On Wed, Jul 12, Vincent Lefevre wrote:

> If GnuTLS is consistent, it should yield an error (in case you
> have a broken configuration).

Guess I have to browse the source to see if anything does actually check
for that condition, like mutt does.


 $   gnutls-cli -p imaps imap.gmail.com
Processed 486 CA certificate(s).
Resolving 'imap.gmail.com:imaps'...
Connecting to '2a00:1450:400c:c0a::6c:993'...
- Certificate type: X.509
- Got a certificate list of 3 certificates.
- Certificate[0] info:
 - subject `CN=imap.gmail.com,O=Google Inc,L=Mountain View,ST=California,C=US', 
issuer `CN=Google Internet Authority G2,O=Google Inc,C=US', serial 
0x2375d096b462bcf2, RSA key 2048 bits, signed using RSA-SHA256, activated 
`2017-07-05 08:17:16 UTC', expires `2017-09-27 08:09:00 UTC', 
pin-sha256="NeXEIiOBTzGHzeOciLdi+Bepc3pU1bN1AjhmFwV3jg0="
        Public Key ID:
                sha1:2f8c8c03f8202cb2c0265714526abcfc73e88503
                
sha256:35e5c42223814f3187cde39c88b762f817a9737a54d5b3750238661705778e0d
        Public Key PIN:
                pin-sha256:NeXEIiOBTzGHzeOciLdi+Bepc3pU1bN1AjhmFwV3jg0=
        Public key's random art:
                +--[ RSA 2048]----+
                |  ..+.           |
                | . +             |
                |  + .            |
                |o+ o             |
                |O+E     S        |
                |B= + = o .       |
                |. . O = o .      |
                |   . *   .       |
                |    .            |
                +-----------------+

- Certificate[1] info:
 - subject `CN=Google Internet Authority G2,O=Google Inc,C=US', issuer 
`CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US', serial 
0x0100212588b0fa59a777ef057b6627df, RSA key 2048 bits, signed using RSA-SHA256, 
activated `2017-05-22 11:32:37 UTC', expires `2018-12-31 23:59:59 UTC', 
pin-sha256="7HIpactkIAq2Y49orFOOQKurWxmmSFZhBCoQYcRhJ3Y="
- Certificate[2] info:
 - subject `CN=GeoTrust Global CA,O=GeoTrust Inc.,C=US', issuer `OU=Equifax 
Secure Certificate Authority,O=Equifax,C=US', serial 0x12bbe6, RSA key 2048 
bits, signed using RSA-SHA1, activated `2002-05-21 04:00:00 UTC', expires 
`2018-08-21 04:00:00 UTC', 
pin-sha256="h6801m+z8v3zbgkRHpq6L29Esgfzhj89C1SyUCOQmqU="
- Status: The certificate is trusted.
- Description: (TLS1.2)-(ECDHE-RSA-SECP256R1)-(CHACHA20-POLY1305)
- Session ID: 
C3:66:58:4C:40:54:83:13:9A:82:44:CE:2C:DF:C0:48:FF:CF:8A:01:FA:37:A2:AB:B6:18:3C:43:67:26:CE:4B
- Ephemeral EC Diffie-Hellman parameters
 - Using curve: SECP256R1
 - Curve size: 256 bits
- Version: TLS1.2
- Key Exchange: ECDHE-RSA
- Server Signature: RSA-SHA256
- Cipher: CHACHA20-POLY1305
- MAC: AEAD
- Compression: NULL
- Options: extended master secret, safe renegotiation,
- Handshake was completed

- Simple Client Mode:

* OK Gimap ready for requests from 2001:a61:345b:acff:1864:5839:ae0e:f6b6 
r11mb358651473wra


Olaf

Attachment: signature.asc
Description: PGP signature

Reply via email to