Hello,
I created certificates like this:
mail-server:~ # openssl req -new -x509 -sha1 -extensions v3_ca -nodes -days 365 -out cert.pem 
 
I've got - privkey.pem and cert.pem. Now:
 
Quote
mail-server:~ # cat privkey.pem cert.pem > /etc/ssl/certs/cert.pem
mail-server:~ # mv privkey.pem /etc/ssl/certs/skey.pem
mail-server:~ # chown cyrus:mail /etc/ssl/certs/cert.pem
mail-server:~ # chmod 600 /etc/ssl/certs/cert.pem
 
And added to imapd.conf:
tls_cert_file: /etc/ssl/certs/cert.pem
tls_key_file: /etc/ssl/certs/cert.pem
tls_ca_file: /etc/ssl/certs/cert.pem
tls_ca_path: /etc/ssl/certs
 
Now when connecting with Kmail using TLS secure option,I got this warning:
"Certificate is self signed and thus may not be trustworthy,
The cerificate has not been issued for this host"
 
And with OE:
"The server you are connected to is using a security sertificate that could not be verified.
a certificate chain processe, but terminated in a root certificate which is not trusted by the trust provider.
Do you want to continue using this server?"
 
Is this a normal behavior, or should I do something else so the sertificate could be trustworthy?
 
 
P.S.:
Do you know any good tutorial (step-by-step) on this certificate issue?
 
 
Leon
_______________________________________________
This mailing list is hosted and supported
by bit-heads GmbH | http://www.bit-heads.ch

_______________________________________________
Web-cyradm mailing list
[email protected]
http://www.web-cyradm.org/mailman/listinfo/web-cyradm

Reply via email to