Hi Viktor

Many thanks for the reply! So I'm not going crazy...<smiley image="smiley_beam.gif"/>

You said:

<quote author="Viktor Dukhovni">
A work-around is to list all the relevant CAs in the chain files
for both algorithms.  The patches that resolve this for 1.0.2 are
attached for educational purposes only.  They are unlikely to apply
to 1.0.1 or earlier in isolation, and in any case would be entirely
untested with 1.0.1 as a base.
</quote>

So do I need to create a chain cert as follows for each cert (RSA and ECDSA):

cat mail.domain.com.ecdsa.crt COMODOECCDomainValidationSecureServerCA.crt COMODOECCAddTrustCA.crt COMODORSADomainValidationSecureServerCA.crt COMODORSAAddTrustCA.crt> mail.domain.com.chained.postfix.ecdsa.crt

cat mail.domain.com.sha256.crt COMODOECCDomainValidationSecureServerCA.crt COMODOECCAddTrustCA.crt COMODORSADomainValidationSecureServerCA.crt COMODORSAAddTrustCA.crt> mail.domain.com.chained.postfix.sha256.crt

Would this do the trick?

Reply via email to