Pages: 1 2 Next
RSS
Invalid mai certicate
 
I've tried all kind of certificates, but none of them work. Could someone please give me the exact link to a valid certificate for this server?

2018/03/16, 00:03:49: FETCH - Connecting to POP3 server pop.xs4all.nl on port 995
2018/03/16, 00:03:50: FETCH - Initiating TLS handshake
>2018/03/16, 00:03:50: FETCH - Certificate S/N: 0464978330EDB9023980833E045392CF656E, algorithm: ECC (384 bits), issued from 2/12/2018 12:35:40 PM to 5/13/2018 12:35:40 PM, for 8 host(s): pop.xs4all.nl, mail.xs4all.nl, pop-ipv4.xs4all.nl, pop-ipv6.xs4all.nl, pop3.cistron.nl, pop3.demon.nl, pop3.xs4all.nl, pops.xs4all.nl.
>2018/03/16, 00:03:50: FETCH - Owner: "pop.xs4all.nl".
>2018/03/16, 00:03:50: FETCH - Issuer: "US", "Let's Encrypt", "Let's Encrypt Authority X3". Valid from 10/6/2016 3:43:55 PM to 10/6/2021 3:43:55 PM. The issuer of this certificate chain was not found!
>2018/03/16, 00:03:50: FETCH - Missing issuer: "US", "Internet Security Research Group", "ISRG Root X1".
!2018/03/16, 00:03:50: FETCH - TLS handshake failure. Invalid server certificate (The issuer of this certificate chain was not found).  
Edited: Loek van Kooten - 16 March 2018 11:52:43
 
The missing ISRG Root X1 certificate can be had here, it seems:  https://letsencrypt.org/certificates/

You would then have to import it into The Bat's address book (which doubles as a certificate store).

Alternatively, you can tell The Bat to use Windows' certificate store (in hopes that that store already contains that root certificate), through Options | S/Mime and TLS: use Microsoft CryptoAPI.
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
Thank you for your reply!

I tried both options. None of them worked.
 
When you open the Address Book (F8) and enable the display of certificates (address book menu: View | Certificate Address Books), do you see the entry that you made for the ISRG Root X1 certificate? If it didn't work out, try again by making a new contact in the Trusted Root CA category. You could enter  ISRG Root X1 as 'first name' and then go to the Certificates tab, where you can press Import to import the certificate, and OK to save. Afterwards, I'd exit and re-launch The Bat and then check the address book again to see if the certificate is still there.

If it doesn't work after that, do you still get exactly the same error message as in your opening post here? Have you contacted XS4ALL to see if they have any suggestions?
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
I did as you said. The error message is:

>2018/03/19, 01:26:54: FETCH - Owner: "pop.xs4all.nl".
>2018/03/19, 01:26:54: FETCH - Issuer: "US", "Let's Encrypt", "Let's Encrypt Authority X3". Valid from 3/17/2016 4:40:46 PM to 3/17/2021 4:40:46 PM. The issuer of this certificate chain was not found!
>2018/03/19, 01:26:54: FETCH - Missing issuer: "Digital Signature Trust Co.", "DST Root CA X3".
!2018/03/19, 01:26:54: FETCH - TLS handshake failure. Invalid server certificate (The issuer of this certificate chain was not found).
2018/03/19, 01:26:55: FETCH - TLS handshake complete
2018/03/19, 01:26:55: FETCH - connected to POP3 server
2018/03/19, 01:26:55: FETCH - authenticated (plain)
2018/03/19, 01:26:55: FETCH - 212 messages in the mailbox, 0 new
2018/03/19, 01:26:55: FETCH - TLS connection completed successfully
2018/03/19, 01:26:55: FETCH - connection finished - 0 messages received

I've contacted XS4ALL. They say they renewed their certificates, and that Ritlabs is to blame.
 
And yes, the certificate is still there. Deleting and recreating it does not help.


Also, Support does not answer my request. It's been 3 days. I find that an awful lot for a paying user (with three licenses even).
Edited: Loek van Kooten - 19 March 2018 02:30:40
 
The "DST Root CA X3" issuer in the latest error message is new.

Have you verified that it is in your address book? (If you have an older version of The Bat, it may not be there. It would be strange if the certificate is there but you are still getting that error message..)

If you don't have this root certificate after all, I'd recommend that you download and import the .pem version from this page:

https://ssl-tools.net/subjects/6ff4684d4312d24862819cc02b3d472c1d8a2fa6

(it's the top-most, 'self-signed' certificate in the list there).

