Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    INTERNET    |    The global pornography network    |    2,155 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 1,892 of 2,155    |
|    August Abolins to Richard Menedetter    |
|    let's encrypt certif problem    |
|    12 Oct 21 09:10:00    |
      MSGID: 2:221/1.58@fidonet f5587cbc       REPLY: 2:310/31 6165674f       PID: OpenXP/5.0.50 (Win32)       CHRS: ASCII 1       TZUTC: -0400       Hello Richard!              ** On Tuesday 12.10.21 - 12:45, you wrote to me:               AA>> But is there a way to update the certif and be able to log in?               RM> Check out this info        RM> https://letsencrypt.org/docs/dst-root-ca-x3-expiration-september-2021/              Thx. That explains a few things, for sure! The article is        directed to sites/developers who generate those certifs. But it        doesn't answer how end users (clients) like me can rectify the        situation with my existing TB version. :(              I could probably move to Sylpheed and see if that client        handles the "older root certificate (DST Root CA X3)".              --        ../|ug              --- OpenXP 5.0.50        * Origin: (2:221/1.58)       SEEN-BY: 1/123 14/0 90/1 103/705 105/81 120/340 123/131 124/5016 129/305       SEEN-BY: 153/757 154/10 203/0 221/1 6 360 226/30 227/114 702 229/424       SEEN-BY: 229/426 428 452 550 664 700 240/5138 5411 5824 5832 5853       SEEN-BY: 249/206 317 400 280/464 5003 282/1038 292/854 8125 301/1       SEEN-BY: 310/31 317/3 320/219 322/757 342/200 396/45 423/81 120 633/280       SEEN-BY: 712/848 770/1 2432/390 2452/250 2454/119       PATH: 221/1 280/464 240/5832 229/426           |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca