>I think this level of checking was first introduced with OpenSSL
>1.1.1f and all applications will refuse to work if compiled with this
>or newer version (for example curl). If you don't mind sending your
>login information on an now unsecure channel, you can restore the
>previous behaviour. You need to edit /etc/ssl/openssl.cnf and set
>"CipherString = DEFAULT@SECLEVEL=2" to one instead. But then again,
>it's definitely NOT recommended for your security.

I should add that in fact it is Debian, rather than openssl, which
defaults to SECLEVEL=2.  As a consequence, it is not necessary to set it
to 1: commenting the line is enough.

To avoid having this change to be system-wide, one can use a local
openssl configuration file (where the Cipherstring line is commented
out) and call fetchmail like

OPENSSL_CONF=~/insecure-openssl.conf fetchmail

-- 
Francesco Potortì (ricercatore)        Voice:  +39.050.621.3058
ISTI - Area della ricerca CNR          Mobile: +39.348.8283.107
via G. Moruzzi 1, I-56124 Pisa         Skype:  wnlabisti
(gate 20, 1st floor, room C71)         Web:    http://fly.isti.cnr.it

Reply via email to