Date: Wed, 7 Jul 2010 22:30:41 +0200 (CEST) From: Marco Beishuizen <mbeis@xs4all.nl> To: Dan Nelson <dnelson@allantgroup.com> Cc: Giorgos Keramidas <keramida@ceid.upatras.gr>, freebsd-questions@freebsd.org Subject: Re: fetchmail certificate verification messages Message-ID: <alpine.BSF.2.00.1007072225440.3004@yokozuna.lan> In-Reply-To: <20100706053738.GH50409@dan.emsphone.com> References: <alpine.BSF.2.00.1007032332560.2877@yokozuna.lan> <87sk3yv4yq.fsf@kobe.laptop> <20100706053738.GH50409@dan.emsphone.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 6 Jul 2010, Dan Nelson wrote: > CA Roots are also self-signed, btw :) Addtrust is a valid CA Root, and is > the root for some certificates signed by Network Solutions and Comodo (and > probably others). Marco, the fetchmail manpage mentions a --sslcertfile > option; try adding "--sslcertfile /etc/ssl/cert.pem" to force fetchmail to > use the ca_root_nss file you installed previously. IMHO openssl should > automatically consult that file, but apparently it doesn't. Where do I add the "--sslcertfile" option? I do have a /etc/ssl/cert.pem file and fetchmail is started at boot-time (in rc.conf). The starting script of fetchmail in /usr/local/etc/rc.d/ isn't something to be changed I think. Or do I add the option in the .fetchmailrc file? Marco -- A lady is one who never shows her underwear unintentionally. -- Lillian Day
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1007072225440.3004>