The error says it all: the signature of your certs is using an non-acceptable hash (MD5).kissoly wrote: ↑Tue Aug 28, 2018 2:34 pm2018-30-28 17:30:56 VERIFY FAIL -- The certificate is signed with an unacceptable hash. : depth=0
cert. version : 3
serial number : 01
issuer name :
subject name :
issued on : 2010-11-23 16:09:36
expires on : 2020-11-20 16:09:36
signed using : RSA with MD5
RSA key size : 1024 bits
basic constraints : CA=false
cert. type : SSL Server
2018-30-28 17:30:56 Transport Error: mbed TLS: SSL read error : X509 - Certificate verification failed, e.g. CRL, CA or signature check failed
2018-30-28 17:30:56 EVENT: CERT_VERIFY_FAIL mbed TLS: SSL read error : X509 - Certificate verification failed, e.g. CRL, CA or signature check failed [ERR]
MD5 can be used only if you enabled "insecure" hashed in the settings.
However, you should really change that because MD5 used that way is broken since a while (reason why it is becoming deprecated).