On 01/28/2013 01:47 PM, Jean-Philippe MENGUAL wrote:
> Hi,
>
> Thanks very much, this helps a lot. I didn't experience any problems following
> the process. But I still get:
>
> fetchmail: No mail for moderate...@absolinux.net at imap.1and1.fr
> fetchmail: Server certificate verification error: self signed certificate in 
> certificate chain
> fetchmail: This means that the root signing certificate (issued for 
> /C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA 
> Root)
> is not in the trusted CA certificate locations, or that c_rehash needs to be 
> run on the certificate directory. For details, please see the
> documentation of --sslcertpath and --sslcertfile in the manual page.
> fetchmail: Warning: the connection is insecure, continuing anyways. (Better 
> use --sslcertck!) fetchmail:
> No mail for te...@aaui.eu at mail.accelibreinfo.eu fetchmail: Server 
> certificate verification error: unable to get local issuer certificate
> fetchmail: This means that the root signing certificate (issued for 
> /CN=actux.eu.org) is not in the trusted CA certificate locations, or that 
> c_rehash needs
> to be run on the certificate directory. For details, please see the 
> documentation of --sslcertpath and --sslcertfile in the manual page.
> fetchmail: Server certificate verification error: certificate not trusted 
> fetchmail: Server certificate verification error: unable to verify the first
> certificate
> fetchmail: Warning: the connection is insecure, continuing anyways. (Better 
> use --sslcertck!)
>
> Is some certificate missing? I don't understand why fetchmail still complains.
>
> Thanks for your answer.
>
> Regards,
>
> JPM
>
>
> On Sunday 27 Jan 2013 à 19:27:26 (-0600), DJ Lucas wrote:
>> On 01/27/2013 06:18 AM, Jean-Philippe MENGUAL wrote:
>>> Hi,
>>>
>>> Thanks very much for the information. I probably didn't understand 
>>> everything
>>> in the process, anyway. Indeed, in make-ca.sh, I replaced
>>> BUNDLE="BLFS-ca-bundle-${VERSION}.crt" with AddTrustExternalCARoot.crt.
>>> Then I ran script. I also updated mozilla's certs, through the proces 
>>> described
>>> in the book and also with mozilla-root.crt?.
>>>
>>> So .pem are all updated and generated. Is it enough? Should the 
>>> ca-bundle.crt
>>> be updated itself? Because with such process, fetchmail displays the same
>>> thing.
>>>
>>> Did I misunderstand something in this process of certificates?
>>>
>>> Thanks very much and sorry to disturb but I've to say that this security 
>>> concepts
>>> are not natural for me.
>>>
>>> Best regards,
>>>
>>
>>
>> The steps should be:
>>
>> certhost='http://mxr.mozilla.org' &&
>> certdir='/mozilla/source/security/nss/lib/ckfw/builtins' &&
>> url="$certhost$certdir/certdata.txt?raw=1" &&
>> wget --output-document certdata.txt $url &&
>> unset certhost certdir url &&
>> make-ca.sh &&
>> remove-expired-certs.sh
>>
>> Those update to the latest Mozilla certs, and the following adds your
>> new CA root to the trusted certs:
>>
>> keyhash=$(openssl x509 -noout -in AddTrustExternalCARoot.crt -hash) &&
>> cp AddTrustExternalCARoot.crt \
>>      /etc/ssl/certs/${keyhash}.pem &&
>> c_rehash &&
>> unset keyhash
>>
>> To update the bundle, with what is currnetly in /etc/ssl/certs, run the
>> following command at any time:
>>
>> cat /etc/ssl/certs/*.pem > /etc/ssl/ca-bundle.crt
>>
>> -- DJ
>>
>> --
>> http://linuxfromscratch.org/mailman/listinfo/blfs-support
>> FAQ: http://www.linuxfromscratch.org/blfs/faq.html
>> Unsubscribe: See the above information page

Not a fetchmail user, so this is second hand, but I think you'll need to 
set sslcertpath in fetchmailrc.

I get the same behavior with openssl s_client unless I explicitly set 
CApath, which makes me wonder if our OpenSSL installation is slightly 
broken. I'll look into that quick.

-- DJ



-- 
http://linuxfromscratch.org/mailman/listinfo/blfs-support
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to