On 3/3/26 17:13, Ivan Leonardo wrote:
Sudah ketemu Pak Problem dan solusinya :

Problem :
di Trusted Root Certification Authorities folder : ada 2 certificate R46 sectigo, 1 yg selfsigned by sectigo dan 1 lagi CrossSigned oleh UserTrust
Harus pakai yg CrossSigned

Solusi :
Saya delete cert R46 yg selfsigned dan restart MD services, sy coba new installed TB di laptop lain dan test setting account, POP3 sudah aman tidak minta add exception lagi. Sptnya ini sectigo ada perubahan di system mereka ato gimana ga ngerti, yg dikasih saat create SSL Cert cuman R46 yg selfsigned, utk yg CrossSigned harus cari sendiri di webnya sectigo

Bisa tolong test command openssl -connect dari linux pak ? utk port 143, 587, 993, 465 seharusnya sudah berhasil sih, cert chain sudah lengkap semua.

port 143/imap-tls masih belum ok.
port 587/msa-tls masih/sudah ok
port 993/imap-ssl masih/sudah ok.
port 465/smtp-ssl masih/sudah ok
port 443/webmail-ssl/https masih belum ok.

Kalau tadi dari windows saya test pakai openssl command plus -CAFile, sudah berhasil sih.

Test nya dari LAN dan internet (koneksi data selular)?

$ openssl s_client -starttls smtp -connect webmail.pttdp.com:587
CONNECTED(00000003)
depth=2 C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
verify return:1
depth=1 C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36
verify return:1
depth=0 CN = webmail.pttdp.com
verify return:1
---
Certificate chain
 0 s:CN = webmail.pttdp.com
i:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Feb 27 00:00:00 2026 GMT; NotAfter: Mar 30 23:59:59 2027 GMT 1 s:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36 i:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
   a:PKEY: rsaEncryption, 3072 (bit); sigalg: RSA-SHA384
v:NotBefore: Mar 22 00:00:00 2021 GMT; NotAfter: Mar 21 23:59:59 2036 GMT 2 s:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46 i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA384
v:NotBefore: Mar 22 00:00:00 2021 GMT; NotAfter: Jan 18 23:59:59 2038 GMT
---
Post-Handshake New Session Ticket arrived:
SSL-Session:
    Protocol  : TLSv1.3
    Cipher    : TLS_AES_256_GCM_SHA384
Session-ID: DD42C6A593636366508470AE83B965DAC2D16A8F01219554F1160DE79469000A
    Session-ID-ctx:
Resumption PSK: 8B2D55CFE4A08160A43F1B362276A6F2372E871A4FB80E801FDD5D4A0C2DC92E8D401FF0C71548E2351D95E0AA36B81E
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 36000 (seconds)
    TLS session ticket:
0000 - 90 1f 00 00 01 d2 d4 4f-b7 a7 cb 55 30 fb c7 b4 .......O...U0... 0010 - 82 cb 04 27 45 24 1f 1b-a4 b6 7b 46 56 3d ce 25 ...'E$....{FV=.%

    Start Time: 1772579544
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
    Max Early Data: 0
---
read R BLOCK

$ openssl s_client -starttls smtp -connect webmail.pttdp.com:143
CONNECTED(00000003)
Didn't find STARTTLS in server response, trying anyway...


$ openssl s_client -connect webmail.pttdp.com:465
CONNECTED(00000003)
depth=2 C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
verify return:1
depth=1 C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36
verify return:1
depth=0 CN = webmail.pttdp.com
verify return:1
---
Certificate chain
 0 s:CN = webmail.pttdp.com
i:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Feb 27 00:00:00 2026 GMT; NotAfter: Mar 30 23:59:59 2027 GMT 1 s:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36 i:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
   a:PKEY: rsaEncryption, 3072 (bit); sigalg: RSA-SHA384
v:NotBefore: Mar 22 00:00:00 2021 GMT; NotAfter: Mar 21 23:59:59 2036 GMT 2 s:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46 i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA384
v:NotBefore: Mar 22 00:00:00 2021 GMT; NotAfter: Jan 18 23:59:59 2038 GMT
---
read R BLOCK
220 webmail.pttdp.com ESMTP Wed, 04 Mar 2026 06:14:14 +0700


$ openssl s_client -connect webmail.pttdp.com:993
CONNECTED(00000003)
depth=2 C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
verify return:1
depth=1 C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36
verify return:1
depth=0 CN = webmail.pttdp.com
verify return:1
---
Certificate chain
 0 s:CN = webmail.pttdp.com
i:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Feb 27 00:00:00 2026 GMT; NotAfter: Mar 30 23:59:59 2027 GMT 1 s:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication CA DV R36 i:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46
   a:PKEY: rsaEncryption, 3072 (bit); sigalg: RSA-SHA384
v:NotBefore: Mar 22 00:00:00 2021 GMT; NotAfter: Mar 21 23:59:59 2036 GMT 2 s:C = GB, O = Sectigo Limited, CN = Sectigo Public Server Authentication Root R46 i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA384
v:NotBefore: Mar 22 00:00:00 2021 GMT; NotAfter: Jan 18 23:59:59 2038 GMT
---
read R BLOCK
* OK webmail.pttdp.com IMAP4rev1 ready

$ openssl s_client -connect webmail.pttdp.com:443
4077BAEEE37F0000:error:8000006E:system library:BIO_connect:Connection timed out:../crypto/bio/bio_sock2.c:114:calling connect() 4077BAEEE37F0000:error:10000067:BIO routines:BIO_connect:connect error:../crypto/bio/bio_sock2.c:116:
connect:errno=110



--
syafril
--------
Syafril Hermansyah

MDaemon-L Moderator, run MDaemon 26.0.0 Beta D
Mohon tidak kirim private mail (atau cc:) untuk masalah MDaemon.

Anda tidak membuat suatu produk untuk diri Anda sendiri. Anda perlu mengetahui apa yang diinginkan orang lain dan membuat produk tersebut untuk mereka.
        -- Walt Disney


--
--[mdaemon-l]----------------------------------------------------------
Milis ini untuk Diskusi antar pengguna MDaemon Mail Server di Indonesia

Netiket: https://wiki.openstack.org/wiki/MailingListEtiquette
Arsip: http://mdaemon-l.dutaint.com
Dokumentasi : http://mdaemon.dutaint.com
Berlangganan: Kirim mail ke [email protected]
Henti Langgan: Kirim mail ke [email protected]
Versi terakhir: MDaemon 25.5.2, SecurityGateway 12.0.0



Kirim email ke