On Wed, Jul 12, Vincent Lefevre wrote: > If GnuTLS is consistent, it should yield an error (in case you > have a broken configuration).
Guess I have to browse the source to see if anything does actually check for that condition, like mutt does. $ gnutls-cli -p imaps imap.gmail.com Processed 486 CA certificate(s). Resolving 'imap.gmail.com:imaps'... Connecting to '2a00:1450:400c:c0a::6c:993'... - Certificate type: X.509 - Got a certificate list of 3 certificates. - Certificate[0] info: - subject `CN=imap.gmail.com,O=Google Inc,L=Mountain View,ST=California,C=US', issuer `CN=Google Internet Authority G2,O=Google Inc,C=US', serial 0x2375d096b462bcf2, RSA key 2048 bits, signed using RSA-SHA256, activated `2017-07-05 08:17:16 UTC', expires `2017-09-27 08:09:00 UTC', pin-sha256="NeXEIiOBTzGHzeOciLdi+Bepc3pU1bN1AjhmFwV3jg0=" Public Key ID: sha1:2f8c8c03f8202cb2c0265714526abcfc73e88503 sha256:35e5c42223814f3187cde39c88b762f817a9737a54d5b3750238661705778e0d Public Key PIN: pin-sha256:NeXEIiOBTzGHzeOciLdi+Bepc3pU1bN1AjhmFwV3jg0= Public key's random art: +--[ RSA 2048]----+ | ..+. | | . + | | + . | |o+ o | |O+E S | |B= + = o . | |. . O = o . | | . * . | | . | +-----------------+ - Certificate[1] info: - subject `CN=Google Internet Authority G2,O=Google Inc,C=US', issuer `CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US', serial 0x0100212588b0fa59a777ef057b6627df, RSA key 2048 bits, signed using RSA-SHA256, activated `2017-05-22 11:32:37 UTC', expires `2018-12-31 23:59:59 UTC', pin-sha256="7HIpactkIAq2Y49orFOOQKurWxmmSFZhBCoQYcRhJ3Y=" - Certificate[2] info: - subject `CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US', issuer `OU=Equifax Secure Certificate Authority,O=Equifax,C=US', serial 0x12bbe6, RSA key 2048 bits, signed using RSA-SHA1, activated `2002-05-21 04:00:00 UTC', expires `2018-08-21 04:00:00 UTC', pin-sha256="h6801m+z8v3zbgkRHpq6L29Esgfzhj89C1SyUCOQmqU=" - Status: The certificate is trusted. - Description: (TLS1.2)-(ECDHE-RSA-SECP256R1)-(CHACHA20-POLY1305) - Session ID: C3:66:58:4C:40:54:83:13:9A:82:44:CE:2C:DF:C0:48:FF:CF:8A:01:FA:37:A2:AB:B6:18:3C:43:67:26:CE:4B - Ephemeral EC Diffie-Hellman parameters - Using curve: SECP256R1 - Curve size: 256 bits - Version: TLS1.2 - Key Exchange: ECDHE-RSA - Server Signature: RSA-SHA256 - Cipher: CHACHA20-POLY1305 - MAC: AEAD - Compression: NULL - Options: extended master secret, safe renegotiation, - Handshake was completed - Simple Client Mode: * OK Gimap ready for requests from 2001:a61:345b:acff:1864:5839:ae0e:f6b6 r11mb358651473wra Olaf
signature.asc
Description: PGP signature