XS4ALL is a good provider, but the fact that they changed their certificate long before it expired suggests that more users must have been having problems with it.
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
I tried using the self-signed PEM certificate mentioned on said page and imported it under DST Root CA X3.

I now get:

2018/03/20, 15:06:23: FETCH - Initiating TLS handshake
>2018/03/20, 15:06:23: FETCH - Certificate S/N: 0464978330EDB9023980833E045392CF656E, algorithm: ECC (384 bits), issued from 2/12/2018 12:35:40 PM to 5/13/2018 12:35:40 PM, for 8 host(s): pop.xs4all.nl, mail.xs4all.nl, pop-ipv4.xs4all.nl, pop-ipv6.xs4all.nl, pop3.cistron.nl, pop3.demon.nl, pop3.xs4all.nl, pops.xs4all.nl.
>2018/03/20, 15:06:23: FETCH - Owner: "pop.xs4all.nl".
>2018/03/20, 15:06:23: FETCH - Issuer: "US", "Let's Encrypt", "Let's Encrypt Authority X3". Valid from 3/17/2016 4:40:46 PM to 3/17/2021 4:40:46 PM.
>2018/03/20, 15:06:23: FETCH - Root: "Digital Signature Trust Co.", "DST Root CA X3". Valid from 9/30/2000 9:12:19 PM to 9/30/2021 2:01:15 PM.
!2018/03/20, 15:06:23: FETCH - TLS handshake failure. Invalid server certificate (The certificate cannot be used for this purpose).
 
In Account Properties | Transport | Receive Mail, is the Connection field set to 'Secure to dedicated port (TLS)' and the Port to 995?

If that doesn't work, I'd try Connection: 'Secure to regular port (STARTTLS)'.


According to www.sslchecker.com/sslchecker, xs4all's certificate is valid for:

           X509v3 Key Usage: critical
               Digital Signature, Key Encipherment
           X509v3 Extended Key Usage:
               TLS Web Server Authentication, TLS Web Client Authentication

(I checked for pop.xs4all.nl, port:995 there)

It doesn't say anything about Email or Emailprotection, so, maybe The Bat is right that the certificate is not fit for this purpose. It is also strange that this certificate will only be valid for three months (it expires May 13, 2018). The sslchecker.com site also reports a missing "DST Root CA X3" (just like The Bat did on your system), which suggests that not all major parties on the internet (who make browsers and devices) trust it yet. I find it strange that xs4all would be using such a certificate chain, it all seems a bit experimental to me.

At any rate, if you can't get it to work now, I think the most plausible explanation is that The Bat is right and xs4all's certificate may not be valid for email protection. Which would be weird because many more xs4all customers would be complaining if that's true. If you write to xs4all's helpdesk again and nothing useful comes out, I'd ask for escalation of your support request to a senior technician (and maybe refer him to this thread).
Edited: Daniel van Rooijen - 20 March 2018 18:56:28
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
Yes, those are the settings, Changing the port and protocol doesn't change anything. This results in no response. I'll contact XS4ALL again! Thank you very much so far for your help.
 
Hello!

Don't be fooled by the "TLS Web Server Authentication" and "TLS Web Client Authentication". It's just a common name for basic server/client certificate authentication. Our previous wildcard-certificate from COMODO CA had exactly the same Extended Key Usage defined, as can be seen on https://crt.sh/?id=163808376.

All Let's Encrypt certificates are only valid for 3 months, which no difference for the validity of the certificate. If anything, renewing more often only adds to security, especially when combined with a new private key per renewal.

The certificates are not only perfectly valid for this usage, 99% of all of our connecting clients accept this, and the last 1% are ancient, by their vendor unsupported clients (e.g. Outlook 2003, Exchange 2010, fetchmail and alike). And mostly because they either 1) Don't understand Subject Alternative Name (fetchmail), or 2) Don't have the Let's Encrypt Root CA in their trust store as the trust store is too old.

The latter seems to be the case with The Bat, which you already seem to have resolved by importing the required Root CA certificates.
Let's Encrypt has issued over 100 million certificates to date, and is possibly the largest certificate provider in the world at this very moment. It's run by the Linux Foundation, funded by Google, Microsoft, Mozilla (who even have employees at Let's Encrypt), Akamai, HP, Cisco and alike. Their technical advisory board consists of Akamai, Mozilla, Google, the Internet Society, and the Electronic Frontier Foundation (who also have employees there).

