Actually, managesieve DOES use starttls, and does use the same config as rest of Dovecot does, unless you override it of course.
But other than that, you're right.
Aki
On 15/12/2022 09:49 EET Christian Mack <christian.mack@uni-konstanz.de> wrote:
Hello
This test only states, that you can connect to IMAP Port 143 with STARTTLS and use your certificate there. It does not show, if your managesieve Port 4190 uses that certificate too. Managesieve does not use STARTTLS, and has its own configurations.
I suspect, that in your certificate you do not have the private IP as alternate name included, as you try to reach 10.0.0.91:4190, not mydomain.com:4190.
Kind regards, Christian Mack
Am 14.12.22 um 21:48 schrieb colin@colinlikesfood.com:
Thank you for this. I am not using self-signed, I am using letsencrypt as a CA, the certs are installed where certbot put them.
I tried the example from https://wiki2.dovecot.org/TestInstallation, using openssl s_client, and I achieved the following (lots of data replaced with "...")
I have not changed anything else since your last reply, I am honestly not sure what rc config has to do with certs (google has not given me a result that seems to apply). Does the below help confirm my certs are properly installed and that i can connect to dovecot over tls and pass my credentials?
root@mc:~ # openssl s_client -connect mydomain.com:143 -starttls imap CONNECTED(00000004) depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = R3 verify return:1 depth=0 CN = mydomain.com verify return:1
Certificate chain ...
Server certificate -----BEGIN CERTIFICATE----- .. -----END CERTIFICATE----- ..
No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits
SSL handshake has read 4922 bytes and written 426 bytes Verification: OK
.. .. ..
read R BLOCK a login me@mydomain.com MyPass
- CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE SORT SORT=DISPLAY THREAD=REFERENCES THREAD=REFS THREAD=ORDEREDSUBJECT MULTIAPPEND URL-PARTIAL CATENATE UNSELECT CHILDREN NAMESPACE UIDPLUS LIST-EXTENDED I18NLEVEL=1 CONDSTORE QRESYNC ESEARCH ESORT SEARCHRES WITHIN CONTEXT=SEARCH LIST-STATUS BINARY MOVE SNIPPET=FUZZY PREVIEW=FUZZY PREVIEW STATUS=SIZE SAVEDATE LITERAL+ NOTIFY SPECIAL-USE a OK Logged in a OK Logged in b select inbox
- FLAGS (\Answered \Flagged \Deleted \Seen \Draft)
- OK [PERMANENTFLAGS (\Answered \Flagged \Deleted \Seen \Draft \*)] Flags permitted.
- 35 EXISTS
- 0 RECENT
- OK [UNSEEN 18] First unseen.
- OK [UIDVALIDITY 1669149589] UIDs valid
- OK [UIDNEXT 255] Predicted next UID
- OK [HIGHESTMODSEQ 615] Highest b OK [READ-WRITE] Select completed (0.001 + 0.000 secs). c list "" *
- LIST (\HasNoChildren \Marked \Trash) "/" Trash
- LIST (\HasNoChildren \UnMarked \Junk) "/" Junk
- LIST (\HasNoChildren \Marked \Sent) "/" Sent
- LIST (\HasNoChildren \Drafts) "/" Drafts
- LIST (\HasNoChildren \UnMarked) "/" INBOX/email-reports
- LIST (\HasNoChildren \UnMarked) "/" INBOX/NAS-Alerts
- LIST (\HasChildren) "/" INBOX c OK List completed (0.001 + 0.000 secs).
On 2022-11-23 14:49, PGNet Dev wrote:
i don't understand why it can't connect, this seems to work fine:
fine ?
you're manually overriding at least one problem with your certs/config
...
- Status: The certificate is NOT trusted. The name in the certificate does not match the expected. *** PKI verification of server certificate failed... Host 10.0.0.91 (sieve) has never been contacted before. Its certificate is valid for 10.0.0.91. Are you sure you want to trust it? (y/N): y ...
it appears that you're using a self-signed cert? are your trusted certs defined and correctly chained? if not explicitly defined, did you correctly add you certs to system ssl dirs, and ensure hashes are correct?
demonstrate first that you can connect to dovecot over tls with a cmd line client, without ignoring or overriding your cert problems
including any client/server cert verification requirements you've turned on in dovecot config
once you've passed the correct certs, then demonstrate that you can authenticate in the same session with any password/credentials you've set
once that all works, make sure you've got those certs correctly set up in your rc config
-- Christian Mack Universität Konstanz Kommunikations-, Informations-, Medienzentrum (KIM) Abteilung IT-Dienste Forschung, Lehre, Infrastruktur 78457 Konstanz +49 7531 88-4416