On 2014-05-01 16:36, Hanno Böck wrote: > On Thu, 01 May 2014 15:13:29 +0200 Anders Le Chevalier > <and...@lechevalier.se> wrote: > >> Are there any limitations to the type of hash or other features >> of the certificates that are supported by courier? > > I'm not aware of any and I'm using startssl certs successfuly with > my servers.
That is good news :) > >> Should I put something else inside the TLS_CERTFILE ? Is the >> order of the key, cert, intermediary CA and root CA important in >> the PEM file? > > The order matters. First Cert, then intermediate. You shouldn't put > the root in at all. > > What about the key? I suppose the unencrypted key needs to be included in the PEM file? The default self-signed certs (mkimapdcert) are created as such: -----BEGIN RSA PRIVATE KEY----- -----END RSA PRIVATE KEY----- -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- Regards, ~A ------------------------------------------------------------------------------ "Accelerate Dev Cycles with Automated Cross-Browser Testing - For FREE Instantly run your Selenium tests across 300+ browser/OS combos. Get unparalleled scalability from the best Selenium testing platform available. Simple to use. Nothing to install. Get started now for free." http://p.sf.net/sfu/SauceLabs _______________________________________________ courier-users mailing list courier-users@lists.sourceforge.net Unsubscribe: https://lists.sourceforge.net/lists/listinfo/courier-users