On Wed, July 22, 2009 23:45, Noel Jones wrote:
> Benny Pedersen wrote:
>> what does others do if remote have a self signed ssl key, accept it ?
 > Yes, accept it.  Opportunistic TLS does not imply more trust
> than a non encrypted connection; you're willing to make a
> non-encrypted connection to that client. TLS in this case
> indicates encryption, but not authentication.

yes this is clear to me its is so, but i dont know why self signed ssl is being 
used so much when there is plenty of good trusted
signers :/

well it took me a bit time to make my own ssl key, but it was fun try it to 
find all how to setup all ssl tls in postfix dovecot
apache, at first i did not belive i could make it, but now i am there

using cacert as signer, so far no problem

> The usual reason for a purchased certificate on a mail server
> is so users don't get an error when submitting mail without
> you providing them the certificate or telling them to ignore
> the certificate error message.

this problem can also be a big iretating problem for windows clients to know 
how to use a self signed ssl key, thats why i try to
use cacert basicly, but its still gives problems :(

in ubuntu firefox my key works as is

but firefox on windows no go, how do i debug it to find if i have made the 
problem self ?

-- 
xpoint

Reply via email to