Hello

I use mail in my personal OpenBSD 7.0 without a problem; Opensmtpd only.

Now i have a second OpenBSD 7.0 with Opensmtpd + Dovecot + Dkimsign, and i
need to collect mail from that server. I tried Mutt, but it fail,

Questions:
1. how to configure mail to access an external mail server?

2. How to configure Mutt correctly, it fails sending mail please?

My .muttrc:

set hostname=mail.consultores.ca
set editor=nano
set imap_user=a...@consultores.ca
set imap_pass="passwd"
set folder=imaps://$imap_u...@mail.consultores.ca
set spoolfile=+INBOX
set imap_check_subscribed
set header_cache=~/.cache/mutt
set message_cachedir="~/.cache/mutt"
unset imap_passive
set imap_keepalive=300
set mail_check=180
set record=+Sent
set my_pass="passwd"
set my_user='a...@consultores.ca'
set realname='agro'
set from='a...@consultores.ca'
set use_from=yes
set smtp_pass="passwd"
set smtp_url=smtp://$agro:$ag...@consultores.ca:587
set ssl_force_tls=yes
set ssl_starttls=no

$ openssl s_client -starttls smtp -connect mail.consultores.ca:587
CONNECTED(00000003)
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = consultores.ca
verify return:1
140374547838272:error:0407E086:rsa routines:RSA_verify_PKCS1_PSS_mgf1:last
octet invalid:../crypto/rsa/rsa_pss.c:88:
140374547838272:error:1417B07B:SSL routines:tls_process_cert_verify:bad
signature:../ssl/statem/statem_lib.c:504:
---
Certificate chain
 0 s:CN = consultores.ca
   i:C = US, O = Let's Encrypt, CN = R3
 1 s:C = US, O = Let's Encrypt, CN = R3
   i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
 2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
   i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=CN = consultores.ca

issuer=C = US, O = Let's Encrypt, CN = R3

---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA-PSS
Server Temp Key: X25519, 253 bits
---
SSL handshake has read 5313 bytes and written 351 bytes
Verification: OK
---
New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384
Server public key is 4096 bit
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)

Thanks

Reply via email to