Hi,

Thanks very much, this helps a lot. I didn't experience any problems following
the process. But I still get:

fetchmail: No mail for moderate...@absolinux.net at imap.1and1.fr 
fetchmail: Server certificate verification error: self signed certificate in 
certificate chain 
fetchmail: This means that the root signing certificate (issued for 
/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA 
Root) 
is not in the trusted CA certificate locations, or that c_rehash needs to be 
run on the certificate directory. For details, please see the 
documentation of --sslcertpath and --sslcertfile in the manual page. 
fetchmail: Warning: the connection is insecure, continuing anyways. (Better use 
--sslcertck!) fetchmail: 
No mail for te...@aaui.eu at mail.accelibreinfo.eu fetchmail: Server 
certificate verification error: unable to get local issuer certificate 
fetchmail: This means that the root signing certificate (issued for 
/CN=actux.eu.org) is not in the trusted CA certificate locations, or that 
c_rehash needs 
to be run on the certificate directory. For details, please see the 
documentation of --sslcertpath and --sslcertfile in the manual page. 
fetchmail: Server certificate verification error: certificate not trusted 
fetchmail: Server certificate verification error: unable to verify the first 
certificate 
fetchmail: Warning: the connection is insecure, continuing anyways. (Better use 
--sslcertck!)

Is some certificate missing? I don't understand why fetchmail still complains.

Thanks for your answer.

Regards,

JPM


On Sunday 27 Jan 2013 à 19:27:26 (-0600), DJ Lucas wrote:
> On 01/27/2013 06:18 AM, Jean-Philippe MENGUAL wrote:
> > Hi,
> >
> > Thanks very much for the information. I probably didn't understand 
> > everything
> > in the process, anyway. Indeed, in make-ca.sh, I replaced
> > BUNDLE="BLFS-ca-bundle-${VERSION}.crt" with AddTrustExternalCARoot.crt.
> > Then I ran script. I also updated mozilla's certs, through the proces 
> > described
> > in the book and also with mozilla-root.crt?.
> >
> > So .pem are all updated and generated. Is it enough? Should the 
> > ca-bundle.crt
> > be updated itself? Because with such process, fetchmail displays the same
> > thing.
> >
> > Did I misunderstand something in this process of certificates?
> >
> > Thanks very much and sorry to disturb but I've to say that this security 
> > concepts
> > are not natural for me.
> >
> > Best regards,
> >
> 
> 
> The steps should be:
> 
> certhost='http://mxr.mozilla.org' &&
> certdir='/mozilla/source/security/nss/lib/ckfw/builtins' &&
> url="$certhost$certdir/certdata.txt?raw=1" &&
> wget --output-document certdata.txt $url &&
> unset certhost certdir url &&
> make-ca.sh &&
> remove-expired-certs.sh
> 
> Those update to the latest Mozilla certs, and the following adds your 
> new CA root to the trusted certs:
> 
> keyhash=$(openssl x509 -noout -in AddTrustExternalCARoot.crt -hash) &&
> cp AddTrustExternalCARoot.crt \
>     /etc/ssl/certs/${keyhash}.pem &&
> c_rehash &&
> unset keyhash
> 
> To update the bundle, with what is currnetly in /etc/ssl/certs, run the 
> following command at any time:
> 
> cat /etc/ssl/certs/*.pem > /etc/ssl/ca-bundle.crt
> 
> -- DJ
> 
> -- 
> http://linuxfromscratch.org/mailman/listinfo/blfs-support
> FAQ: http://www.linuxfromscratch.org/blfs/faq.html
> Unsubscribe: See the above information page
-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to