Displaying 20 results from an estimated 6179 matches for "certes".
Did you mean:
ceres
2016 Nov 24
4
Updated my Dovecot certificate for the first time
On Thu, 24 Nov 2016 07:52:51 +0100 (CET)
Steffen Kaiser <skdovecot at smail.inf.fh-brs.de> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On Wed, 23 Nov 2016, Steve Litt wrote:
>
> >On Wed, 23 Nov 2016 16:04:22 -0600 (CST) Greg Rivers
> ><gcr+dovecot at tharned.org> wrote:
> >> $ strings $(whence alpine) | grep '^/.*certs$'
2008 Sep 27
2
client certs with godaddy ssl cert
I've read the client ssl cert section in the wiki and it talks about using a
self signed cert, if I am using a commercial cert, in this case godaddy, how
do I implement a self signed cert for the client side and have dovecot make
use of this? I know the mechanics of setting up the self signed ca, the
question is more what configuration changes do I need to make in dovecot to
handle both
2013 Jan 08
6
Why is localhost self-signed cert a CA cert?
I am building a mail server on Centos 6.3 and working with OpenSSL to
create a self-signed certificate for mail use.
Along the line of learning the 'best' options to use for OpenSSL and
dealing with the default SSL virtual host for Apache, I discovered that
the localhost cert created (I believe) during firstboot has the X509v3
extensions set as a CA cert (eg basicConstraint CA:TRUE).
2020 Jun 11
2
pointer subtraciton on arm for 8.3p1
I use OpenSSH server on an embedded arm using GCC7 cross toolchain. I
found that spamming connection attempts sometimes causes aborts in
sshd. Upon getting this up in gdb I found that the pointer subtraction
inside openbsd-compat/{strlcat.c,strlcpy.c} (and maybe elsewhere)
causes the 32 bit pointer difference to wrap which triggers the abort
because of the -ftrapv option.
This example illustrates
2018 May 21
1
SSL error after upgrading to 2.31
After upgrading to 2.31 I'm getting this error. Not sure what I'm doing
wrong.
No (No signatures could be verified because the chain contains only one
certificate and it is not self signed.)
ssl = yes
ssl_cert = </etc/exim/certs/ctyme.com.crt
ssl_key = </etc/exim/certs/ctyme.com.key
ssl_ca = </etc/exim/certs/ca.crt
local mail.ctyme.com {
? protocol imap {
??? ssl_cert =
2019 Sep 13
2
revoking ssh-cert.pub with serial revokes also younger certs
Hi there!
What am I doing wrong?
I created a ssh-certificate
id_user_rsa-cert.pub with this dump:
id_user_rsa-cert.pub:
root at host # ssh-keygen -Lf id_user_rsa-cert.pub
??????? Type: ssh-rsa-cert-v01 at openssh.com user certificate
??????? Public key: RSA-CERT SHA256:kPitwgxblaUH4viBoFoozSPq9Pblubbedk
??????? Signing CA: ED25519 SHA256:8p2foobarQo3Tfcblubb5+I5cboeckvpnktiHdUs
??????? Key ID:
2005 Sep 20
3
signing dovecot certs with own Cert. Auth.
Hi,
I'm trying to get apache, sendmail , and dovecot to
use SSL certs signed by my own CA. I've got the apache
certs working fine. However, dovecot ( I haven't even
tried sendmail yet) doesn't seem to accept any of the
certificates that I create for it. There is a script
that comes with dovecot that creates self-signed
certificates for you but, I need certificates signed
by my own
2014 Apr 22
2
Re: TLS and intermediate CA
Thanks for the response.
My current chain is as follows:
caroot -> child-ca1 -> server cert
My cacert.pem file has both the caroot and the child-ca1 certs. I have
recompiled libvirt on my machine with some extra debug statements and
verified that both the caroot cert and the child-ca1 certs are being
loaded. But when I try to connect the caroot and child-ca1 certs only
appear under the
2018 Oct 10
2
no mutual signature algorithm with RSA user certs client 7.8, server 7.4
Hi,
One of our users who is running an OS (I think it's the latest beta
macOS 10.14.1) with ssh version "OpenSSH_7.8p1, LibreSSL 2.7.3" is
unable to use our user SSH RSA certificates to authenticate to our
servers (which are running "OpenSSH_7.4p1, OpenSSL 1.0.2k-fips 26 Jan
2017").
We see this error on the client side:
debug1: kex_input_ext_info:
2015 Mar 03
5
Ignorant question on SSL certs
Jason Pyeron wrote:
>> I'm getting endless complaints about my dovecot cert,
>
> Exact message please?
