ot: self certified enduser browser/mail client install?
Steffen Kaiser
skdovecot at smail.inf.fh-brs.de
Mon Aug 21 08:49:02 EEST 2017
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Mon, 21 Aug 2017, voytek at sbt.net.au wrote:
> in order for end user to avoid webmail warnings or email client warnings,
> do I make this file /etc/pki/dovecot/certs/dovecot.pem available to users
> say under httpd://webhost/tld/certificate/dovecot.pem
Most likely yes. It should work regardless if the cert is self-signed or
not.
However, you could try to find the upper-most cert by running
openssl x509 -in /etc/pki/dovecot/certs/dovecot.pem -noout -text|less
Check out the Issuer and Subject near the top of the outout:
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=dovecot.example.com/emailAddress=me at example.com
Validity
Not Before: Aug 21 05:36:49 2017 GMT
Not After : Aug 21 05:36:49 2018 GMT
Subject: C=AU, ST=Some-State, O=Internet Widgits Pty Ltd, CN=dovecot.example.com/emailAddress=me at example.com
If both are the same, it's the correct one. Then you really have a
self-signed certificate. Otherwise hunt for the "issuer" cert and hand
that your users. That would be your CA cert.
- --
Steffen Kaiser
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEVAwUBWZp0Tnz1H7kL/d9rAQJcIQf/ZwxUQPbiTEyQyPfyE+Xk/4AVrvgV7C3s
lBqeIfNT54UDlu8p7kzNRau1Kmt+nTwQWsLYBY5hlZmZ51RI0p1UbnKufNT3MBAZ
hOS0QdSvC6ZU2MzQb0tXRAIEP/dCWu1HlQSi/ov9Fp4UlYg5DsnQee9xwWucyIZb
a5nBKonHvaTJpj3YHYKVZojx215uFOFzOJ928khof7KwEqXmTEmTQ+bdLtTHVFWr
JSIdez3j1lUOpAmAgG05tAgGfwdArfx3DpVY8tIAEj5rRpZ4nfEM/lvPDndrzP0I
ovWb7FQDJrnv7t8YO8u3AxUQYUC/lHYtMzq4s9Dgm2LFEC3z9rbOoA==
=6qb8
-----END PGP SIGNATURE-----
More information about the dovecot
mailing list