> Hi,
> Thanks for your reply.
>
> I've found this on http://www.nyetwork.org/wiki/ssl_root_ca_new
>
> "Create a PKCS#7 format of the Root CA's public certificate:
>
> This will allow clients to easily import it into their their PKI storage
> places, such as Outlook Express and Netscape.
>
> cd /usr/local/ssl.ca
> openssl crl2pkcs7 -nocrl -certfile ca.crt -outform DER -out ca.pkcs7
>
> ca.pkcs7 will only contain the public portion of the CA's certificate, so
> you can email it to whomever with instructions on how to import it, put it
> up for download, or whatever."
>
> I used this syntax,
> but it seems that I can't import it into Outlook Express certificates (I
> get 'success' message but no such certificate created).
>
> Any help?

Hi Leon,

this is how I created a pfx file for Outlook users:
cat cyrus-imapd.pem postfix.pem slapd.pem webmail.pem > infile.pem
openssl pkcs12 -in infile.pem -certfile infile.pem -export -out outfile.pfx

The pfx file can then be imported and I've been told it works.

Regards,
Simon

>
> Regsrds,
> Leon Kolchinsky
>
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Cristian
> Mitrana
> Sent: Monday, October 10, 2005 11:54 AM
> To: info-cyrus@lists.andrew.cmu.edu
> Subject: Re: How to make cerificate for client installation?
>
> * [EMAIL PROTECTED] <[EMAIL PROTECTED]> [10-10-05 10:46]:
>
>> Hello All,
>>
>> I'm using SMTP-AUTH with TLS wrapper with Self Signed Certificate on my
>> system.
>>
>> I want users to be able to install certificate on their computer (on OE
>> or another mail-client) and not press "Yes" on the nag screen on every
>> login.
>> How can I do it so client certificate only contain the public portion of
>> the certificate (so it is secure to publish this certificate on the
>> net)?
>
>   This depends on the client used and it's highly specific. And has
> nothing to do with cyrus.
>
>> Background Info:
>> This is how I've created certificates:
>> # openssl req -new -x509 -sha1 -extensions v3_ca -nodes -days 999 -out
>> cert.pem # ls .  ..  cert.pem  privkey.pem # cat privkey.pem cert.pem
>> > /etc/ssl/certs/cert.pem # mv -f privkey.pem /etc/ssl/certs/skey.pem
>> # chown cyrus:mail /etc/ssl/certs/cert.pem # chmod 600
>> /etc/ssl/certs/cert.pem
>
>
>  It is enough to provide the client with the certificate and import it
> into it's trust database (as I said, depends on the application).
> Depending on the application you might want to convert it to DER (with
> openssl x509 -in ... -out cert.der -outform der ).
>  The private part is the privkey.pem and that you should keep safe.
>
>  For windows (OE) you have to use the mmc program, TB has a special
> settings tab which lets you import in PEM format, I don't know about
> other clients on windows.
>
>  mitu
>
> ----
> Cyrus Home Page: http://asg.web.cmu.edu/cyrus Cyrus Wiki/FAQ:
> http://cyruswiki.andrew.cmu.edu List Archives/Info:
> http://asg.web.cmu.edu/cyrus/mailing-list.html
> ----
> Cyrus Home Page: http://asg.web.cmu.edu/cyrus
> Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
> List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html
>
>

----
Cyrus Home Page: http://asg.web.cmu.edu/cyrus
Cyrus Wiki/FAQ: http://cyruswiki.andrew.cmu.edu
List Archives/Info: http://asg.web.cmu.edu/cyrus/mailing-list.html

Reply via email to