search for: sha256withrsaencrypt

Displaying 10 results from an estimated 10 matches for "sha256withrsaencrypt".

2017 Nov 24
1
SSL configuration
...lish and many thanks! Enrico Extracted content of Let?s Encrypt CA is: [root at glusterfs1 ssl]# openssl x509 -in glusterfs.ca -text -noout Certificate: Data: Version: 3 (0x2) Serial Number: 0a:01:41:42:00:00:01:53:85:73:6a:0b:85:ec:a7:08 Signature Algorithm: sha256WithRSAEncryption Issuer: O=Digital Signature Trust Co., CN=DST Root CA X3 Validity Not Before: Mar 17 16:40:46 2016 GMT Not After : Mar 17 16:40:46 2021 GMT Subject: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3 Subject Public Key Info:...
2018 Jul 22
4
ot: LE server conf setup/ iPhone 'expired cert' message
I've installed LE certs on my Dovecot a while back, and, it has been working OK since, but, today, an iPhone user said he can't get emails as iphone says 'cert is expired', searching around, I see some other iPhone similar issues reported, do I have my conf correct, I have; # cat dovecot.conf | grep ssl ssl = required verbose_ssl = no ssl_cert =
2018 Jul 22
0
ot: LE server conf setup/ iPhone 'expired cert' message
...he address of your dovecot server, I tried openssl s_client -connect sbt.net.au:143 -starttls imap And received a cert which includes: Certificate: Data: Version: 3 (0x2) Serial Number: 03:5b:41:a6:f4:a6:33:eb:5b:ac:af:b8:20:96:f4:0e:20:b9 Signature Algorithm: sha256WithRSAEncryption Issuer: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3 Validity Not Before: Apr 23 11:11:28 2018 GMT Not After : Jul 22 11:11:28 2018 GMT Subject: CN=geko.sbt.net.au <http://geko.sbt.net.au/> Dovecot is sending an expired cert...
2018 Jul 22
2
ot: LE server conf setup/ iPhone 'expired cert' message
...vecot server, I tried > > openssl s_client -connect sbt.net.au:143 -starttls imap > > And received a cert which includes: > > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: > 03:5b:41:a6:f4:a6:33:eb:5b:ac:af:b8:20:96:f4:0e:20:b9 > Signature Algorithm: sha256WithRSAEncryption > Issuer: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3 > Validity > Not Before: Apr 23 11:11:28 2018 GMT > Not After : Jul 22 11:11:28 2018 GMT > Subject: CN=geko.sbt.net.au <http://geko.sbt.net.au/> > > > > Dovecot is sending an expired cert. Pa...
2017 Aug 20
2
ot: self certified enduser browser/mail client install?
I have self certified Dovecot as so: ssl = required ssl_cert = </etc/pki/dovecot/certs/dovecot.pem ssl_key = </etc/pki/dovecot/private/dovecot.pem userdb { args = /etc/dovecot/dovecot-mysql.conf driver = sql } in order for end user to avoid webmail warnings or email client warnings, do I make this file /etc/pki/dovecot/certs/dovecot.pem available to users say under
2013 Dec 12
1
Need help in addressing this error - ERROR OpenSSL::SSL::SSLError: SSL_accept returned=1 errno=0 state=SSLv3 read client certificate A: tlsv1 alert unknown ca
...[2013-12-12 08:55:39] INFO WEBrick 1.3.1 [2013-12-12 08:55:39] INFO ruby 1.9.3 (2013-06-27) [x86_64-linux] [2013-12-12 08:55:39] DEBUG TCPServer.new(0.0.0.0, 8140) [2013-12-12 08:55:39] INFO Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: sha256WithRSAEncryption Issuer: CN=Puppet CA generated on savbu-razor-server.cisco.com at 2013-12-10 05:05:10 -0800 Validity Not Before: Dec 11 16:55:39 2013 GMT Not After : Dec 11 16:55:39 2018 GMT Subject: CN=10.193.174.38 Subject Public Key Info: P...
2016 Jul 03
1
Where is krb5.keytab or equivalent?
.../easyrsa/private/MAIL.key > /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: sha256WithRSAEncryption > Issuer: CN=mail.hprs.local > Validity > Not Before: Jul 2 05:54:26 2016 GMT > Not After : Jun 30 05:54:26 2026 GMT > Subject: CN=mail.hprs.local > Subject Public Key Info: > Public Key Algorithm: r...
2016 Jul 03
0
Where is krb5.keytab or equivalent?
...PRS/easyrsa/private/ca.key /etc/ssl/certs/OHPRS/easyrsa/private/MAIL.key /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: sha256WithRSAEncryption Issuer: CN=mail.hprs.local Validity Not Before: Jul 2 05:54:26 2016 GMT Not After : Jun 30 05:54:26 2026 GMT Subject: CN=mail.hprs.local Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (...
2016 Jul 02
0
Where is krb5.keytab or equivalent?
.../easyrsa/private/MAIL.key > /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: sha256WithRSAEncryption > Issuer: CN=mail.hprs.local > Validity > Not Before: Jul 2 05:54:26 2016 GMT > Not After : Jun 30 05:54:26 2026 GMT > Subject: CN=mail.hprs.local > Subject Public Key Info: > Public Key Algorithm: r...
2016 Jul 02
5
Where is krb5.keytab or equivalent?
OK, let me go through exactly what you did: you: > Here's the test (I must run mutt not telnet like i mentioned earlier to > get the imap tickets). > > root at server:~# kinit achim > Password for achim at DOMAIN.LOCAL: > [I enter my password] As root on AD/DC mail.hprs.local: me: $ kinit mark Password for mark at HPRS.LOCAL: [I enter my password] you: >