On Wed, Aug 13, 2014 at 02:09:41PM -0400, Alex wrote:

> > > # openssl s_client -connect mail.example.com:465
> >
> > You've not specified a CAfile or CApath.  See s_client(1).
> 
> Ah, I see. I thought supplying this on the server side in main.cf was the
> proper way. I've supplied it on the openssl command-line and it works as
> expected.

The s_client command is the verifier, checking the validity of the
server certificate chain.  Clearly the server's trust chain settings
must have no effect on whom the verifier trusts.

> > Not necessarily, but a common error is to only configure the leaf
> > certificate and not append the required intermediate certificates
> > to the server's chain file.
> 
> The CAfile contains two certs, supplied by GoDaddy. I'm pretty sure that
> would be both of them.

The server certificate (chain) file must be constructed as documented in
TLS_README.

    http://www.postfix.org/TLS_README.html#server_cert_key

Under the sub-heading of "Creating the server certificate file".
You should generally store the private key in a separate file and
make sure that file is not world-readable.

If the private key and certificates are in the same file now, don't
clobber/lose the key while building the new chain file.

> > Thunderbird generally employs "STARTTLS" not wrapper-mode.  However,
> > the certificate chain is the same, so it suffices to test port 587
> > with Thunderbird, and just test that 465 responds via s_client.
> 
> So this basically means Thunderbird is broken on port 465, because even if
> I wanted to use it, it appears I couldn't.

No.  It means you're confused, and disabusing you of all the
confusion at once is not a pre-requisite to moving forward.

[ It is likely possible to configure Thunderbird to use SSL wrapper
mode on 465, but this is not necessary. ]

-- 
        Viktor.

Reply via email to