Control: severity -1 normal

On Tue, Nov 10, 2020 at 10:30 PM Francesco Potortì <poto...@isti.cnr.it> wrote:
> fetchmail can no longer download mail from some servers.  In the logfile
> it reports:
>
> fetchmail: OpenSSL reported: error:141A318A:SSL 
> routines:tls_process_ske_dhe:dh key too small
> fetchmail: SSL connection failed.
> fetchmail: socket error while fetching from addr...@server.org
> fetchmail: Query status=2 (SOCKET)
> fetchmail: Server certificate verification error: Hostname mismatch
> fetchmail: OpenSSL reported: error:141A318A:SSL 
> routines:tls_process_ske_dhe:dh key too small
 Please note what the log says. It comes from OpenSSL and _not_ from
fetchmail. This is for your safety. SHA-1 algorithm is no longer
supported for key signatures, RSA and DHE keys shorter than 2048 bits
are no longer considered safe. The servers you get this log for fail
with one or both the mentioned cases. Ask the system administrators of
those servers to upgrade the used keys and signatures.
I think this level of checking was first introduced with OpenSSL
1.1.1f and all applications will refuse to work if compiled with this
or newer version (for example curl). If you don't mind sending your
login information on an now unsecure channel, you can restore the
previous behaviour. You need to edit /etc/ssl/openssl.cnf and set
"CipherString = DEFAULT@SECLEVEL=2" to one instead. But then again,
it's definitely NOT recommended for your security.

Regards,
Laszlo/GCS

Reply via email to