Pretraži podršku

Izbjegni prevare podrške. Nikad te nećemo tražiti da nas nazoveš, da nam pošalješ telefonski broj ili da podijeliš osobne podatke. Prijavi sumnjive radnje pomoću opcije „Prijavi zlouporabu”.

Saznaj više

IMAP problems

  • 5 odgovora
  • 2 imaju ovaj problem
  • 8 prikaza
  • Posljednji odgovor od Matt

more options

my Thunderbird just upgraded to 38.2.0 and Connections to my IMAP server stopped working.

It says in the status bar at the food of the program. Connected to mail.Server.com and just sits there with a blue spinning icon.

I can prove the server is working by using my iPhone/ipad and I created a account in Mac Mail and it works fine so It seems to be related to thunderbird and the new update. Its connecting over ssl port 993 using password.

Bob

my Thunderbird just upgraded to 38.2.0 and Connections to my IMAP server stopped working. It says in the status bar at the food of the program. Connected to mail.Server.com and just sits there with a blue spinning icon. I can prove the server is working by using my iPhone/ipad and I created a account in Mac Mail and it works fine so It seems to be related to thunderbird and the new update. Its connecting over ssl port 993 using password. Bob

Svi odgovori (5)

more options

Open the error console from the tools menu. Clear it and then check for mail. What error messages appear?

more options

well it comes up with Timestamp: 26/08/2015 13:25:09 Error: An error occurred during a connection to mail.server.com:993.

The server certificate included a public key that was too weak.

(Error code: ssl_error_weak_server_cert_key)

more options

using Apple mail seems to work

more options

OK Fixed thanks.

Cert had expired so issued a new one with a stronger key. I guess the new version aggressively checks the cert.

Bob

more options

Gruntos said

OK Fixed thanks. Cert had expired so issued a new one with a stronger key. I guess the new version aggressively checks the cert. Bob

It aggressively (your words) checks the length. Keys less than 2048 bits are rejected.

Full details of Logjam and Weak Diffie-Hellman key exchanges can be read on the security teams web site. https://weakdh.org/ Research conducted by computer scientists at CNRS, Inria Nancy-Grand Est, Inria Paris-Rocquencourt, Microsoft Research, Johns Hopkins University, University of Michigan, and the University of Pennsylvania