On Wed, Jan 22, 2014 at 03:07:33PM -0500, Ben Johnson wrote: > I created the certificate with the following command: > > $ cat example_com.crt PositiveSSLCA2.crt AddTrustExternalCARoot.crt > > /root/ssl/example.com.pem
To verify that the file is well-formed try the below: openssl crl2pkcs7 -nocrl -certfile /root/ssl/example.com.pem | openssl pkcs7 -print_certs -text | less You should see the verbose decoding of the certificates in the correct order. > # TLS parameters > smtpd_tls_cert_file = /root/ssl/example.com.pem > smtpd_tls_key_file = /root/ssl/example.com.key > smtpd_use_tls = yes > > But when I attempt to verify the certificate chain, I always receive > "19:self signed certificate in certificate chain". There nothing wrong with that, the client did not have a suitable CAfile or CApath configured. Very few SMTP clients do. > $ openssl s_client -connect example.com:25 -starttls smtp No -CAfile or -CApath options in this command-line. > 0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=example.com > i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=PositiveSSL > CA 2 > 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=PositiveSSL > CA 2 > i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust > External CA Root > 2 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust > External CA Root > i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust > External CA Root This chain is good. > What might the problem be? Isn't the last certificate in the chain > *supposed to be* self-signed? There is no problem. -- Viktor.