In response to what "A. non Eyemouse" <some...@work.invalid> wrote :
Hi a.non.eymous,
Yet again I appreciate that you're purposefully helpful,
where I will try to respond in kind, so that our posts
will always add value to this newsgroup every time we post.
Thanks for suggesting the slproweb latest version, as likely
wholly unbeknownst to you I had also asked on the freeware &
windows newssgroups for the latest binary files.
Unfortunately, so far anyway, the only responses were,
essentially, the unhelpful advice to compile it myself...
o <
http://tinyurl.com/alt-comp-freeware>
(which isn't all that helpful as I haven't run a Makefile in a decade).
o Which openssl Windows binary do you recommend (to have the latest official version)?
<
https://groups.google.com/forum/#!topic/alt.comp.freeware/mZgki-TvHlo>
I _may_ compile it anyway, but that will take a lot of work
as I have to figure out a compiler for one (e.g., gcc) and whatever
else is needed to compile the openssl tarball src to a Windows binary.
Luckily, from the slproweb choices you had suggested
o I installed the "light" EXE (as the MSI caused Windows defender to complain)
<
https://slproweb.com/download/Win64OpenSSL_Light-1_1_1g.exe>
Name: Win64OpenSSL_Light-1_1_1g.exe
Size: 3711230 bytes (3624 KiB)
SHA256: 9DAF1964D886A548BBDCE67560EC73AA050F7448407459F2FD247813EC14527F
This appears to be the latest openssl version (AFAICT):
c:\> openssl version
OpenSSL 1.1.1g 21 Apr 2020
Thanks for that suggestion - but I couldn't find the openssl binaries.
o I found they said they "linked" with openssl...
But I wasn't even sure what that means to someone looking for ssl binaries.
BTW, as an aside, I use the Windows native curl.exe all the time
o Mostly to check my network status
C:\> curl.exe
icanhazip.com
{RETURNS your WAN IP address}
I admit openly that I wouldn't know what to do with this information
o But I saved it in my readme in my openssl archives for future use. :)
> Windows nslookup returns a non-existent domain for
dizium.net.
I'm not sure if that is a typo, but it's "dizum" not "dizium". :)
>
news.albasani.net:563 - this one is broken. (1) It's using a
> self-signed certificate, but (2) it has expired.
I got _multiple_ results for the single query on albasani...
o But I do not know how to _interpret_ what these results tell me.
Command:
echo q | openssl s_client -connect
news.albasani.net:563 | openssl x509 -noout -enddate | findstr "notAfter"
Result:
depth=0 C = CH, ST = Some-State, L = Zurich, O = Albasani, OU = Roman Racine, CN =
reader.albasani.net, emailAddress =
roman....@gmail.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = CH, ST = Some-State, L = Zurich, O = Albasani, OU = Roman Racine, CN =
reader.albasani.net, emailAddress =
roman....@gmail.com
verify error:num=10:certificate has expired
notAfter=Jul 21 15:37:36 2019 GMT
verify return:1
depth=0 C = CH, ST = Some-State, L = Zurich, O = Albasani, OU = Roman Racine, CN =
reader.albasani.net, emailAddress =
roman....@gmail.com
notAfter=Jul 21 15:37:36 2019 GMT
verify return:1
notAfter=Jul 21 15:37:36 2019 GMT
Thank you for suggesting aioe's encrypted server (I usually use the 119 port).
o Here are a few I found by hunting around (I'm sure there are more!)
Ordered by expiry date...
o *aioe* = notAfter=May 14 12:34:41 2020 GMT
echo q | openssl s_client -connect
nntp.aioe.org:563 | openssl x509 -noout -enddate | findstr "notAfter"
o *eternal-september* = notAfter=Jun 13 09:09:38 2020 GMT
o *mixmin* = notAfter=Jun 26 19:57:30 2020 GMT
echo q | openssl s_client -connect
news.mixmin.net:563 | openssl x509 -noout -enddate | findstr "notAfter"
o *albasani* = notAfter=Jul 21 15:37:36 2019 GMT
echo q | openssl s_client -connect
news.albasani.net:563 | openssl x509 -noout -enddate | findstr "notAfter"
o *individual* = notAfter=Aug 25 14:52:45 2021 GMT
echo q | openssl s_client -connect
news.individual.de:563 | openssl x509 -noout -enddate | findstr "notAfter"
o *neodome* = notAfter=Dec 31 21:59:46 2020 GMT
echo q | openssl s_client -connect
news.neodome.net:563 | openssl x509 -noout -enddate | findstr "notAfter"
I don't know why these failed (ordered alphabetically):
o *altopia* = unable to load certificate
echo q | openssl s_client -connect
newsipv6.altopia.com:563 | openssl x509 -noout -enddate | findstr "notAfter"
o *dizum* = unable to load certificate
echo q | openssl s_client -connect
news.dizum.net:563 | openssl x509 -noout -enddate | findstr "notAfter"
NOTE: I'm not sure why the findstring doesn't grep out the other crap though.
> Yes a script would be useful.
Someday someone who knows how to code will hack one out for the team.
--
Usenet is a wondrously rich public helpdesk to politely discuss solutions.