Hey guys, I thought I posted this before, the problem was that our firewall was configured to serve some kind of internal cert. Anyway we are now serving the cert through our load balancer (with imap and smtp on plain text) so we can do persistence through user names.
Roy On Mon, Jul 2, 2012 at 3:26 PM, dgarvey <dgar...@collab.net> wrote: > You can test your root CA and intermediate CA by using this command. > > Put your CA's into this file /tmp/ca.crt and test. It should return verified > (0) if your server is setup correctly. Then just import the /tmp/ca.crt into > your client cacerts truststore. > > openssl s_client -connect localhost:443 -state -debug -CAfile /tmp/ca.crt --------------------------------------------------------------------- To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org For additional commands, e-mail: server-dev-h...@james.apache.org