I noticed that some SMTP apps, namely

Esumosoft's POP Peeper v5.6.3 (the latest version),
Nextcloud's Mail v5.6.7 (latest WebUI, based on Horde),

cannot communicate with my OpenSMTPD v7.6 via TLS:

Failed to Process TLS Socket - certificate failed.
Unable to get local issuer certificate.
smtp disconnected reason="io-error: handshake failed
- error:0A000418:SSL routines::tlsv1 alert unknown ca".

Why is CA unknown when it is valid and declared as CA cert in smtpd.conf?

pki "mx" key "/path/to/mx.key"
pki "mx" cert "/path/to/mx.cert"
ca "ca" cert "/path/to/ca.cert"
SMTP servers and many mail programs (Thunderbird, Outlook, Pegasus, Scribe, Vivaldi, even pocket-size nPOP) all connect to OpenSMTPD securely and transfer email flawlessly.

For testing I merged all certificates into a single file.pem, at the top of which I also inserted mx.key — voila, that was enough, now those few apps are working smoothly, too.

I am writing just to ask what the proper order is, which variant is correct and standard-complied: mx-domain.cert, fullchain.cert, or fullchain+key.pem. Where to find a normative source on this matter?

--
Vladas aka Uolys
https://vladas.palubinskas.lt/

Reply via email to