Search Support

Avoid support scams. We will never ask you to call or text a phone number or share personal information. Please report suspicious activity using the “Report Abuse” option.

Learn More

IMAP problems

  • 5 cavab
  • 2 have this problem
  • 8 views
  • Last reply by Matt

more options

my Thunderbird just upgraded to 38.2.0 and Connections to my IMAP server stopped working.

It says in the status bar at the food of the program. Connected to mail.Server.com and just sits there with a blue spinning icon.

I can prove the server is working by using my iPhone/ipad and I created a account in Mac Mail and it works fine so It seems to be related to thunderbird and the new update. Its connecting over ssl port 993 using password.

Bob

my Thunderbird just upgraded to 38.2.0 and Connections to my IMAP server stopped working. It says in the status bar at the food of the program. Connected to mail.Server.com and just sits there with a blue spinning icon. I can prove the server is working by using my iPhone/ipad and I created a account in Mac Mail and it works fine so It seems to be related to thunderbird and the new update. Its connecting over ssl port 993 using password. Bob

All Replies (5)

more options

Open the error console from the tools menu. Clear it and then check for mail. What error messages appear?

more options

well it comes up with Timestamp: 26/08/2015 13:25:09 Error: An error occurred during a connection to mail.server.com:993.

The server certificate included a public key that was too weak.

(Error code: ssl_error_weak_server_cert_key)

more options

using Apple mail seems to work

more options

OK Fixed thanks.

Cert had expired so issued a new one with a stronger key. I guess the new version aggressively checks the cert.

Bob

more options

Gruntos said

OK Fixed thanks. Cert had expired so issued a new one with a stronger key. I guess the new version aggressively checks the cert. Bob

It aggressively (your words) checks the length. Keys less than 2048 bits are rejected.

Full details of Logjam and Weak Diffie-Hellman key exchanges can be read on the security teams web site. https://weakdh.org/ Research conducted by computer scientists at CNRS, Inria Nancy-Grand Est, Inria Paris-Rocquencourt, Microsoft Research, Johns Hopkins University, University of Michigan, and the University of Pennsylvania