The DST Root CA (IdenTrust) was only used to cross-sign their initial CA, because DST was already in trust stores, please see: https://letsencrypt.org/certificates/

I believe that stating the problem is with Let's Encrypt and us is incorrect, and needs resolving in The Bat. Other than the Root CA changing to an -apparently- unknown one and now being a specific certificate requiring support for X509v3 SAN extensions (due to not being a wildcard), no ciphers/protocols have changed.

Kind regards,

Daniël Mostertman
System Engineer at XS4ALL Internet bv
 
Excellent! See, I said xs4all isn't half bad!  :D

Thanks Daniël, for taking the time to register and respond here!

Loek, are you sure that you're using a current version (v8.*) of The Bat? If so, I guess that would put the ball back into Ritlabs' court. I hope they will be able to resolve the issue.

I see only two differences between the old and new pop.xs4all.nl certificate situations (other than the obvious differences due to different issuers):

1) As Daniël also says, the old certificate used a wildcard to specify valid alternative server names:

X509v3 Subject Alternative Name:
   DNS:*.xs4all.nl
   DNS:xs4all.nl


The new certificate mentions the valid servers all by name:

X509v3 Subject Alternative Name:
   DNS:mail.xs4all.nl
   DNS:pop-ipv4.xs4all.nl
   DNS:pop-ipv6.xs4all.nl
   DNS:pop.xs4all.nl
   DNS:pop3.cistron.nl
   DNS:pop3.demon.nl
   DNS:pop3.xs4all.nl
   DNS:pops.xs4all.nl


However both certificates were made out to the same common name of 'pop.xs4all.nl', which is what you are using, so this shouldn't make a difference.

2) The old certificate had an entry for 'X509v3 CRL Distribution Points', the new one does not. CRL stands for Certificate Revocation List. This is optional, not required, so I don't think this should be causing a problem either.

old certificate:

X509v3 CRL Distribution Points:                                              
      Full Name:                                                            
      URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl


I don't have an account at xs4all myself, so I can't do any testing from my end.

It's a bit strange that when you switched The Bat to validation through Windows' CryptoAPI, it still did not work. If you are so inclined, you could give that another try, but it would only work if your version of Windows has all the required certificates in its store. In Windows 8.1 and 10 you can run the command MMC to see the installed certificates and import any missing ones.
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
The Microsoft Certificate Store lists DST Root CA X3. However, using it in TheBat! gives:

2018/03/21, 23:56:51: FETCH - Connecting to POP3 server pop.xs4all.nl on port 995
2018/03/21, 23:56:51: FETCH - Initiating TLS handshake
>2018/03/21, 23:56:51: FETCH - Certificate S/N: 0464978330EDB9023980833E045392CF656E, algorithm: 1.2.840.10045.2.1 (384 bits), issued from 2/12/2018 12:35:40 PM to 5/13/2018 12:35:40 PM, for 8 host(s): mail.xs4all.nl, pop-ipv4.xs4all.nl, pop-ipv6.xs4all.nl, pop.xs4all.nl, pop3.cistron.nl, pop3.demon.nl, pop3.xs4all.nl, pops.xs4all.nl.
>2018/03/21, 23:56:51: FETCH - Owner: pop.xs4all.nl.
>2018/03/21, 23:56:51: FETCH - Issuer: US, Let's Encrypt, Let's Encrypt Authority X3.
!2018/03/21, 23:56:51: FETCH - TLS handshake failure. Invalid server certificate. The certificate cannot be used for this purpose
 
P.S. This is in Version 8.2.8 (64-bit)
 
I didn't manage to succesfully get The Bat! to work for me (the Window of the Wizard just disappears), but while taking another look at the errors you showed, I think I might have an idea as to what is going on:

2018/03/20, 15:06:23: FETCH - Certificate S/N:  0464978330EDB9023980833E045392CF656E, algorithm: ECC (384 bits), issued  from 2/12/2018 12:35:40 PM to 5/13/2018 12:35:40 PM, for 8 host(s):  pop.xs4all.nl, mail.xs4all.nl, pop-ipv4.xs4all.nl, pop-ipv6.xs4all.nl,  pop3.cistron.nl, pop3.demon.nl, pop3.xs4all.nl, pops.xs4all.nl.
2018/03/20, 15:06:23: FETCH - TLS handshake failure. Invalid server  certificate (The certificate cannot be used for this purpose).

