Hmmm. That error message is more helpful -- Google returns results that make
it look like OpenSSL does need all the certificates in the CA chain. I found
these two links that seem to be outlining solutions to your problem, although
neither of them deal with spamdyke specifically:
http://www.cyberciti.biz/faq/test-ssl-certificates-diagnosis-ssl-certificate/
http://totalrecall.wordpress.com/2008/09/01/alpine-tls-unable-to-get-local-issuer-certificate/
You might try saving your CA certificate in PEM format and appending it to the
end of your own certificate file -- that way OpenSSL would have everything it
needs in one file.
-- Sam Clippinger
On Aug 19, 2011, at 1:35 PM, Alex S. wrote:
> The filename is correct and I even tried to give the same permissions as on
> /var/qmail/control/servercert.pem.
>
> Yes, the PEM file contains both the certificate and unprotected private key.
> As I mentioned no problems with Courierssl.
>
> If I verify the PEM file with openssl I get this:
>
> # openssl verify /etc/ssl/private/www_mydomain_de.pem
> /etc/ssl/private/www_ mydomain _de.pem: /OU=Domain Control
> Validated/OU=PositiveSSL/CN=www. mydomain.de
> error 20 at 0 depth lookup:unable to get local issuer certificate
>
> Any ideas what’s happening?
>
> Can it be that Spamdyke looks for certificate with common name equal one
> specified in /var/qmail/control/me (or other setting) and fails because it
> doesn’t match?
>
> Alex
>
>
> From: [email protected]
> [mailto:[email protected]] On Behalf Of Sam Clippinger
> Sent: Freitag, 19. August 2011 18:11
> To: spamdyke users
> Subject: Re: [spamdyke-users] Unable to load SSL/TLS certificate
>
> I don't think this is a problem with intermediate CAs, because spamdyke
> doesn't have to "trust" your certificate as long as it can match the public
> and private keys. This is why self-signed certificates work fine with
> spamdyke.
>
> The errors you're seeing are originating with OpenSSL and being reported by
> spamdyke. I can think of a number of things that might trigger this kind of
> error:
> Your certificate file is not present or misnamed (double-check
> for typos).
> Your certificate file is not accessible (permission problem).
> Your certificate file is corrupted or truncated.
> Your certificate file is not in PEM format.
> Your certificate file is only contains your public key; your
> private key is stored in another file.
> Your private key is password protected and spamdyke doesn't have
> the password.
>
> Can you use the "openssl" command line tool to inspect your certificate file?
> If "openssl" can read it, spamdyke should be able to.
>
> -- Sam Clippinger
>
> On Aug 15, 2011, at 2:39 PM, Alex S. wrote:
>
>
> Hello,
>
> I‘m trying to setup a proper SSL certificate for TLS/SSL encryption with
> Spamduke 4.2.0. So I set it up in /etc/spamdyke.conf:
>
> tls-certificate-file=/etc/ssl/private/www_mydomain_de.pem
>
> The pem file contains both private key and certificate and already
> successfully used in CourierSSL.
>
> Spamdyke complains in the qmail logfile:
>
> 2011-08-15 21:15:09.314426500 spamdyke[10646]: ERROR: unable to load SSL/TLS
> certificate from file: /etc/ssl/private/www_mydomain_de.pem : The operation
> failed due to an I/O error, Unexpected EOF found,
> error:0200100D:lib(2):func(1):reason(13),
> error:20074002:lib(32):func(116):reason(2),
> error:140DC002:lib(20):func(220):reason(2)
> 2011-08-15 21:15:09.314426500 spamdyke[10646]: ERROR: incorrect SSL/TLS
> private key password or SSL/TLS certificate/privatekey
> mismatch/etc/ssl/private/www_ mydomain _de.pem : A protocol or library
> failure occurred, error:140A80B1:lib(20):func(168):reason(177)
> 2011-08-15 21:15:09.314426500 spamdyke[10646]: ERROR: unable to initialize
> SSL/TLS library
>
> What does it mean? Why can’t the certificate be used by Spamdyke. The server
> is running Debian with openssl 0.9.8o-4squeeze1 installed.
>
> The default qmail certificate /var/qmail/control/servercert.pem can be used
> by Spamdyke without any errors.
>
> I already gave my pem file the reading permissions for vpopmail user which is
> running tcpserver that starts spamdyke.
>
> Can the problem be caused by the fact that my SSL certificate needs
> intermediate certificates to be assumed as trustful by clients. How can I
> tell the Spamdyke to use an intermediary ca-bundle file? (In CourierSSL it is
> done with TLS_TRUSTCERTS=/etc/ssl/private/www_mydomain_de.ca-bundle
> directive).
>
> Thanks Alex
>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
>
> _______________________________________________
> spamdyke-users mailing list
> [email protected]
> http://www.spamdyke.org/mailman/listinfo/spamdyke-users
_______________________________________________
spamdyke-users mailing list
[email protected]
http://www.spamdyke.org/mailman/listinfo/spamdyke-users