Following on from my last message, I wondered whether the issue had something to do with my AVG anti virus software. I disable this, and now the certificate reads as below, the issue has not been resolved.
Would anyone be willing to send me a copy of the certificate that they are seeing?
When viewing the certificate if you go to the details tab you can click Copy to file:
This will open the Certificate export wizard.
Select the PKCS # 7 and Include all certificates in certificate path if possible
In order to help me differentiate between certificates use your username as the filename. I also recommend using browse and putting the certificate somewhere where you know you can get at it. For example I created a folder called TLSCap in the Documents folder
Once you've done this drop me a PM and I'll let you know what email address to send to.
In order to keep YOUR email addresses private I recommend sending to me using Guerilla Mail which will allow you to send with a temporary email address.
Thanks for the email. When I opened up the certificate from yourself, here's what I got:
So we have the same certificate responding differently on two different machines. Which tells me the certificate itself is not at fault 😞
I've also done a check that rules out a missing root certificate in the Windows Trusted Root CA store. Which is a pity as that would be an easy fix.
Can you go to your extracted certificate and use the same method as above but output the certificate in .cer format.
Then click file manager and using the Quick access list Right click the .cer file and select open file location.
This will open up the directory that the file is in.
Now click File and Open Powershell then pick Open Powershell (DON'T use the admin option here)
A Powershell Window will open - Type in the following command
certutil -verify dizzycert.cer > dizzy.log
Change the filenames as appropriate..
What this does is run the certutil command BUT instead of writing the output to the screen it sends the output to the file dizzy.log After which you can ope the log file and copy the output into a post here:
Issuer: CN=GlobalSign GCC R3 DV TLS CA 2020 O=GlobalSign nv-sa C=BE Name Hash(sha1): 2828e1c94506c213edc35eac058b3b41c4b61d87 Name Hash(md5): 8e185a58f984f5c12197823dc4e41b89 Subject: CN=email.virginmedia.com Name Hash(sha1): b4b01dff65fd21acd9c3bce4c7e2963284cb97d4 Name Hash(md5): bb75293537b7826f71dcc0816e2f43b0 Cert Serial Number: 7e1d18d21781c674b0358991