Hello I use mail in my personal OpenBSD 7.0 without a problem; Opensmtpd only.
Now i have a second OpenBSD 7.0 with Opensmtpd + Dovecot + Dkimsign, and i need to collect mail from that server. I tried Mutt, but it fail, Questions: 1. how to configure mail to access an external mail server? 2. How to configure Mutt correctly, it fails sending mail please? My .muttrc: set hostname=mail.consultores.ca set editor=nano set imap_user=a...@consultores.ca set imap_pass="passwd" set folder=imaps://$imap_u...@mail.consultores.ca set spoolfile=+INBOX set imap_check_subscribed set header_cache=~/.cache/mutt set message_cachedir="~/.cache/mutt" unset imap_passive set imap_keepalive=300 set mail_check=180 set record=+Sent set my_pass="passwd" set my_user='a...@consultores.ca' set realname='agro' set from='a...@consultores.ca' set use_from=yes set smtp_pass="passwd" set smtp_url=smtp://$agro:$ag...@consultores.ca:587 set ssl_force_tls=yes set ssl_starttls=no $ openssl s_client -starttls smtp -connect mail.consultores.ca:587 CONNECTED(00000003) depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = R3 verify return:1 depth=0 CN = consultores.ca verify return:1 140374547838272:error:0407E086:rsa routines:RSA_verify_PKCS1_PSS_mgf1:last octet invalid:../crypto/rsa/rsa_pss.c:88: 140374547838272:error:1417B07B:SSL routines:tls_process_cert_verify:bad signature:../ssl/statem/statem_lib.c:504: --- Certificate chain 0 s:CN = consultores.ca i:C = US, O = Let's Encrypt, CN = R3 1 s:C = US, O = Let's Encrypt, CN = R3 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1 i:O = Digital Signature Trust Co., CN = DST Root CA X3 --- Server certificate -----BEGIN CERTIFICATE----- MIIGYTCCBUmgAwIBAgISBD1nOXs8BJMT17E01SoNp56AMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjAzMjIxMTE3NTNaFw0yMjA2MjAxMTE3NTJaMBkxFzAVBgNVBAMT DmNvbnN1bHRvcmVzLmNhMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA 3R4KmANwxZSr7xQWi504DPEYPBYbskgvPKCKMrQoKOmVlnKMxVg2F132G9C/U2tS BQiunYOdRpyTOhudSoULqfUZS5ZYXcnwlNpiG6LhQcNbPLnURlY/bXDl/Fu4P5a4 wup7Z9TB0iFIsL76fwNvrPT36ynWgOK1pzt5vokElIF2OntgssIf3z4YmkFRup0A VMOQJLhE8RHwt5tPlISuDDVLWMzmCLJ4wxta8fogWZOC/vnDMhIUtEqqoHV3shkr GDOsC+IBLsugHjLKj9+8NnAQT+PR2LUzrvxS57ZqLnnau7nAk5bsaKhAN5JSSKJ4 xvAB7fgtK60do/5G2/62dW4h7AeeStDd2MBo6GFk/lwh1mA3BkHDb0ARG5dVQNav 3vDsMAnFRxqFIwyzx5J4WaRZ7r7VV+Q/+j7146wNjXbxK1LL7S05pE07tRKZ0Oth PWt/b/4dwRiA/9YXdiQUABolrBlhgVZq3F1mgltzVfBtJb8jOOgbki1/YsYFI8xA NQW0KhQj2Z4J88swAfYiFzUXT67/5tTIUS25eHrwQmV6++9ArzSxWwPKJtyfq62x fLkQLUEO669Ul+XhYP+pnw1VeoSsrTO+uFwDtVsx3qBlrgYlZRhzaoYuGqdsIMha XAcJfEP5mshfR5LqCt107cuXpqjWzKXsO+QczmY4HikCAwEAAaOCAogwggKEMA4G A1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYD VR0TAQH/BAIwADAdBgNVHQ4EFgQUeLr0Bp3C9qAG11cdqezlis6MMFYwHwYDVR0j BBgwFoAUFC6zF7dYVsuuUAlA5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsG AQUFBzABhhVodHRwOi8vcjMuby5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6 Ly9yMy5pLmxlbmNyLm9yZy8wVgYDVR0RBE8wTYIOY29uc3VsdG9yZXMuY2GCEmly Yy5jb25zdWx0b3Jlcy5jYYITbWFpbC5jb25zdWx0b3Jlcy5jYYISd3d3LmNvbnN1 bHRvcmVzLmNhMEwGA1UdIARFMEMwCAYGZ4EMAQIBMDcGCysGAQQBgt8TAQEBMCgw JgYIKwYBBQUHAgEWGmh0dHA6Ly9jcHMubGV0c2VuY3J5cHQub3JnMIIBBgYKKwYB BAHWeQIEAgSB9wSB9ADyAHcA36Veq2iCTx9sre64X04+WurNohKkal6OOxLAIERc KnMAAAF/sY/qMgAABAMASDBGAiEAq2bGrujJeTE0zxVSPTms+oqHHXkxSIC0TTME YX0p4xQCIQClVwdznCwhWCvC6zuzV7XT9rdM9E8SsoF9CmMjiyCx5QB3ACl5vvCe OTkh8FZzn2Old+W+V32cYAr4+U1dJlwlXceEAAABf7GP6i8AAAQDAEgwRgIhAL1v cQwS8D1NhweV82i186qebCCvS6qhCUgof325YRcoAiEAi5Fyurxjhu30mu9Mb7Dm bd9+WB5mxvJyV6k2hLgAh5cwDQYJKoZIhvcNAQELBQADggEBAFmNjiqgchLRr21v 4rshZ58e/D8KLdmAU4APTtkrVFWf6kFibDzFAkYBsRncGEH/NiRIPXKkvngGSCJr syGxd/8ZlM6g4El/uRHzBijlvPKJDNVJ3ux+uEQWgSkm2evN5QBYiX1W9uqa0CiC oD2UMAXgz+eL53VB0y4S1LC1sA1v5dxc0emyLUX4txs3PR35SYcLYVElUaQutT+X NVJf8yq7DomiYQjbBYhOeSwqFcjesoauNhmfie72NUJ7FbYMOrQE6ExjjdCywASM i7jjSSBUSmAjrA9Q8/M0RIrB+R4Hr3nxESL1vPx3hTZrauWEnXXOw4m6D111piAC OZ7vfos= -----END CERTIFICATE----- subject=CN = consultores.ca issuer=C = US, O = Let's Encrypt, CN = R3 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 5313 bytes and written 351 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 4096 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) Thanks