C4E08696ED562A9344DA32AC3F058EA88C3CBA5D163C8534
> Key-Arg : None
> Krb5 Principal: None
> Start Time: 1211900892
> Timeout : 300 (sec)
> Verify return code: 18 (self signed certificate)
> ---
> * OK [CAPABILITY IMAP4 IMAP4rev1 LITERAL+ ID AUTH=PLAIN SASL-IR]
> mailbox1.rz.uni-hohenheim.de Cyrus IMAP4 v2.3.11-openpkg server ready
>
> But when I try to connect to imap
> using 'telnet mailbox1.rz.uni-hohenheim.de 993'
>
> I get:
> BYE Fatal error: tls_start_servertls() failed
993 is the "secured" port for IMAP protocol and expect the traffic to
be encrypted !
Here Imap complains about telnet not doing any ecryption ! This is an
expected result for me.
What do you expect ?
>
> connect to port 143 works.
>
> Any help is appreciated.
>
> Regards
> Helga Mayer
>
> _______________________________________________
> Kolab-users mailing list
> Kolab-users at kolab.org
> https://kolab.org/mailman/listinfo/kolab-users
>
--
Alain Spineux
aspineux gmail com
May the sources be with you
More information about the users
mailing list