On 01/26/2013 09:46 AM, Jean-Philippe MENGUAL wrote: > Hi, > > How could I get rid of this warning/error from fetchmail: > http://sprunge.us/YIUJ > > This seems to make a output code different from 0, which prevents a script > from > running properly, so I'd like to fix the problem. I didn't find any way to > make fetchmail pass without problem (even quiet displays this). How can it > accept > these certs? > > I could add them to CA-certs, following: > http://www.linuxfromscratch.org/blfs/view/svn/postlfs/cacerts.html > but I have not understood how I can fetch the non-trusted certificate. > Finally, I must write not properly my search, I don't find any tutorial for > this on the Internet.
You won't, other than what is in the BLFS book because everyone does it differently. Being BLFS, you are expected to do it manually. The root you seek is available here: https://support.comodo.com/index.php?_m=downloads&_a=viewdownload&downloaditemid=87 1st link from a Google search for "AddTrust external ca root". Anyway, steps are exactly what is in the book now. Probably best to first update with current Mozilla certs, then download the one above and drop it into /etc/ssl/certs, run c_rehash, and finally recreate /etc/ssl/ca-bundle.crt from the newly installed certs. Might not even be a bad idea to create a directory for other trusted certs in /etc/ssl and include them in the original script from the book. -- DJ -- http://linuxfromscratch.org/mailman/listinfo/blfs-support FAQ: http://www.linuxfromscratch.org/blfs/faq.html Unsubscribe: See the above information page