Hi,
On Fri, Feb 14, 2014 at 07:24:32PM -0500, Ted Unangst wrote:
> I would try using a full path.
>
> pki example ca "/etc/ssl/myca.pem"
I already tried it with full path. But I got it working now by
specifying certificate and key, too:
pki example certificate "/etc/ssl/relay.crt"
pki example key "/etc/ssl/private/relay.key"
pki example ca "/etc/ssl/ca.crt"
and later on:
accept from any for domain example.tld relay via tls://relay.example.tld pki
example verify
But I am still wondering if I am doing it right. Because normally it
should be enough to have the signing certificate and it shouldn't be
neccessary to provide the peer's cert and key or am I wrong here?
Trying to test my thesis I created two empty files: foo.pem and foo.key
and used them in my pki statement with some astonishing result:
# smtpd -nf /etc/mail/smtpd.conf
Segmentation fault (core dumped)
While the test is more or less stupid I wasn't expecting a segfault ;-)
Kind regards,
Frank.