Here's a dump of yahoo's imap server response to an open connect attempt, in case anyone can easily see how/where a change needs to be made. It's most likely someone changed the hello response or something silly.
Code: Select all
CONNECTED(00000003)
depth=3 C = US, O = "VeriSign, Inc.", OU = Class 3 Public Primary Certification Authority
verify return:1
depth=2 C = US, O = "VeriSign, Inc.", OU = VeriSign Trust Network, OU = "(c) 2006 VeriSign, Inc. - For authorized use only", CN = VeriSign Class 3 Public Primary Certification Authority - G5
verify return:1
depth=1 C = US, O = Symantec Corporation, OU = Symantec Trust Network, CN = Symantec Class 3 Secure Server CA - G4
verify return:1
depth=0 C = US, ST = California, L = Sunnyvale, O = Yahoo Inc., OU = Information Technology, CN = *.imap.mail.yahoo.com
verify return:1
---
Certificate chain
0 s:/C=US/ST=California/L=Sunnyvale/O=Yahoo Inc./OU=Information Technology/CN=*.imap.mail.yahoo.com
i:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4
1 s:/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4
i:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5
2 s:/C=US/O=VeriSign, Inc./OU=VeriSign Trust Network/OU=(c) 2006 VeriSign, Inc. - For authorized use only/CN=VeriSign Class 3 Public Primary Certification Authority - G5
i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/ST=California/L=Sunnyvale/O=Yahoo Inc./OU=Information Technology/CN=*.imap.mail.yahoo.com
issuer=/C=US/O=Symantec Corporation/OU=Symantec Trust Network/CN=Symantec Class 3 Secure Server CA - G4
---
No client certificate CA names sent
Peer signing digest: SHA512
Server Temp Key: ECDH, P-256, 256 bits
---
SSL handshake has read 4758 bytes and written 431 bytes
---
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : ECDHE-RSA-AES256-GCM-SHA384
Session-ID: 596DCE396EA8E1946DA6C3AE44408DB232D9E28924F94C8B3F7AFFD989E4C64D
Session-ID-ctx:
Master-Key: 84BB0B0842DE7A07AA1A578DC3D02EFBB11E04D1FA502D00D0E385EB8D36C66E3CFC8A42CF57812BD5F144841AD63FD1
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1500368441
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
* OK [CAPABILITY IMAP4rev1 ID MOVE NAMESPACE X-ID-ACLID UIDPLUS LITERAL+ XYMHIGHESTMODSEQ SASL-IR AUTH=PLAIN AUTH=LOGIN AUTH=XYMLOGIN AUTH=XYMPKI AUTH=XYMCOOKIEB64 AUTH=XOAUTH2 AUTH=OAUTHBEARER] IMAP4rev1 Hello