Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 7 Jul 2010 22:30:41 +0200 (CEST)
From:      Marco Beishuizen <mbeis@xs4all.nl>
To:        Dan Nelson <dnelson@allantgroup.com>
Cc:        Giorgos Keramidas <keramida@ceid.upatras.gr>, freebsd-questions@freebsd.org
Subject:   Re: fetchmail certificate verification messages
Message-ID:  <alpine.BSF.2.00.1007072225440.3004@yokozuna.lan>
In-Reply-To: <20100706053738.GH50409@dan.emsphone.com>
References:  <alpine.BSF.2.00.1007032332560.2877@yokozuna.lan> <87sk3yv4yq.fsf@kobe.laptop> <20100706053738.GH50409@dan.emsphone.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 6 Jul 2010, Dan Nelson wrote:

> CA Roots are also self-signed, btw :)  Addtrust is a valid CA Root, and is
> the root for some certificates signed by Network Solutions and Comodo (and
> probably others).  Marco, the fetchmail manpage mentions a --sslcertfile
> option; try adding "--sslcertfile /etc/ssl/cert.pem" to force fetchmail to
> use the ca_root_nss file you installed previously.  IMHO openssl should
> automatically consult that file, but apparently it doesn't.

Where do I add the "--sslcertfile" option? I do have a /etc/ssl/cert.pem 
file and fetchmail is started at boot-time (in rc.conf). The starting 
script of fetchmail in /usr/local/etc/rc.d/ isn't something to be changed 
I think. Or do I add the option in the .fetchmailrc file?

Marco

-- 
A lady is one who never shows her underwear unintentionally.
 		-- Lillian Day



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.2.00.1007072225440.3004>