Yeah, according to this page: http://support.google.com/mail/bin/answer.py?hl=en&answer=21291&ctx=gmail#strictSSL they changed the policy on the 12th.
I really think they should provide an option to disable this strict checking.
--
You received this message because you are subscribed to the Google Groups "Gmail-Users" group.To post to this group, send email to gmail...@googlegroups.com.
To unsubscribe from this group, send email to gmail-users...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/gmail-users?hl=en.
I have the same problem. Google says if you are facing problems with the new Strict SSL policy, uncheck the SSL box. But when I uncheck the SSL box,I cannot connect to my e-mail server because server wants an SSL connection. It says: "Connection timed out: There may be a problem with the settings you added. Please contact your other email provider to verify the correct server name and port."
Google must solve this. This is a huge problem...
16 Aralık 2012 Pazar 17:04:23 UTC+2 tarihinde Piotr Balwierz yazdı:I am running a small non-commercial server for a couple dozen of people.
Google right now adds me more work, hassle, and probably tells me to spend my money on certificates.
Or is it simply an action against 3rd party servers and google wants users to use exclusively gmail?
--
You received this message because you are subscribed to the Google Groups "Gmail-Users" group.
To view this discussion on the web visit https://groups.google.com/d/msg/gmail-users/-/JQCHX8lHLu8J.
@vukko(Marko):
I think you don't understand here something: We ARE our own providers. We maintain our own servers. And having a CA signed certificate means paying $$ €€ ¥¥ each year to some company and it is not safer for us at all and adds more cost and effort.
On Tuesday, 18 December 2012 00:36:12 UTC+1, vukko wrote:It is not up to Google to support POP3 servers using self-signed certificates. They have made the decision, quite rightly (IMHO) to use strict SSL.You should ask your provider why they are not using a valid CA signed certificate.
--Marko
--
You received this message because you are subscribed to the Google Groups "Gmail-Users" group.
To view this discussion on the web visit https://groups.google.com/d/msg/gmail-users/-/eXlhVR_5D_oJ.
@vukko(Marko):
I think you don't understand here something: We ARE our own providers. We maintain our own servers. And having a CA signed certificate means paying $$ €€ ¥¥ each year to some company and it is not safer for us at all and adds more cost and effort.
On Tuesday, 18 December 2012 00:36:12 UTC+1, vukko wrote:
It is not up to Google to support POP3 servers using self-signed certificates. They have made the decision, quite rightly (IMHO) to use strict SSL.You should ask your provider why they are not using a valid CA signed certificate.
--Marko
--
You received this message because you are subscribed to the Google Groups "Gmail-Users" group.
To view this discussion on the web visit https://groups.google.com/d/msg/gmail-users/-/eXlhVR_5D_oJ.
To post to this group, send email to gmail...@googlegroups.com.
To unsubscribe from this group, send email to gmail-users...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/gmail-users?hl=en.
First of all, are you really sure the certificates signed by the so called "trusted" CAs are more secure for you? Do you think a malicious party wouldn't be able to get a certificate like that? Consider that it has happened before.
Second, SSL gives you encryption apart from verification (which IMO doesn't work anyway), so even if you have no verification with self-signed certs you still have encryption. This is all about levels of security.
Finally, an even more secure option than certs signed by "trusted" CAs would be to allow users to manually configure certificates to trust (i.e. more or less like SSH works). There was an interesting discussion about this on hacker news recently: http://news.ycombinator.com/item?id=4920088
On Tuesday, December 18, 2012 4:23:32 AM UTC, Zack Tennant wrote:You are wrong. It is absolutely safer for you, and your customers. Self-signed certs are more dangerous than not securing at all. There's a reason every browser out there gives you numerous warnings about accepting them. By using them you're training your staff and customers to accept insecure security. This is more dangerous than just leaving the information unsecured since it teaches trust in something that shouldn't be trusted, and will be exploited by your attackers.
First of all, are you really sure the certificates signed by the so called "trusted" CAs are more secure for you? Do you think a malicious party wouldn't be able to get a certificate like that? Consider that it has happened before.
Second, SSL gives you encryption apart from verification (which IMO doesn't work anyway), so even if you have no verification with self-signed certs you still have encryption. This is all about levels of security.
Finally, an even more secure option than certs signed by "trusted" CAs would be to allow users to manually configure certificates to trust (i.e. more or less like SSH works). There was an interesting discussion about this on hacker news recently: http://news.ycombinator.com/item?id=4920088
--
You received this message because you are subscribed to the Google Groups "Gmail-Users" group.
To post to this group, send email to gmail...@googlegroups.com.
To unsubscribe from this group, send email to gmail-users...@googlegroups.com.
Visit this group at http://groups.google.com/group/gmail-users?hl=en.