On Sat, Jan 1, 2022 at 2:30 PM Karsten <deb...@decotrain.de> wrote:
> But it would be helpful for others what must be done to create and install 
> this new "client side certificate" that
> appears about 2018?
 I think the certificate issue was there right from the beginning.
OpenSSL might not have forced its usage or just ignored it if it
wasn't present? But in modern times everyone should be aware of
privacy and if s/he really connects to the valid server and not
suffering a man in the middle attack. As noted, if you don't care
about your own safety, just use fetchmail with --nosslcertck.
You should already have your Certificate Authority (CA) key. The
missing step documented there:
https://www.ssl.com/how-to/export-certificates-private-key-from-pkcs12-file-with-openssl/
and is (where INFILE is your CA key in PKCS #12 format):
openssl pkcs12 -in INFILE.p12 -out OUTFILE.crt -nokeys
Then feed it to fetchmail with --sslcertfile. But I don't do it often,
might be wrong as I don't even know your particular state.

Regards,
Laszlo/GCS

Reply via email to