cameo wrote:
> Actually, I've been using
news80.forteinc.com, port 563 with SSL/TLS for
> some time when Forte sent a msg to use news80 instead of news and it's
> been working just fine till 2 days ago.
Maybe that suggestion was back when Forte added SSL connects to their
Usenet service. Their own FAQ still suggests connecting to their
news.forteinc.com hostname at:
https://www.forteinc.com/apn/faq.php#7C5BFDF93A18BB6188256D64005CDACA
They do not specify a port number in that article. Perhaps the Forte
Agent client auto-selects port 119 for non-SSL connects and 563 (*) for
SSL connects.
(*) I previously said port 463 for SSL connects. After checking, it is
port 563 that is the IANA-specified standard for NNTPS connects.
According to Ralph Fox who responded to your multi-posted copy of your
post over in news.software.readers, the problem is with the site cert
used by Forte for their SSL server. It has expired. Until they get a
new cert with a later expiration date, one choice you have would be to
configure your client, if possible, to ignore cert errors. That would
obviate the point of using SSL to ensure you connect to where you
specified since your posts are publicly available so encrypting your
communication with a Usenet server is frivilous. SSL connects are used
to identify the endpoint as the one to which you specified to connect.
The other use is to encrypt your communications between endpoints but
then that has no value with Usenet as your posts are made public for
anyone to see. There is one other advantage of SSL connects: encrypting
the login credentials to prevent an interloper from capturing them and
logging in under your account.
So, for now, just use port 119 *without* SSL (just plan text connects).
Your login credentials would be sent as plain text. How worried are you
that someone would steal your login credentials to [ab]use your account
with Forte's Usenet service? Does Forte enforce quotas on use of their
NNTP servers, like how many bytes per day you can consume? If anyone
did forge your identity and the headers in their posts reveal that they
were using your hacked account, twould be easy to contact Forte to have
your password changed. They may even provide their own "Forgot
Password" scheme that resets your password to then e-mail you a new
password (provided your e-mail address on your account with them is
still valid and you actively monitor it).
Until Forte replaces their site cert with an unexpired one, you'll have
to forego using NNTPS to their service for awhile, use non-SSL connects
to port 119, or see if you can configure your NNTP client to ignore cert
errors (assuming it will still connect using non-SSL on port 563 versus
dropping to port 119 which you could do yourself).
Different server, different requirements. Different service, different
site certs at each.
Wait for Forte to get a new and non-expired cert installed on their
NNTPS server or switch to non-SSL connects via NNTP on port 119.
> Thanks, but I already pay for news feeds from the Forte servers.
Then they should respond better and more quickly than you have noted if
you are a paying customer. However, unless you told them that you were
using SSL to connect to their NNTPS server, they probably never checked
that and just used port 119 non-SSL to verify their server is up, will
respond, and will accept connections.