Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-23 Thread Ralf Hildebrandt
* Aki Tuomi : > > Still there in auto11 > > > Yes, we have not gotten round fixing it. Did you remove < from the path? Of course :) -- Ralf Hildebrandt Geschäftsbereich IT | Abteilung Netzwerk Charité - Universitätsmedizin Berlin Campus Benjamin Franklin Hindenburgdamm 30 | D-12203 Berl

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-23 Thread Aki Tuomi
x27;t initialize SSL context: Can't >> verify remote server certs without trusted CAs (ssl_client_ca_* settings) >> Mar 20 16:10:26 mproxy dovecot: auth: Error: >> imapc(exchange-imap.charite.de:993): No SSL context >> Mar 20 16:10:26 mproxy dovecot: auth: Error: >&

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-23 Thread Ralf Hildebrandt
* Ralf Hildebrandt : > Mar 20 16:10:17 mproxy dovecot: master: Dovecot v2.2.devel (a39b5b2) starting > up for imap > Mar 20 16:10:26 mproxy dovecot: auth: Error: > imapc(exchange-imap.charite.de:993): Couldn't initialize SSL context: Can't > verify remote server

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Ralf Hildebrandt
evel (a39b5b2) starting up for imap Mar 20 16:10:26 mproxy dovecot: auth: Error: imapc(exchange-imap.charite.de:993): Couldn't initialize SSL context: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings) Mar 20 16:10:26 mproxy dovecot: auth: Error: imapc(exch

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Ralf Hildebrandt
* Aki Tuomi : > Could you send us the gdb bt full backtrace for the core file? Currently I can't get it to create coredumps doveconf -n: # 2.2.devel (3f97702): /etc/dovecot/dovecot.conf # Pigeonhole version 0.4.devel (023f391) # OS: Linux 4.4.0-65-generic x86_64 Ubuntu 16.04.2 LTS auth_mechan

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Aki Tuomi
fgrep ssl_client_ca > ssl_client_ca_dir = > ssl_client_ca_file = /etc/ssl/certs/ca-certificates.crt > > and with auto8 I still get: > > Mar 20 15:38:20 mproxy dovecot: auth: Error: > imapc(exchange-imap.charite.de:993): Couldn't initialize SSL context: Can't > verify remot

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Ralf Hildebrandt
s/ca-certificates.crt and with auto8 I still get: Mar 20 15:38:20 mproxy dovecot: auth: Error: imapc(exchange-imap.charite.de:993): Couldn't initialize SSL context: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings) Mar 20 15:38:20 mproxy doveco

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Aki Tuomi
On 20.03.2017 14:30, Ralf Hildebrandt wrote: > ssl_client_ca_file =

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Ralf Hildebrandt
* Ralf Hildebrandt : > * Ralf Hildebrandt : > > Hi! > > > > I upgraded the 2.2 packages today (from 2:2.2.28-1~auto+5 to > > 2:2.2.28-1~auto+8) I now I'm getting an error: > > I was able to determine the last working version: 2:2.2.28-1~auto+6 > and the first "broken" version:

Re: Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Ralf Hildebrandt
* Ralf Hildebrandt : > Hi! > > I upgraded the 2.2 packages today (from 2:2.2.28-1~auto+5 to > 2:2.2.28-1~auto+8) I now I'm getting an error: I was able to determine the last working version: 2:2.2.28-1~auto+6 and the first "broken" version: 2:2.2.28-1~auto+7 -- Ralf Hildebran

Can't verify remote server certs without trusted CAs (ssl_client_ca_* settings)

2017-03-20 Thread Ralf Hildebrandt
Hi! I upgraded the 2.2 packages today (from 2:2.2.28-1~auto+5 to 2:2.2.28-1~auto+8) I now I'm getting an error: Mar 20 13:25:58 mproxy dovecot: auth: Error: imapc(email.charite.de:993): Couldn't initialize SSL context: Can't verify remote server certs without trusted CAs