From: Matthias A. <mat...@gm...> - 2020-12-02 22:24:05
|
Am 02.12.20 um 22:02 schrieb Joe Acquisto-j4: > fetchmail: 6.3.26 Now gettting this error: > > fetchmail: OpenSSL reported: error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed > fetchmail: mail.xxxhost.com: SSL connection failed. > fetchmail: socket error while fetching from in...@jb...@mail.xxxhost.com > fetchmail: Query status=2 (SOCKET) > > Cert on my end appears valid. Oh, and in case mail.xxxhost.com is the true name, I offer my apologies for assuming it were made up, then the operator of mail.xxxhost.com needs to fix the certificate and/or configuration, or you need to configure to poll from an alternative hostname that is vacares.com or ends in .vacares.com. Running a recent fetchmail reveals it's a server-side configuration error: > $ FETCHMAILHOME=/tmp VCS-mine/fetchmail-64.git/_build-asan/fetchmail > --user johndoe mail.xxxhost.com --ssl -ppop3 --auth external > fetchmail: Server CommonName mismatch: *.vacares.com != mail.xxxhost.com > fetchmail: Server certificate verification error: Hostname mismatch > fetchmail: OpenSSL reported: error:1416F086:SSL > routines:tls_process_server_certificate:certificate verify failed > fetchmail: mail.xxxhost.com: SSL connection failed. > fetchmail: socket error while fetching from jo...@ma... > fetchmail: Query status=2 (SOCKET) Adding -v to fetchmail's command line (verbose mode) reveals some more (you could add a second -v, not shown here, left as an exercise for the reader): > $ FETCHMAILHOME=/tmp VCS-mine/fetchmail-64.git/_build-asan/fetchmail > -v --user johndoe mail.xxxhost.com --ssl -ppop3 --auth external > fetchmail: 6.4.14 querying mail.xxxhost.com (protocol POP3) at Mi 02 > Dez 2020 23:18:39 CET: poll started > Trying to connect to 84.247.2.168/995...connected. > fetchmail: Server certificate: > fetchmail: Issuer Organization: Sectigo Limited > fetchmail: Issuer CommonName: Sectigo RSA Domain Validation Secure > Server CA > fetchmail: Subject CommonName: *.vacares.com > fetchmail: Subject Alternative Name: *.vacares.com > fetchmail: Subject Alternative Name: vacares.com > fetchmail: Server CommonName mismatch: *.vacares.com != mail.xxxhost.com > fetchmail: mail.xxxhost.com key fingerprint: > 96:0F:21:78:99:7C:29:98:A6:2B:1F:B8:8D:51:4A:68 > fetchmail: Server certificate verification error: Hostname mismatch > fetchmail: OpenSSL reported: error:1416F086:SSL > routines:tls_process_server_certificate:certificate verify failed > fetchmail: mail.xxxhost.com: SSL connection failed. > fetchmail: socket error while fetching from jo...@ma... > fetchmail: 6.4.14 querying mail.xxxhost.com (protocol POP3) at Mi 02 > Dez 2020 23:18:39 CET: poll completed > fetchmail: Query status=2 (SOCKET) > fetchmail: normal termination, status 2 Similar outcome with gnutls-cli (see Status near the end): > $ gnutls-cli -p 993 mail.xxxhost.com > Processed 147 CA certificate(s). > Resolving 'mail.xxxhost.com:993'... > Connecting to '84.247.2.168:993'... > - Certificate type: X.509 > - Got a certificate list of 4 certificates. > - Certificate[0] info: > - subject `CN=*.vacares.com', issuer `CN=Sectigo RSA Domain > Validation Secure Server CA,O=Sectigo Limited,L=Salford,ST=Greater > Manchester,C=GB', serial 0x008dfe7795c6d801c5326f05a13b5c3e2a, RSA key > 4096 bits, signed using RSA-SHA256, activated `2020-06-05 00:00:00 > UTC', expires `2021-06-05 23:59:59 UTC', > pin-sha256="MfW9RHMXODSXNfNRy0f4k8v253Lb/ySWrSo3wfzDTkg=" > Public Key ID: > sha1:28e3271a15a526f38e813f7cff6a9164e34cfb46 > > sha256:31f5bd44731738349735f351cb47f893cbf6e772dbff2496ad2a37c1fcc34e48 > Public Key PIN: > pin-sha256:MfW9RHMXODSXNfNRy0f4k8v253Lb/ySWrSo3wfzDTkg= > > - Certificate[1] info: > - subject `CN=Sectigo RSA Domain Validation Secure Server > CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GB', issuer > `CN=USERTrust RSA Certification Authority,O=The USERTRUST > Network,L=Jersey City,ST=New Jersey,C=US', serial > 0x7d5b5126b476ba11db74160bbc530da7, RSA key 2048 bits, signed using > RSA-SHA384, activated `2018-11-02 00:00:00 UTC', expires `2030-12-31 > 23:59:59 UTC', pin-sha256="4a6cPehI7OG6cuDZka5NDZ7FR8a60d3auda+sKfg4Ng=" > - Certificate[2] info: > - subject `CN=USERTrust RSA Certification Authority,O=The USERTRUST > Network,L=Jersey City,ST=New Jersey,C=US', issuer `CN=AAA Certificate > Services,O=Comodo CA Limited,L=Salford,ST=Greater Manchester,C=GB', > serial 0x3972443af922b751d7d36c10dd313595, RSA key 4096 bits, signed > using RSA-SHA384, activated `2019-03-12 00:00:00 UTC', expires > `2028-12-31 23:59:59 UTC', > pin-sha256="x4QzPSC810K5/cMjb05Qm4k3Bw5zBn4lTdO/nEW/Td4=" > - Certificate[3] info: > - subject `CN=AAA Certificate Services,O=Comodo CA > Limited,L=Salford,ST=Greater Manchester,C=GB', issuer `CN=AAA > Certificate Services,O=Comodo CA Limited,L=Salford,ST=Greater > Manchester,C=GB', serial 0x01, RSA key 2048 bits, signed using > RSA-SHA1, activated `2004-01-01 00:00:00 UTC', expires `2028-12-31 > 23:59:59 UTC', pin-sha256="vRU+17BDT2iGsXvOi76E7TQMcTLXAqj0+jGPdW7L1vM=" > - Status: The certificate is NOT trusted. The name in the certificate > does not match the expected. > *** PKI verification of server certificate failed... > *** Fatal error: Error in the certificate. HTH Matthias |