On Wednesday 11 June 2003 23:41, "Paeddy" <[EMAIL PROTECTED]> 
wrote:
> i also remarked that the imap-ssl doesn't start
> automatically when i make a /etc/rc3.d/S99courier start
> but when i'm dooing a stop it stops it. are there some
> special thing i should know about starting up imapssl
> automatically ?

The /etc/rc.d/init.d/courier script will try to "stop" the 
imap-ssl process if the file  
/usr/lib/courier/sbin/imap-ssl exists (which it will if 
courier could find openssl when it compiled).  But courier 
will only start imapd-ssl if you have enable it in the 
configuration file.  Go into the /etc/courier/imapd-ssl 
file and look for the line that says IMAPDSSLSTART.  Make 
it say "IMAPDSSLSTART=YES".  You might also want to enable 
"IMAPDSTARTTLS=YES" as well.

> is there a way to sign this key by myself ? like i can do
> it with the key i use fro OpenSSL ?

Sure.  Courier creates some self-signed certificates if they 
don't already exist, but you can create your own 
certificates and use them instead.  There are three 
certificates: imapd.pem, esmtpd.pem, pop3d.pem and they all 
live in /usr/lib/courier/share.  If you replace them with 
your own certificates then courier will use those instead.  
I created my own and then symlinked those three files to 
the actual certificate.  That works fine.  Make sure you 
get the permissions right though.  Check out the 
permissions and ownership on the ones that courier creates 
before you remove them.

There are also three scripts in the share directory: 
mkimapdcert, mkesmtpdcert, and mkpop3dcert that can be used 
to make your own self-signed certificates.  The mkimapdcert 
pulls in values from the /etc/courier/imapd.cnf file.  The 
others use the appropriately named config file in 
/etc/courier/  Edit the values in those cnf files and then 
run the scripts and it will create self-signed scripts with 
your own info. in them.

You can use openssl to create your own CA if you want and 
then sign your own certs or you can create a csr and pay 
big bucks to get it signed. For our local network I created 
a CA and imported that into everyone's system.  Then I used 
the CA to sign the courier certs and now Outlook doesn't 
complain anymore.

The certificate file needs both the certificate and key in 
it.  I got "caught" because my key was encrypted and so 
none of the ssl connections worked even though I had a key 
and certificate in the .pem file.  I ended up having to run 
my private key back through "openssl rsa" and then add it 
to the signed certificate file ("cat courierkey.pem >> 
couriercert.pem").  After that everything worked fine.

Jeff Jansen



-------------------------------------------------------
This SF.NET email is sponsored by: eBay
Great deals on office technology -- on eBay now! Click here:
http://adfarm.mediaplex.com/ad/ck/711-11697-6916-5
_______________________________________________
courier-users mailing list
[EMAIL PROTECTED]
Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users

Reply via email to