In article 
<am0pr06mb50128abfa6c56f57b6cb4067b4...@am0pr06mb5012.eurprd06.prod.outlook.com>
 you write:
>I also get one valid until March 25th 2019 (so expired).
>
>I'll poke them

I was getting the expired one yesterday but now I'm getting a good one
again.  Perhaps there's a load balancer and they forgot to update some
of the servers behind it.

R's,
John

---------
$ gnutls-cli --port=25 --starttls-proto=smtp smtp-in.orange.fr
Processed 129 CA certificate(s).
Resolving 'smtp-in.orange.fr:25'...
Connecting to '193.252.22.65:25'...
- Certificate type: X.509
- Got a certificate list of 2 certificates.
- Certificate[0] info:
 - subject `CN=smtp-in.orange.fr,OU=Orange,O=Orange,L=Paris,C=FR', issuer 
`CN=DigiCert SHA2 Secure Server CA,O=DigiCert Inc,C=US', serial 
0x09f738dc72ac8a79a430362bb35d89d4, RSA key 2048 bits, signed using RSA-SHA256, 
activated `2019-02-21 00:00:00 UTC', expires `2020-03-24 12:00:00 UTC', 
pin-sha256="6TQZyz3BlP4SQgYw5OXY1D1H6yrXHzyJs94i7Cc9JKE="
        Public Key ID:
                sha1:b4a4124c17aa023aa56215f4485d828ad192729e
                
sha256:e93419cb3dc194fe12420630e4e5d8d43d47eb2ad71f3c89b3de22ec273d24a1
        Public Key PIN:
                pin-sha256:6TQZyz3BlP4SQgYw5OXY1D1H6yrXHzyJs94i7Cc9JKE=
        Public key's random art:
                +--[ RSA 2048]----+
                | o.++.+o         |
                |= ++++.          |
                |+=o++.  o        |
                |++E. . + .       |
                |*.. . . S        |
                |oo   .           |
                |                 |
                |                 |
                |                 |
                +-----------------+

- Certificate[1] info:
 - subject `CN=DigiCert SHA2 Secure Server CA,O=DigiCert Inc,C=US', issuer 
`CN=DigiCert Global Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US', serial 
0x01fda3eb6eca75c888438b724bcfbc91, RSA key 2048 bits, signed using RSA-SHA256, 
activated `2013-03-08 12:00:00 UTC', expires `2023-03-08 12:00:00 UTC', 
pin-sha256="5kJvNEMw0KjrCAu7eXY5HZdvyCS13BbA0VJG1RSP91w="
- Status: The certificate is trusted. 
- Description: (TLS1.0)-(RSA)-(AES-256-CBC)-(SHA1)
- Session ID: 
8C:EB:DB:75:0C:22:ED:6B:6C:51:AE:1F:85:F9:A3:8C:F3:4A:D1:FF:A7:C5:66:42:20:D0:21:ED:12:E4:AF:58
- Version: TLS1.0
- Key Exchange: RSA
- Cipher: AES-256-CBC
- MAC: SHA1
- Compression: NULL
- Options: safe renegotiation,
- Handshake was completed

- Simple Client Mode:

_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to