On Wed, Jan 22, 2014 at 03:07:33PM -0500, Ben Johnson wrote:

> I created the certificate with the following command:
> 
> $ cat example_com.crt PositiveSSLCA2.crt AddTrustExternalCARoot.crt >
> /root/ssl/example.com.pem

To verify that the file is well-formed try the below:

    openssl crl2pkcs7 -nocrl -certfile /root/ssl/example.com.pem |
        openssl pkcs7 -print_certs -text |
        less

You should see the verbose decoding of the certificates in the
correct order.

> # TLS parameters
> smtpd_tls_cert_file = /root/ssl/example.com.pem
> smtpd_tls_key_file = /root/ssl/example.com.key
> smtpd_use_tls = yes
> 
> But when I attempt to verify the certificate chain, I always receive
> "19:self signed certificate in certificate chain".

There nothing wrong with that, the client did not have a suitable
CAfile or CApath configured.  Very few SMTP clients do.

> $ openssl s_client -connect example.com:25 -starttls smtp

No -CAfile or -CApath options in this command-line.

>  0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=example.com
>    i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=PositiveSSL 
> CA 2
>  1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=PositiveSSL 
> CA 2
>    i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust 
> External CA Root
>  2 s:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust 
> External CA Root
>    i:/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust 
> External CA Root

This chain is good.

> What might the problem be? Isn't the last certificate in the chain
> *supposed to be* self-signed?

There is no problem.

-- 
        Viktor.

Reply via email to