On Fri, Jun 15, 2007 at 03:54:11PM -0400, Penguin Lover Willie Wong squawked: > But thanks to that, I got on the right direction: turns out that my > department switched from using a self-signed certificate to using one > from IPSCA, so I've been barking up the wrong tree when trying to > solve the problem. The link that I gave was, apparent to me now, old, > and so importing that cert had no impact. I went and imported the > IPSCA root cert and now all's good.
What's up with openssl and ca-certificates? Trying to connect to my school's imap server, I get openssl s_client -connect imap.math.princeton.edu:993 <snip> Verify return code: 19 (self signed certificate in certificate chain) But if I issue openssl s_client -connect imap.math.princeton.edu:993 -CApath /etc/ssl/certs/ <snip> Verify return code: 0 (ok) It seems that the openssl s_client doesn't know about the default certs in /etc/ssl/certs (The one in question is IPSCa's root certificate, which is included in the ca-certificates package). I think this is also the root of my problem with fetchmail: I had to include explicitly in .fetchmailrc the line 'sslcertpath /etc/ssl/certs' to have the default set of CAs recognized. Is there a configuration switch somewhere that would let openssl be aware of the root CAs that comes with the ca-certificates package? Else the latter seems rather useless. Best, W -- English lessons for programmers #28: "Fewer" is of type int; whereas "less" is of type double. Sortir en Pantoufles: up 189 days, 20:38 -- [EMAIL PROTECTED] mailing list