Since we switched to Let's Encrypt, we issue all certificates twice. Once with a 4096-bit RSA-key, and once with a 384-bit EC-key. It seems The Bat! is connecting using the EC-certificate, but the SSL-library it is using can not make the connection (can't agree on a cipher?). It's late now, and I can't debug much further, but if there is any way of specifically setting/testing a specific cipher or forcing the use of the RSA-certificate (instead of the EC), that might help.

Edit: Maybe it wasn't entirely clear, but we have both types of certificates active, and the client can choose by itself whether to go for RSA or EC.
Edited: Daniël Mostertman - 22 March 2018 01:49:49
 
To add, the following protocols are supported, with these accompanying EC-ciphers:
Code
|   TLSv1.0:
|       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
|   TLSv1.1:
|       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
|   TLSv1.2:
|       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 - strong
|       TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 - strong
|       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA - strong
|       TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 - strong
|       TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 - strong
|       TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 - strong
|       TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 - strong
|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - strong
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA - strong
|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 - strong
|       TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - strong
|       TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 - strong
|       TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 - strong
 
I should add that it's a first that a provider actually comes to forums to help debugging - that is incredible and something I really appreciate. Thank you very much for your time. Hopefully our friends from Moldavia will actually respond, because until now their response time has been far from impressive (it has been like that for 15 years and I'm afraid it will never improve).
 
Hi again, Loek!

No problem at all. I just wish I had realised the EC thing sooner, I didn't know someone had enabled that (though it shouldn't have caused problems like this). For now, we've disabled the EC-certificate. Can you perhaps have another look, and see if it's working now?

If it works now, please note that we do have the wish to enable it again at a later time, but at the moment there's no rush for it.

Daniël
 
Quote
Daniel van Rooijen wrote:
The sslchecker.com site also reports a missing "DST Root CA X3" (just like The Bat did on your system), which suggests that not all major parties on the internet (who make browsers and devices) trust it yet.
Just for the record: The mentioned site does exactly the same thing for www.google.com's certificate :) I wouldn't put much stock in it not having the Root CA certificate. Seems it doesn't have any current one.
 
Thanks again for your help and information, Daniël! If this actually does work for Loek, I wonder if it might also work if your server would first offer the RSA certificate and then the EC (if that's possible at all). Either way, kudos for changing the mailserver configuration of one of Holland's premier ISP's just to suit the users of a sometimes quirky but otherwise very pleasant email client :)

I'm not sure what you meant when you wrote "I didn't manage to succesfully get The Bat! to work for me (the Window of the Wizard just disappears)" but more than a few people have had a problem where The Bat's splash screen just disappears and the program becomes inaccessible. Some have been able to solve that by specifying " /nologo" (without the quotes) on the command line that launches The Bat - this skips the splash screen.
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
Daniel, it works! The service of XS4ALL, indeed one of the premier ISP's in Holland, is incredible compared to the deafening silence from our friends in Moldavia. It puts them to shame, to be honest.

Thank you very much, and I hope Ritlabs will come up with a final solution in a few centuries or so, so that you can re-enable the EC certificate.
 
P.S. OCD Alert. I guess there's no way I can change mai into mail in the topic of this thread, right?
 
Very happy to help, and glad it's resolved!

Quote
Daniel van Rooijen wrote:
I'm not sure what you meant when you wrote "I didn't manage to succesfully get The Bat! to work for me (the Window of the Wizard just disappears)" but more than a few people have had a problem where The Bat's splash screen just disappears and the program becomes inaccessible. Some have been able to solve that by specifying " /nologo" (without the quotes) on the command line that launches The Bat - this skips the splash screen.
That was exactly what I was looking for, thanks! With that I managed to get the Wizard again, and set up a test-account in it. Everything works out of the box now (latest version of The Bat! on Windows 10 Enterprise here). I didn't need to import any Root CA's or anything, just worked as-is.. so I think the first problem might've had to do with the EC-certificate as well(?).

Have a nice day :)
 
Cool, one less problem in the world! :)  Loek, please keep us posted if you hear anything, it would be good to know if The Bat will support these EC certificates in the future.
I volunteer as a moderator to help keep the forum tidy. I do not work for Ritlabs SRL.
 
I will do so. Until now I haven't heard from Ritlabs. They are incredibly slow.
Pages: 1 2 Next