Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 05 Jul 2010 09:05:17 +0300
From:      Giorgos Keramidas <keramida@ceid.upatras.gr>
To:        Marco Beishuizen <mbeis@xs4all.nl>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: fetchmail certificate verification messages
Message-ID:  <87sk3yv4yq.fsf@kobe.laptop>
In-Reply-To: <alpine.BSF.2.00.1007032332560.2877@yokozuna.lan> (Marco Beishuizen's message of "Sat, 3 Jul 2010 23:36:58 %2B0200 (CEST)")
References:  <alpine.BSF.2.00.1007032332560.2877@yokozuna.lan>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 3 Jul 2010 23:36:58 +0200 (CEST), Marco Beishuizen <mbeis@xs4all.nl> wrote:
> Hi,
>
> I'm seeing in my logfiles a lot of messages like these from fetchmail:
>
> Jul  3 22:02:54 yokozuna fetchmail[1437]: Server certificate
>   verification error: self signed certificate in certificate chain
> Jul  3 22:02:54 yokozuna fetchmail[1437]: This means that the root
>   signing certificate (issued for /C=SE/O=AddTrust AB/OU=AddTrust External
>   TTP Network/CN=AddTrust External CA Root) is not in the trusted CA
>   certificate locations, or that c_rehash needs to be run on the
>   certificate directory. For details, please see the documentation of
>   sslcertpath and sslcertfile in the manual page.
>
> Does anyone know what these messages mean and if they are harmless or
> not?

This means that the certificate of CN="AddTrust External CA Root" is
signed by itself.  It's a common thing when the administrator of the
respective SSL-enabled host has not bought a certificate from one of the
global CA authorities, but has signed the certificate with itself to
avoid the costs & process associated with maintaining a "normal"
certificate.

If you know that the respective domain is indeed set up this way, the
warning is harmless.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87sk3yv4yq.fsf>