Re: Anyone else having password failures at pop.gmail.com?
On Thursday 27 August 2015 22:14:43 Joel Rees wrote:
> I lost track of this thread somehow. Sorry.
>
> On Thu, Aug 20, 2015 at 11:39 PM, Frédéric Marchal
> <frederic.marchal@wowtechnology.com> wrote:
> > On Thursday 20 August 2015 07:53:33 Joel Rees wrote:
> >> Any chance it's the old problem with Google's chain to a root CA?
> >
> > Could you elaborate on this problem?
>
> http://arstechnica.com/information-technology/2015/04/google-let-root-certif
> icate-for-gmail-expire-causing-e-mail-hiccups/
>
> may or may not be what I was remembering about the CA.
Thanks. The link says Google let its certificate expires once. That's not the
problem I saw. My message was about the root certificate not being valid for
that purpose.
With little luck, it was much more benign than a hacker having his way with
the LAN.
> > Kmail just popped a warning this morning about an invalid google
> > certificate. Kmail claims that "the root certificate is not valid for
> > that purpose" (whatever that means)…
> >
> > I would like to know how to make sure whether it is safe to accept the
> > certificate or not.
> >
> > My employer's gateway may be providing a fake certificate to monitor the
> > SSL communication but I don't know how to tell if the certificate was
> > rewritten by the legitimate gateway or by a rogue third party or if
> > google messed up.
> Do you know how to manually verify a certificate?
Let's see if I did my homework correctly :-)
I get the certificate:
openssl s_client -connect imap.gmail.com:993
Certificate chain
0 s:/C=US/ST=California/L=Mountain View/O=Google Inc/CN=imap.gmail.com
i:/C=US/O=Google Inc/CN=Google Internet Authority G2
1 s:/C=US/O=Google Inc/CN=Google Internet Authority G2
i:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
2 s:/C=US/O=GeoTrust Inc./CN=GeoTrust Global CA
i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
I download GeoTrust CA certificate from their web site:
wget https://www.geotrust.com/resources/root_certificates/<snip>.pem
Then I run this to verify the chain down to the third level:
openssl s_client -connect imap.gmail.com:993 -verify 3 -CApath .
depth=3 C = US, O = Equifax, OU = Equifax Secure Certificate Authority
verify return:1
depth=2 C = US, O = GeoTrust Inc., CN = GeoTrust Global CA
verify return:1
depth=1 C = US, O = Google Inc, CN = Google Internet Authority G2
verify return:1
depth=0 C = US, ST = California, L = Mountain View, O = Google Inc, CN =
imap.gmail.com
verify return:1
<...snip...>
Verify return code: 0 (ok)
Is this procedure valid?
May I use it next time kmail complains about the root certificate if I'm
running it from inside the LAN that might have been compromised? I wonder
about the wget step.
Thanks,
Frederic
Reply to: