Hello,
I created
certificates like this:
mail-server:~ # openssl req -new -x509 -sha1
-extensions v3_ca -nodes -days 365 -out cert.pem
I've
got - privkey.pem and
cert.pem. Now:
Quote:
mail-server:~ # cat privkey.pem cert.pem > /etc/ssl/certs/cert.pem
mail-server:~ # mv privkey.pem /etc/ssl/certs/skey.pem
mail-server:~ # chown cyrus:mail /etc/ssl/certs/cert.pem
mail-server:~ # chmod 600 /etc/ssl/certs/cert.pem
mail-server:~ # cat privkey.pem cert.pem > /etc/ssl/certs/cert.pem
mail-server:~ # mv privkey.pem /etc/ssl/certs/skey.pem
mail-server:~ # chown cyrus:mail /etc/ssl/certs/cert.pem
mail-server:~ # chmod 600 /etc/ssl/certs/cert.pem
And added to
imapd.conf:
tls_cert_file:
/etc/ssl/certs/cert.pem
tls_key_file: /etc/ssl/certs/cert.pem
tls_ca_file: /etc/ssl/certs/cert.pem
tls_ca_path: /etc/ssl/certs
tls_key_file: /etc/ssl/certs/cert.pem
tls_ca_file: /etc/ssl/certs/cert.pem
tls_ca_path: /etc/ssl/certs
Now when connecting
with Kmail using TLS secure option,I got this warning:
"Certificate is self
signed and thus may not be trustworthy,
The cerificate has
not been issued for this host"
And with
OE:
"The server you are
connected to is using a security sertificate that could not be
verified.
a certificate chain
processe, but terminated in a root certificate which is not trusted by the trust
provider.
Do you want to
continue using this server?"
Is this a normal
behavior, or should I do something else so the sertificate could be
trustworthy?
P.S.:
Do you know any good
tutorial (step-by-step) on this certificate issue?
Leon
_______________________________________________ This mailing list is hosted and supported by bit-heads GmbH | http://www.bit-heads.ch
_______________________________________________ Web-cyradm mailing list [email protected] http://www.web-cyradm.org/mailman/listinfo/web-cyradm
