On Fri, Jun 15, 2007 at 03:54:11PM -0400, Penguin Lover Willie Wong squawked:
> But thanks to that, I got on the right direction: turns out that my
> department switched from using a self-signed certificate to using one
> from IPSCA, so I've been barking up the wrong tree when trying to
> solve the problem. The link that I gave was, apparent to me now, old,
> and so importing that cert had no impact. I went and imported the
> IPSCA root cert and now all's good. 

What's up with openssl and ca-certificates? 

Trying to connect to my school's imap server, I get

  openssl s_client -connect imap.math.princeton.edu:993 
<snip>
  Verify return code: 19 (self signed certificate in certificate chain)

But if I issue 

  openssl s_client -connect imap.math.princeton.edu:993 -CApath /etc/ssl/certs/
<snip>
  Verify return code: 0 (ok)

It seems that the openssl s_client doesn't know about the default
certs in /etc/ssl/certs (The one in question is IPSCa's root
certificate, which is included in the ca-certificates package). 

I think this is also the root of my problem with fetchmail: I had to
include explicitly in .fetchmailrc the line 'sslcertpath
/etc/ssl/certs' to have the default set of CAs recognized.

Is there a configuration switch somewhere that would let openssl be
aware of the root CAs that comes with the ca-certificates package?
Else the latter seems rather useless. 

Best, 

W
-- 
English lessons for programmers #28: 
    "Fewer" is of type int; whereas "less" is of type double. 
Sortir en Pantoufles: up 189 days, 20:38
-- 
[EMAIL PROTECTED] mailing list

Reply via email to