The certificate does not apply to the given host
The certificate is not signed by any trusted certificate authority
>> Do I really have to use a separate cert and key for dovecot?
>> Can I not use the "standard" cert in /etc/pki/tls/certs (and key)
2016 Nov 23
3
Updated my Dovecot certificate for the first time
On Wed, 23 Nov 2016 16:04:22 -0600 (CST)
Greg Rivers <gcr+dovecot at tharned.org> wrote:
> On Wed, 23 Nov 2016, Steve Litt wrote:
> > [snip]
> >
> > Alpine still gives me a bad cert warning, saying I should either
> > fix it or disable checking. I haven't yet found a way to get Alpine
> > to discriminate between a valid self-signed cert and a bad one.
2017 Jul 07
5
STARTTLS issue with sieve
Hi all,
I am currently struggling with an odd sieve/Pigeonhole issue. Some weeks
ago I had to replace our dovecot certificate due to expiration. In the
past I did use a self-signed certificate, but because we now have a
little openssl based CA I have decided to create signed certificate for
imaps. Dovecot is happily accepting the new certificate which has
integrated the whole cert-chain.
2012 Feb 27
1
Using puppet cert generate on a client -- why doesn't this work?
I''m running a two headed puppetmaster and have disabled crl''s. Let''s
call them the primary and the secondary. The primary and secondary
both use the primary as their master. The secondary only is used when
the primary isn''t responding (I wrap the puppetd call in cron with a
short shell script)
I''m managing these ca files on the masters, pushing
2018 May 21
2
SSL error after upgrading to 2.31
You forgot to cc the list.
ssl_ca is used only for validating client certificates.
---Aki TuomiDovecot oy
-------- Original message --------From: Marc Perkel <marc at perkel.com> Date: 21/05/2018 18:25 (GMT+02:00) To: Aki Tuomi <aki.tuomi at dovecot.fi> Subject: Re: SSL error after upgrading to 2.31
On 05/21/2018 07:54 AM, Aki Tuomi
wrote:
2020 Jan 30
6
SSH certificates - restricting to host groups
On 30/01/2020 15:02, Christian, Mark wrote:
> On Thu, 2020-01-30 at 12:27 +0000, Brian Candler wrote:
>> As a concrete example: I want Alice to be able to login as "alice"
>> and
>> "www" to machines in group "webserver" (only). Also, I want Bob to
>> be
>> able to login as "bob" and "www" to machines in group
2018 Jul 23
0
dovecot sometimes sends non-default SSL cert if IMAP client won't send SNI
Can you provide some details on what those openssl commands returned?
Aki
On 20.07.2018 12:14, Martin Johannes Dauser wrote:
> Hi,
>
> I recognised some funny behaviour on my server. IMAP clients which
> won't send an Server Name Indication (SNI) sometimes get the wrong
> certificate. I would expect that those clients always get the default
> certificate (of my new
2012 Jul 16
1
Selective TLS per local IP
We have the requirement to provide SSL on some IP addresses, but not others on our servers.
Providing SSL is the easy part and we're able to use multiple SSL certificates now. (thanks Timo!)
All is working ok, but we several IP hosts that do not require SSL and do not have valid certificates.
While we can limit access via a firewall ACL to TLS connect ports (993/995) we can't do so on
2018 Jul 22
4
ot: LE server conf setup/ iPhone 'expired cert' message
I've installed LE certs on my Dovecot a while back, and, it has been
working OK since, but, today, an iPhone user said he can't get emails as
iphone says 'cert is expired', searching around, I see some other iPhone
similar issues reported, do I have my conf correct, I have;
# cat dovecot.conf | grep ssl
ssl = required
verbose_ssl = no
ssl_cert =
2017 Aug 20
6
is a self signed certificate always invalid the first time
> On Aug 18, 2017, at 4:05 AM, Stephan von Krawczynski <skraw at ithnet.com> wrote:
>
> On Fri, 18 Aug 2017 00:24:39 -0700 (PDT)
> Joseph Tam <jtam.home at gmail.com> wrote:
>
>> Michael Felt <michael at felt.demon.nl> writes:
>>
>>>> I use acme.sh for all of my LetsEncrypt certs (web & mail), it is
>>>> written in pure
2020 Jun 14
5
Question about certificates on Samba AD/DC
Thanks Gabben and Andrew. I've understood but a new question emerged: Each
DC server on my domain has a different pair cert/key and a different CA
cert after deployment, correct?
If so, is it a best practice to generate new cert for each DC server and
sign them with a unique CA? OBS: Every DC servers belongs to the same
domain.
--
Igor Sousa
Em dom., 14 de jun. de 2020 ?s 16:46, Andrew